Sample Essay on:
Protecting Databases

Here is the synopsis of our sample research paper on Protecting Databases. Have the paper e-mailed to you 24/7/365.

Essay / Research Paper Abstract

This 12 page paper delves into Internet security issues as it concerns the integrity of databases. Database security is discussed in depth. Authentication is a large part of the discussion along with the problem of using back doors. Solutions are explored. Bibliography lists 6 sources.

Page Count:

12 pages (~225 words per page)

File: RT13_SA129sec.rtf

Buy This Term Paper »

 

Unformatted sample text from the term paper:

up solely based on their ability to thrive in an online environment. While the net has been good to most businesses, every company faces greater security risks as a result. With so much data available at the click of a mouse, there are real threats and concerns that were not previously present. The integrity of the company database is of course of the utmost concern. Some companies have endured public relations and logistical nightmares after hackers were able to breach security. Thus, the security of the database should be high in terms of priority for any company, whether or not the Internet supports their main type of transactions. Databases can be compromised from within company walls too. It is important to note that a secure database must meet additional standards in terms of availability, integrity and confidentiality (Spalka and Cremers 67). A secure database is generally thought to be an extension to an open database and should be representative of an image for a secure real-world section (67). Confidentiality demands will inevitably crop up in many situations and while some are dictated by the law, others are simply company preference (Spalka and Cremers 67). Thus, in evaluating the need for security in databases, many issues will be broached. What type of company is it that needs protection? Is the data sensitive? For example, might data contain personal, guarded information such as the medical records of a celebrity, or is the data more general, where no serious consequences will arise if the information is leaked? When designing types of security for databases, the extent and expense a firm goes to does ...

Search and Find Your Term Paper On-Line

Can't locate a sample research paper?
Try searching again:

Can't find the perfect research paper? Order a Custom Written Term Paper Now