DATABASE SECURITY 2
Abstract
This paper focuses on various aspects of database security, possible threats with their
solutions, and the advantages of securing a database among other critical issues. A detailed step
by step procedure of securing a database starting from laying proper authentication procedures
that limit the access control to the information stored in database forms the basic part of this
discussion. There various aspects of access control allowed to people in various levels in an
organization depending on the type of information they need to access. To secure a database an
administrator should be aware of all possible threats to the data stored and the general database
software vulnerabilities. These threats should be subjected to Database audition in order to
establish the nature of damage they are likely to cause and how they can be mitigated(Rhodes-
Ousley, 2013). Various aspects of database auditing are hereby discussed in detail. Once all the
initial steps of threat identification are completed, data encryption process is the first step in
securing a database. Here priority issues must be identified depending on the nature of
information stored and the possible threats. Consequently, the process of monitoring the database
and blocking any possible threats is also a key step in ensuring database security. Finally, this
paper explains the various reasons why organization databases should be secured.
Introduction
Database security refers to protective measures and policies adopted to ensure that a
database including the software program and the information stored is free from cybersecurity
threats or unauthorized access. Ensuring database security requires a number of protective
procedures, tools, and other mechanisms within a database system to be properly secured from
any possible damage and malicious attacks(Rhodes-Ousley, 2013). Database security entails