This website uses cookies to ensure you have the best experience. Learn more

Encryption A Means Of Security Essay

4201 words - 17 pages

Seminar Presentation


Application of encrypting techniques


Database Security


Uweh SKelvin


Security in today’s world is one of the important challenges that people are facing all over the world in every aspect of their lives. Similarly security in electronic world has a great significance. In this seminar work, we discuss the applications of encryption techniques in database security. This is an area of substantial interest in database because we know that, the use of database is becoming very important in today’s enterprise and databases contains information that is major enterprise asset. This research work discuses the application of various ...view middle of the document...

As discussed previously confidentiality imposes limits while retrieving the secure data and therefore averting the illegal access to the data. Integrity means that the data will not be tainted in any way. Availability of data on time is the property of secure databases. Ahmad (1996). There are four types of controls mentioned by Denning to obtain the database protection, those includes: access control, information flow control, cryptographic flow control and inference control.
Access controls ensures that all direct accesses to the system are authorized. The access controls governs that that can access the system’s objects. Often it happens that important information or data is leaked out or misused not because of defective access control but because of improper information flow. When policies for information flow are not properly defined than the system data is less protected. The cryptographic control, controls (secures) the data by encrypting it.
Another approach has been adopted for securing the databases. It has been discussed that to make the databases secure different policies at organization level can be implemented. Data/information is always a most important asset for any organization whose security cannot be compromised. With the advances in technology, the risk to these valuable assets increases. So their security is a big
challenge Khaleel etal (2011) .In different database security layers are defined shown in figure (2) below. These layers are: database administrator, system administrator, security officer, developers and employee. For each layer some well-defined security policies have been anticipated. These policies ensure the security features, privacy, confidentiality and integrity.
This study mainly focuses on issues of encryption techniques in databases security and measures taken to solve those issues. Securing sensitive data from illegal access, theft and forging becomes a big challenge for different organizations, like government, no-government and privates sectors. Encryption of data in client or server side where data is shared between different parties is not sufficient. Basically the problem is to ensure that semi trusted database is secure or not.
A new hypothesis for database encryption is proposed in which database encryption can be provided as a service to applications with unified access to encrypted database. Using such an encrypted data management model, applications can concentrate on their core businesses and protect data privacy against both malicious outsiders and the untrusted database service users without need to know encryption details.
Further we shall discuss what actually has been implemented to reduce/eliminate the security threats and how the database security was enhanced in the past. And we shall see what needs to be done for securing a valuable asset, the databases, of organizations.


Excessive Privilege Abuse
When users are specified with the...

Other Papers Like Encryption a Means of Security

A Jungian Analysis of the Warrior Woman in Popular Culture and a Brief Look at What the Archetype Means Culturally and Psychologically

871 words - 4 pages A Jungian analysis of the warrior woman in popular culture and a brief look at what the archetype means culturally and psychologically. The 1990s and the new millennium saw an influx of female action heroes on television from Xena to Scully, Buffy to Sidney Bristow. Countless girls and boys eagerly jumped to their television set each evening to absorb the warrior energy of their new role models. Adults, too, were intrigued by the possibility

Using Material from Item C and Elsewhere, Assess the Strengths and Limitations of Using Structured Interviews as a Means of Investigating Substance Abuse Among Homeless People. (15 Marks)

741 words - 3 pages any misunderstandings structured interviews allow for the researchers to see any body language which may help in understanding how the homeless person may feel. If, like in Item C. homeless people do not trust authority and feel intimidated or become defensive it will be clear for the researcher to see and record. A disadvantage of structured interviews is that the homeless people and researchers will be face to face this means that if any of

Using Material From Item C And Elsewhere, Assess The Strengths And Limitations Of Using Qualitative Documents As A Means Of Investigating Suicide. (15 Marks)

511 words - 3 pages . However such great details does come with its limitations as so much information means that the sociologists has to look though so much. Not only this but you are going to need plenty of personal documents from lots of different people to be able to spot a pattern. Durkheim noticed that there were 4 different reasons as to why people commit suicide. These included egoistic, altruistic, anomic and fatalistic. Although Durkheim’s research was useful

Using Material from Item B and Elsewhere, Assess the Strengths and Limitations of Overt Participant Observation as a Means of Investigating Police Attitudes

1090 words - 5 pages Using material from Item B and elsewhere, assess the strengths and limitations of overt participant observation as a means of investigating police attitudes Overt participation is usually a method of research carried out by those from a non-interactionist perspective, even though it is something that does focus on some interaction. When investigating police attitudes we mean attitudes of the police towards those who commit crime or are those

Critically Evaluate How Imaging Departments Can Use Auditing of Their Radiology Reporting Services as a Means of Ensuring High Standards Are Maintained

4560 words - 19 pages working within agreed protocols. Extending radiographers roles offers a means of overcoming radiologist shortages quickly, but requires training, support, formal arrangements for delegation and regular audit (Audit Commission, 2002; Paterson et al, 2004; and Royal College of Radiologists, 1995). REPORTING ACCURACY Audit of reporting practice is essential to raise awareness of accuracy rates and sources of error, identifying false-positive

Beth A Grillo - It540 Management Of Information Security - Assignment - Unit 2

297 words - 2 pages Unit 2 Assignment: Security Policy Implementation Beth A. Grillo, MHA, CPC-A July 19th, 2016 IT540-01: Management of Information Security Dr. Kenneth Flick Kaplan University Table of Contents Unit Two Assignment: Security Policy Implementation 3 Part 1: Step 29 3 Part 1: Step 36 3 Part 3: Step 33 4 Part 3: Significance of Strict Password Policy 5 Reference 6 Unit Two Assignment: Security Policy Implementation Part 1

Cold War Canada: A Time Of Collective Security And Political Urging

1192 words - 5 pages world with the security which they require..." (291-292). As it stood, the organization's crude physical protection scheme, comprised of a undeveloped "unpaid assistant militia", would not be able to defend its members in the event of a devastating Communist attack.With that one trial of an atomic bomb, the arms race had started. With a twisted ideology that was, "[the] basic reason why Russia has not attacked [the Allies] is that we can outproduce

Was Polanyi right to argue that "work is a vital human institution and an end in itself, not just a means to aggregate social wealth?" How do labor rights relate to the five goals of development?

544 words - 3 pages not aim to work for aggregate social wealth, they won't make any money, and also it cannot help the growth of economy. Apparently, people need to work hard and more to gain more money, and have a better living standard, at this point, Polanyi is not that right because only work with effort can produce profit.How do labor rights relate to the five goals of development?The five goals of development are democracy, order, equality, autonomy and


851 words - 4 pages smaller than those of the best known signature then encryption schemes with the same provided functionalities. 3. Security: A signcryption scheme should simultaneously fulfill the security attributes of an encryption scheme and those of a digital signature. Such additional properties mainly include: Confidentiality, Unforgeability, Integrity, and Non-repudiation. Some signcryption schemes provide further attributes such as Public verifiability

Select Appropriate Algorithms

401 words - 2 pages and justify the recommendation. 5. Confidential Services Inc. is a military support branch consisting of 14,000,000 computers with Internet access and 250,000 servers. All employees must have security clearances. They communicate mainly through internally secured systems. Confidential Services Inc. is concerned that sensitive information may inadvertently be exposed and wants to implement a symmetric file encryption algorithm that is strong but fast. Select an encryption solution that best meets the company's needs and justify the recommendation.

Database Encryptin Solution

1274 words - 6 pages Database Encryption Solution Introduction Critical data in a database needs to be protected against internal and external threats. A database encryption solution can be used to achieve this protection in addition to providing the regulatory requirements. In the past, access control was used as a means of protecting information against access by unauthorized users. Access control did not prove very effective and this has led to

Related Essays

A Hierarchical Frameworkmodel Of Mobile Security

3701 words - 15 pages protective measures are needed. Obviously the simple migration of methods used in wired communications in order to obtain security into a mobile scenario cannot satisfy the requirements of anyone besides hackers. Many studies have focused mainly on mobile subscriber authentication, radio-path encryption [2-4], and secure mobile IP [5, 6], but so-called “mobile security” by no means involves only these relative independent and narrow domains. We

Criticize The Use Of Strategic Planning As A Means To Achieve Organisational Objectives

996 words - 4 pages Criticize the use of strategic planning as a means to achieve organisational objectives. Strategic planning is the process by which managers of the firm analyze the internal and external environments for the purpose of formulating strategies and allocating resources to develop a competitive advantage in an industry that allows for the successful achievement of organizational goals Rothaermal (2012). Strategic planning cannot provide a

Examine The Effectiveness Of Situational Crime Prevention As A Means Of Reducing The Impact Of Crime On Society

688 words - 3 pages they will be more likely to commit a crime. Therefore using CCTV and high security, there are less likely to be crimes as they do not want to risk getting caught. However Katz and Lyng put forward the idea of 'edgework' which argues that criminals also do it for the thrill of the act and that situational crime prevention actually encourages crime due to the risk involved that fuels the criminals adrenaline. However the use of situational crime

Put Forth A Theory On What It Means To Be Human And, As A Good Reader, Explain How We Might Read Frankenstein As An Example Of This Theory

1155 words - 5 pages Final Project : FRANKENSTEIN Question 4: Put forth a theory on what it means to be human and, as a good reader, explain how we might read Frankenstein as an example of this theory. You may use any philosophical stance : To err is to be human, to forgive divine. All knowledge is sorrow The strutcure of the mind in Freudian terms The biblical story of Adam and Eve Darwinian evolution Be