January 2015
Intermediate to advanced
944 pages
33h 37m
English
In this chapter:
• database terms and concepts
• security requirements: C-I–A; reliability, types of integrity
• access control; sensitive data, disclosure, inference, aggregation
• data mining and big data
Protecting data is at the heart of many secure systems, and many users (people, programs, or systems) rely on a database management system (DBMS) to manage the protection of structured data. For this reason, we devote this chapter to the security of databases and database management systems, as an example of how application security can be designed and implemented for a specific task.
Databases are essential to many business and government organizations, holding data that reflect the organization’s core activities. Often, when ...