April 2018
Intermediate to advanced
284 pages
6h 43m
English
In the previous chapter, we saw how we can incorporate access management in an application to secure it from unauthorized access, which is essentially the application level security. However, what if we don't have our database secured? Well, in that case, data can be misused by unauthorized users or even authorized users, such as database administrators, which leads to business loss or sometimes legal actions.
Data security is always a major concern, especially when it is hosted on Cloud Server. We have to protect our data against the compromises of integrity, availability, and confidentiality. It doesn't matter whether you are using RDBMS, such as MySQL or MSSQL, or NoSQL, such as MongoDB or Firebase Realtime ...