Sunday, April 21, 2019

Database security risks Term Paper Example | Topics and Well Written Essays - 750 words

Database earnest risks - Term Paper ExampleAlso, this research will outline the main problems with the database screen and security.Data and information are precious assets for any organization or business. Information refers to data that has been improve and structured by processing and purposeful intelligence (Whitten, Bentley, & Dittman, 2000, p. 45). Here, data refers to a basic explanation of events, things, persons, processes, and proceedings that are collected, categorized, and stored, however they are not structured to convert any definite meeting. Data items take figures, numeric, alphanumeric, sounds, or images. A database encompasses data and information that are organised for retrieval (Turban, Leidner, McLean, & Wetherbe, 2005, p. 51) and (Laudon & Laudon, 1999, p. 7). According to (Stair & Reynolds, 2003), a database consists of organized collection of data and information. A database can include data and information on, workers, clients, inventory, sales informat ion, competitors, online dealings, and so on (Stair & Reynolds, 2003, p. 17). A database is a most valuable asset for any organization which is necessary to run the business. Therefore, security of this asset is very necessary. Security consists of the guidelines, activities, and actions used to stop unlawful access or modification, theft, and physical modify to database (Laudon & Laudon, 1999, p. 502). Privacy refers to right of organizations and individuals to forbid or incarcerate the compilation and utilization of information about them. In addition, few years ago, information privacy was straightforward to maintain because information was stored in different locations, for instance, each business had its make acknowledgment files, and each government agency maintained detached records, doctors kept their own patient files. However, presently, huge databases store this data online. A large amount of this data is private and cloistered and should be reachable only to permitted users (Shelly, Cashman, & Vermaat,

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.