Implementing database security and integrity

Most database applications are network-capable. This increases the need for the implementation of security.



For many firms using database applications, ensuring database security and integrity should be of high priority.

Most database applications are network-capable; this increases the need for the implementation of security and ensuring integrity.

The network administrator, together with the CIO, should consider the following when implementing database security:

  • Install the most recent service pack for the network operating system. All service pack updates contain configuration upgrades that protect the network operating system from intrusions.

  • Hide the directory that will be used for sharing the database application to prevent any unauthorized access.

  • Most database applications include an administrator feature allowing control of the various levels of security access to the application. A senior member of the department where the application is to be installed should have the responsibility for this administrator function. This department member will work with the network administrator to assign access rights to the application.

  • The network administrator, who is responsible for the overall maintenance and backup of database applications on the network, should use DLT tape drives rather than DAT drives. DLT tape drives are much faster and can store more information.

  • Implement disk redundancy to ensure database integrity. RAID 1 (mirroring) or RAID 5 can be used. Generally, with database applications requiring a great number of write processes, you get higher performance with RAID 5. With RAID 1, write performance decreases because two writes occur instead of one for a given transaction.


About the author:

Adesh Rampat has ten years experience with network and IT administration. He is a member of the Association Of Internet Professionals, the Institute For Network Professionals and the International Webmasters Association. He has also lectured extensively on a variety of topics.

Did you like this tip? If so, (or if not) why not let us know. Send an e-mail to us and sound off. Or visit our tips page to rate this tip, or submit one of your own.


Related book

Database Security
Authors : Silvana Castano, Mariagrazia Fugini, Giancarlo Martella, Pierangela Samarati
Publisher : Addison Wesley
ISBN/CODE : 0201593750
Cover Type : Hard Cover
Pages : 608
Published : June 1994
Summary:
The competitive edge of many companies and public trust in government institutions can often depend on the security of the information now held in databases. This book provides an authoritative account of security issues in database systems, and shows how current commercial or future systems may be designed to ensure both integrity and confidentiality.


This was first published in February 2001

Dig deeper on Database Security Management

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close