For many firms using database applications, ensuring database security and integrity should be of high priority....
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Most database applications are network-capable; this increases the need for the implementation of security and ensuring integrity.
The network administrator, together with the CIO, should consider the following when implementing database security:
- Install the most recent service pack for the network operating system. All service pack updates contain configuration upgrades that protect the network operating system from intrusions.
- Hide the directory that will be used for sharing the database application to prevent any unauthorized access.
- Most database applications include an administrator feature allowing control of the various levels of security access to the application. A senior member of the department where the application is to be installed should have the responsibility for this administrator function. This department member will work with the network administrator to assign access rights to the application.
- The network administrator, who is responsible for the overall maintenance and backup of database applications on the network, should use DLT tape drives rather than DAT drives. DLT tape drives are much faster and can store more information.
- Implement disk redundancy to ensure database integrity. RAID 1 (mirroring) or RAID 5 can be used. Generally, with database applications requiring a great number of write processes, you get higher performance with RAID 5. With RAID 1, write performance decreases because two writes occur instead of one for a given transaction.
About the author:
Adesh Rampat has ten years experience with network and IT administration. He is a member of the Association Of Internet Professionals, the Institute For Network Professionals and the International Webmasters Association. He has also lectured extensively on a variety of topics.
Did you like this tip? If so, (or if not) why not let us know. Send an e-mail to us and sound off. Or visit our tips page to rate this tip, or submit one of your own.
Authors : Silvana Castano, Mariagrazia Fugini, Giancarlo Martella, Pierangela Samarati
Publisher : Addison Wesley
ISBN/CODE : 0201593750
Cover Type : Hard Cover
Pages : 608
Published : June 1994
The competitive edge of many companies and public trust in government institutions can often depend on the security of the information now held in databases. This book provides an authoritative account of security issues in database systems, and shows how current commercial or future systems may be designed to ensure both integrity and confidentiality.