Implementing database security and integrity

For many firms using database applications, ensuring database security and integrity should be of high priority. Most database applications are network-capable; this increases the need for the implementation of security and ensuring integrity.

The network administrator, together with the CIO, should consider the following when implementing database security:

  • Install the most recent service pack for the network operating system. All service pack updates contain configuration upgrades that protect the network operating system from intrusions.

  • Hide the directory that will be used for sharing the database application to prevent any unauthorized access.

  • Most database applications include an administrator feature allowing control of the various levels of security access to the application. A senior member of the department where the application is to be installed should have the responsibility for this administrator function. This department member will work with the network administrator to assign access rights to the application.

  • The network administrator, who is responsible for the overall maintenance and backup of database applications on the network, should use DLT tape drives rather than DAT drives. DLT tape drives are much faster and can store more information.

  • Implement disk redundancy to ensure database integrity. RAID 1 (mirroring) or RAID 5 can be used. Generally, with database

    Requires Free Membership to View

  • applications requiring a great number of write processes, you get higher performance with RAID 5. With RAID 1, write performance decreases because two writes occur instead of one for a given transaction.

About the author:

Adesh Rampat has ten years experience with network and IT administration. He is a member of the Association Of Internet Professionals, the Institute For Network Professionals and the International Webmasters Association. He has also lectured extensively on a variety of topics.

Did you like this tip? If so, (or if not) why not let us know. Send an e-mail to us and sound off. Or visit our tips page to rate this tip, or submit one of your own.

Related book

Database Security
Authors : Silvana Castano, Mariagrazia Fugini, Giancarlo Martella, Pierangela Samarati
Publisher : Addison Wesley
ISBN/CODE : 0201593750
Cover Type : Hard Cover
Pages : 608
Published : June 1994
The competitive edge of many companies and public trust in government institutions can often depend on the security of the information now held in databases. This book provides an authoritative account of security issues in database systems, and shows how current commercial or future systems may be designed to ensure both integrity and confidentiality.

This was first published in February 2001

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.