12 Viii August 2024
12 Viii August 2024
https://doi.org/10.22214/ijraset.2024.63853
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 12 Issue VIII Aug 2024- Available at www.ijraset.com
Abstract: In the modern technical landscape, database security has emerged as a critical concern. The primary goal of database
security is to prevent unauthorized access and data modification while ensuring uninterrupted access to required services.
Various security measures have been devised to safeguard databases, and numerous security models have been established, each
focusing on different aspects of database security. The effectiveness of these security measures relies on the design and
development of the database management system for protection. In the current environment where web applications with
databases as a backend are proliferating, a secure database management system is vital, going beyond just securing the database
itself. This paper focuses on database breaches, identifying the risks, security measures, and weaknesses in managing a
Database Management System.
Keywords: Data breach, database security challenges, database risk, Ransom ware, Breach cost
I. INTRODUCTION
Relational database systems have been adopted as the infrastructure for data repositories in recent years due to advancements in
hardware capability and volume capacity, as well as extensive use of World Wide Web platforms and information systems. Due to
the decentralized nature of information management, massive volumes of data and information are now a major source of security
challenges. Relational database security concepts are frequently built on the CIA triangle of security, which refers to availability,
integrity, and confidentiality. To ensure that the data is secure, these elements need to be included in the application processes [1].
Fraud and theft affect the database environment, which in turn affects the entire company. Although the data itself is not being
altered, the integrity and privacy may be compromised. The term "confidentiality" relates to keeping material secret, usually only
when it's essential to the company. Loss of privacy and competitiveness may follow security lapses that cause confidentiality to be
compromised. When data integrity is compromised, it becomes tampered with and altered. Many businesses are looking for what is
known as "24/7" availability, or availability that is available for use twenty-four hours a day, seven days a week. When there is a
loss of availability, either the data or the system cannot be accessed. As a result, the goal of relational database management
systems is to minimize losses brought on by dangers or unforeseen circumstances. A threat is an instance or circumstance that could
have a negative impact on an organization's systems. To find and identify the most dangerous risks, the organization needs to put in
time and effort [1, 2, 3].
Availability
Data is
secured by
CIA triad
Confidentiality Integrity
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 11
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 12 Issue VIII Aug 2024- Available at www.ijraset.com
A. SQL Injections
Database systems are used for the backend functionality. User supplied data as input is often used to dynamically build SQL
statements that affect directly to the databases. Input injection is an attack that is aimed at subverting the original intent of
the application by submitting attacker – supplied sql statements directly to the backend database.[9] There are two types of input
injection:
1) SQL Injection: Targets the tradition database system. It attacks usually involve injecting unauthorized statements into the input
fields of applications.
2) NoSQL Injection: Targets big data platforms. This type involves inserting malicious statements into big data components like
Hive, MapReduce.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 12
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 12 Issue VIII Aug 2024- Available at www.ijraset.com
B. Malware
Cybercriminals, state-sponsored hackers, and spies use advanced attacks that blend multiple tactics – such as spear
phishing emails and malware – to penetrate organizations and steal sensitive data. Unaware that malware has infected their
device; legitimate users become a conduit for these groups to access your networks and sensitive data.
10.00
8.00
6.00
4.00
2.00
0.00
2015 2016 2017 2018 2019 2020 2021 2022
C. Backup Exposure
Backup storage media is often completely unprotected from attack. As a result, numerous security breaches have involved the theft
of database backup disks and tapes. Furthermore, failure to audit and monitor the activities of administrators who have low-level
access to sensitive information can put your data at risk. Taking the appropriate measures to protect backup copies of sensitive data
and monitor your most highly privileged users is not only a data security best practice, but also mandated by many regulations.
D. Weak Authentication
Weak authentication schemes allow attackers to assume the identity of legitimate database users. Specific attack strategies include
brute force attacks, social engineering, and so on. Implementation of passwords or two-factor authentication is a must. For
scalability and ease-of-use, authentication mechanisms should be integrated with enterprise directory/user management
infrastructures.
1) Backup Exposure
Backup storage media is often completely unprotected from attack. As a result, numerous security breaches have involved the theft
of database backup disks and tapes. Furthermore, failure to audit and monitor the activities of administrators who have low-level
access to sensitive information can put your data at risk. Taking the appropriate measures to protect backup copies of sensitive
data and monitor your most highly privileged users is not only a data security best practice, but also mandated by many
regulations.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 13
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 12 Issue VIII Aug 2024- Available at www.ijraset.com
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 14
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 12 Issue VIII Aug 2024- Available at www.ijraset.com
The Privacy Rights Clearinghouse (PRC), a non-profit organization located in the United States, disclosed that between January
2005 and October 2019, there were 9,016 reported data breaches across multiple industries. In total, over 10 billion records
(10,376,741,867) were compromised due to these breaches [10]. The PRC database features reports on several data breach
occurrences pertinent to each sector. Since no records were compromised during certain intrusions, the authors have omitted those
figures from their analysis concerning the depiction of data breaches by sector. After an exhaustive analysis of the PRC database,
the compiled information was tabulated in Table
Healthcare 1587
Financial 194
Educational 64
government 45
Healthcare 1080
Financial 1422
Educational 239
government 166
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 15
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 12 Issue VIII Aug 2024- Available at www.ijraset.com
Financial
49%
VII. CONCLUSION
In our paper, we have outlined the types of data breaches, Challenges, and protection measures associated with database
management systems. We have also seen that there is recognised hike in data breaches over the years. In the year 2023, Financial
and healthcare institutions are the primary targets of data breach incidents. This is due to the fact that banks and insurance
companies hold a large amount of sensitive data and financial assets, while healthcare institutions handle critical missions and
collect sensitive information. We need further research to prevent data breaches as more data is made available electronically, it can
be assumed that threats and vulnerabilities to the integrity of that data will increase as well.
REFERENCES
[1] T.Connolly, C. Begg. “Database Systems A Practical Approach to Design, Implementation, and Management”, 4th ed., Ed. England: Person Education
Limited, 2005, pp. 542-547, 550-551.
[2] Almasri, O., & Jani, H. M. Introducing an Encryption Algorithm based on IDEA.
[3] Almasri, O., Jani, H. M., Ibrahim, Z., & Zughoul, O. (2013). Improving Security Measures of E-Learning Database. International Organization of Scientific
Research-Journal of Computer Engineering (IOSR-JCE), 10(4), 55-62.
[4] M. Murray, Coffin, "Database Security: What Students Need to Know." Journal of Information Technology Education, vol. 9, pp 61-77, 2010.
[5] A. Furmanyuk, M. Karpinskyy and B. Borowik, "Modern Approaches to the Database Protection," 2007 4th IEEE Workshop on Intelligent Data Acquisition
and Advanced Computing Systems: Technology and Applications, Dortmund, pp. 590-593, September 2007.
[6] P. B. Ambhore, B. B. Meshram, and V. B. Waghmare, "A Implementation of Object Oriented Database Security," 5th ACIS International Conference on
Software Engineering Research, Management & Applications (SERA 2007), Busan,vol. 7, pp. 359-365, , 2007.
[7] Ş. Mariuţa, "Principles of security and integrity of databases." Procedia Economics and Finance, Targul din Vale, Romania, vol. 15, pp. 401-405, October 2014.
[8] ILO Somtoochukwu F., Ubochi Chibueze and Osondu U. S. “CORE THREATS AND PREVENTION IN DATABASE SECURITY” wjert, 2019, Vol. 5, Issue
3, 535-551.
[9] Mubina Malik and Trisha Patel, “DATABASE SECURITY - ATTACKS AND CONTROL METHODS”, International Journal of Information Sciences and
Techniques (IJIST) Vol.6, No.1, March 2016.
[10] Adil Hussain Seh, Mohammad Zarour, Mamdouh Alenezi, Amal Krishna Sarkar, Alka Agrawal, Rajeev Kumar and Raees Ahmad Khan, “Healthcare Data
Breaches: Insights and Implications”, Healthcare (Basel). 2020 Jun; 8(2): 133.Published online 2020 May 13.
[11] https://www.statista.com/topics/11610/data-breaches-worldwide/#topicOverview(Accessed on 30 July 2024)
[12] https://secureframe.com/blog/data-breach-statistics (Accessed on 30 July 2024)
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 16