0% found this document useful (0 votes)
156 views

Chapter-3 - Database Security

The document discusses database security threats. It identifies several types of threats including unauthorized access, data modification, program alteration, inadequate policies, wiretapping, hacking, and introduction of viruses. The threats can result in tangible harm like data or hardware loss, or intangible harm like loss of credibility. An organization should identify major threats and have countermeasures and contingency plans to minimize the impact of threats succeeding.

Uploaded by

Abdul Hameed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
156 views

Chapter-3 - Database Security

The document discusses database security threats. It identifies several types of threats including unauthorized access, data modification, program alteration, inadequate policies, wiretapping, hacking, and introduction of viruses. The threats can result in tangible harm like data or hardware loss, or intangible harm like loss of credibility. An organization should identify major threats and have countermeasures and contingency plans to minimize the impact of threats succeeding.

Uploaded by

Abdul Hameed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Chapter-3 - Database Security

• Lecture-2
• Database Security Threats
• Aug 13, 2020 Thursday
Database Security Threats
• Security threat is any situation or event, whether intentional or
accidental, that may adversely affect a system and consequently the
organization.
• A threat may be caused by a situation or event involving a person,
action, or circumstance that is likely to bring harm to an organization.
• The harm may be tangible, such as loss of hardware, software, or data
• Or the harm may be intangible, such as loss of credibility or client
confidence.
Database Security Threats
• The problem facing any organization is to identify all possible threats.
• Therefore, as a minimum an organization should invest time and
effort in identifying the most serious threats.
• Any threat must be viewed as a potential breach of security which, if
successful, will have a certain impact.
• The following are the various types of threats.
Database Security Threats
• Using another person’s means of access
• Unauthorized amendment or copying of data
• Program alteration
• Inadequate policies and procedures that allow a mix of confidential
and normal output
• Wire tapping
• Illegal entry by hacker
Database Security Threats
• Creating ‘trapdoor’ into system
• Theft of data, programs, and equipment
• Failure of security mechanisms, giving greater access than normal
• Staff shortages or strikes
• Inadequate staff training
• Viewing and disclosing unauthorized data
Database Security Threats
• Electronic interference and radiation
• Data corruption owing to power loss or surge Fire (electrical fault,
lightning strike, arson), flood, bomb
• Physical damage to equipment
• Breaking cables or disconnection of cables
• Introduction of viruses
Database Security Threats
• The extent that an organization suffers as a result of a threat’s
succeeding depends upon a number of factors, such as the existence
of countermeasures and contingency plans.
• For example, if a hardware failure occurs corrupting secondary
storage, all processing activity must cease until the problem is
resolved.
• The recovery will depend upon a number of factors, which include
when the last backups were taken and the time needed to restore the
system.
Database Security Threats
• Obviously, it may not be cost-effective to spend considerable time,
effort, and money on potential threats that may result only in minor
inconvenience
• However, those events should be taken into account, particularly if
their impact would be significant.

You might also like