Wednesday, November 20, 2019

Database security Essay Example | Topics and Well Written Essays - 250 words

Database security - Essay Example is is not done, then databases are subjected to several threats that could lead to loss of integrity, loss of availability, and loss of confidentiality (IFIP, 2013). Privacy protection is both a personal and fundamental right for any individual. It is the right of every individual to hold the expectation that organizations that collect information will ensure confidentiality of personal information. One way in which this can be achieved is by ensuring that organizations will collect, maintain, utilize, and disseminate personal information and data only to the extent that is necessary to enable them perform their functions (Doyle & Bagaric, 2005). Privacy laws regulate how entities handle personal information. They also include obligations that govern the collection, use, disclosure, and access to personal information, requiring entities to observe reasonable measures for the protection of personal information in their possession from misuse, loss and from unauthorized access, use, modification or disclosure. The NIST triad for privacy is set under the above set of requirements for privacy. It is a model for information security that incorporates three main components namely confidentiality, integrity, and availability. Each of these components in the triad stresses a key objective for information security. Confidentiality requires that data is only availed to appropriate parties, integrity means the certainty that there is no tampering with the data prior to and after collection, and availability means that the data will be made available as and when needed (Nemati, 2008). IFIP TC11/WG 11.3 International Conference on Database Security, & In Jajodia, S. (2013). Database security XII: Status and prospects : IFIP TC11 WG11.3 Twelfth International Working Conference on Database Security, July 15-17, 1998, Chalkidiki,

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.