DATABASE SECURITY: THREATS AND PREVENTIVE MEASURES

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Database Security Threats and Challenges in Database Forensic: A Survey

Relational Database Management Systems (RDBMS) is collection of applications that manage the storage, retrieval, and manipulation of database data. At the industry level SQL Server, Oracle, Sybase, DB2, MySQL, and other popular database applications are widely accepted as RDBMSs. As in the current scenario large data security breaches are occurring at a very high rate so we aim here to excavate...

متن کامل

Unveiling the Mask of Phishing: Threats, Preventive Measures, and Responsibilities

Phishing, a new-rise identity fraud of this century has already caused huge financial loss and social disorder. This paper provides an overview of the evolution and forecasted trend of phishing activities with detailed analysis on common phishing features, proliferation channels, relevant anti-phishing measures, related legislation, and an anti-phishing framework from the perspective of social ...

متن کامل

Mobile Agent Systems, Recent Security Threats and Counter Measures

Mobile agent technology offers a dramatically evolving computing paradigm in which a program, in the form of a software agent, can suspend its execution on a host computer, transfers itself to another agent-enabled host on the network, and resumes execution on the new host. It is 1960's since mobile code has been used in the form of remote job entry systems. Today's mobile agents can be charact...

متن کامل

Threats and Security Measures for Systems Using Mobile Agents

The main disadvantage of using the mobile agents is that they are vulnerable to attacks from di¤erent entities on the network like the host or another agent itself. The agents move around in the network from one host to other. While on transit they might be subject to tampering. When the agent is executing on a host, it is at total mercy of that host. The malicious hosts can tamper with the pri...

متن کامل

asean and new security threats

association of southeast asia nations (asean) was created in 1967 in order to prevent the threat of communism in southeast asia. but, over time, new states joined it and goals and activities of this organization expanded to other areas such as economic, commercial, political and cultural ones. thus, over time, cooperation between members expanded in a way today this regional organization is con...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Advanced Information Systems

سال: 2018

ISSN: 2522-9052

DOI: 10.20998/2522-9052.2018.1.13