A summary and Review of the Current Trends in Database Security

Atul Singh Rathor; Akanksha Kulkarni1

1

Publication Date: 2022/12/17

Abstract: These times, data has become the most significant and central resource. Data Science is a field that studies the challenges that data presents. Data science is charged with specific issues related to data gathering, choice, organization, analysis, monitoring, and distribution. Computer technology also is an important factor in this statistic-related motivation. Data stores, website, internet technologies, communications technologies, and traditional programs are specialized additions to computer technology. Technology. All those technologies are answerable for developing and advancing society. Database Technology is involved with the Database. It isworth to be aware that, Database is involved with the repository of associated records in a box or base. The records, in Database usually saved in specific paperwork and Database Technology play a lead position for managing the affairs associated to database. The Database may be very essential with inside the current beyond because of wider programs in specific corporations and institutions; now no longer simplest earnings making however additionally nonprofit making. Today maximum corporations and sectors which address touchy and essential records hold them into the database and asa result its protection turns into an crucial consideration Database systems and their safety depend largely on particular safeguarding techniques. This essay discusses the principles of databases—their significance, traits, roles, etc. while focusing especially on the different security challenges that exist inside them. Moreover, this paper highlights the fundamentals ofprotection control, equipment on this regard. Hence specific regions of database protection have cited onthis paper in an easy sense.

Keywords: Database, data processing, security features, internet technology managing, user generated, data protection control, confidentiality, and cloud technology.

DOI: https://doi.org/10.5281/zenodo.7451589

PDF: https://ijirst.demo4.arinfotech.co/assets/upload/files/IJISRT22NOV677_(1).pdf

REFERENCES

No References Available