Database Security: An Overview and Analysis of Current Trend

Prince Mewada; Akanksha Kulkarni1

1

Publication Date: 2022/12/18

Abstract: Information is the middle and most essential asset the ones days. The undertaking which gives with Information is called Information Science. Information Science isliable for unique facts companion affairs from collection, selection, organization, processing, manipulate and dissemination of facts and contents. And for this facts related reasonInformation Technology performs a chief role. Information Technology has unique componentsviz. Database Technology, Web Technology, Networking Technology, Multimedia Technology and traditional Software Technology. All the ones generation are liable for growing and advancing society. Database Technology is concerned with the Database. It is really well worth to be conscious that, Database is concerned with the repository of related factsin a containeror base. The facts, in Database normally stored inunique office work and Database Technology play a lead role for dealing with the affairs related to database. The Database can be very important withinside the modern-day past due towider packages in unique businesses and institutions; now now not best profits making but moreover non earnings making. Today most businesses and sectors which deal with sensitive and important facts maintain them into the database and as a end result its safety becomes an important concern. Large scale database and its safety absolutely depend on unique defensive methods. This paper talks about the basics of database along with its meaning, characteristics,role etc. with particular interest on unique safety disturbing conditions withinside the database. Moreover, this paper highlights the basics of safety manipulate, gadget in this regard. Hence unique areas of database safety have stated in this paper in a clean sense.

Keywords: Database, Database Technology, Security Technology, IT Management, Information Networking, Privacy and Security Management, Trust Management, Cloud Computing

DOI: https://doi.org/10.5281/zenodo.7453560

PDF: https://ijirst.demo4.arinfotech.co/assets/upload/files/IJISRT22NOV856.pdf

REFERENCES

No References Available