Header menu link for other important links
X
Database security for detecting and avoiding malicious transactions
S.K. Shaw, J. Shaw,
Published in International Journal of Pharmacy and Technology
2016
Volume: 8
   
Issue: 4
Pages: 26495 - 26505
Abstract
Data plays a vital role in today’s world as we use it in our day-to-day life. Any information stored in digital system is done in terms of data. The platform (base) that supports organization of these data is called the database. The importance of data lies in the fact that if it is altered or accessed abusively it can lead to unwanted and unintentional results. To avoid such issues we need some sort of Security mechanism that can well determine the threats and provide solutions against them. Database is susceptible to attacks due to its content (which may be classified) and volumes. There are several ways in which data security can be compromised. The database can be attacked either in a direct or indirect way. The agents who breach the various security levels are known as attackers. Again, the approaches taken by the attackers can be either categorised as active or passive depending upon the nature of the attack. Several methodologies and models have been implemented and designed for the purpose of avoiding such security issues. In this paper, we discuss the various issues related to the database security leading to malicious transactions and propose a mechanism to avoid such malicious activities. © 2016, International Journal of Pharmacy and Technology. All rights reserved.
About the journal
JournalInternational Journal of Pharmacy and Technology
PublisherInternational Journal of Pharmacy and Technology
ISSN0975766X