Please use this identifier to cite or link to this item:
http://ir.lib.seu.ac.lk/handle/123456789/5961
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Rijah, Muhammed | - |
dc.date.accessioned | 2022-01-11T06:17:21Z | - |
dc.date.available | 2022-01-11T06:17:21Z | - |
dc.date.issued | 2021-12 | - |
dc.identifier.citation | Kalam, International Research Journal, Faculty of Arts and Culture,14(4), 2021. pp. 40-47. | en_US |
dc.identifier.issn | 1391-6815, | - |
dc.identifier.issn | 2738-22 | - |
dc.identifier.uri | http://ir.lib.seu.ac.lk/handle/123456789/5961 | - |
dc.description.abstract | Database security alludes to keeping unauthorized users from getting into the data set and to its core whether it is incidental or purposeful. Accordingly, every one of the organizations is giving uncommon consideration to potential dangers as stepping into database systems. CIA security triangle that notices the Confidentiality, Integrity, and Availability is normally holding the fundamental idea behind database security. Confidentiality intends to stay discreet. Integrity disappointment implies the information is adjusted and degenerate. Availability issues implies the information, or framework, or both cannot be accessed. Corporate companies should contribute time and exertion to distinguish and recognize the most genuine dangers. This research paper assesses existing explorations and research challenges on this specific area. | en_US |
dc.language.iso | en_US | en_US |
dc.publisher | Faculty of Arts and Culture, South Eastern University of Sri Lanka, University Park, Oluvil. | en_US |
dc.subject | DBMS | en_US |
dc.subject | Threats | en_US |
dc.subject | CIA | en_US |
dc.subject | AES | en_US |
dc.subject | Security | en_US |
dc.title | Security analysis, threats, & challenges in database | en_US |
dc.type | Article | en_US |
Appears in Collections: | Volume 14 Issue 4 |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
K2021_ISSUE-4 (40-47).pdf | 306.17 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.