Please use this identifier to cite or link to this item: http://ir.lib.seu.ac.lk/handle/123456789/5961
Full metadata record
DC FieldValueLanguage
dc.contributor.authorRijah, Muhammed-
dc.date.accessioned2022-01-11T06:17:21Z-
dc.date.available2022-01-11T06:17:21Z-
dc.date.issued2021-12-
dc.identifier.citationKalam, International Research Journal, Faculty of Arts and Culture,14(4), 2021. pp. 40-47.en_US
dc.identifier.issn1391-6815,-
dc.identifier.issn2738-22-
dc.identifier.urihttp://ir.lib.seu.ac.lk/handle/123456789/5961-
dc.description.abstractDatabase security alludes to keeping unauthorized users from getting into the data set and to its core whether it is incidental or purposeful. Accordingly, every one of the organizations is giving uncommon consideration to potential dangers as stepping into database systems. CIA security triangle that notices the Confidentiality, Integrity, and Availability is normally holding the fundamental idea behind database security. Confidentiality intends to stay discreet. Integrity disappointment implies the information is adjusted and degenerate. Availability issues implies the information, or framework, or both cannot be accessed. Corporate companies should contribute time and exertion to distinguish and recognize the most genuine dangers. This research paper assesses existing explorations and research challenges on this specific area.en_US
dc.language.isoen_USen_US
dc.publisherFaculty of Arts and Culture, South Eastern University of Sri Lanka, University Park, Oluvil.en_US
dc.subjectDBMSen_US
dc.subjectThreatsen_US
dc.subjectCIAen_US
dc.subjectAESen_US
dc.subjectSecurityen_US
dc.titleSecurity analysis, threats, & challenges in databaseen_US
dc.typeArticleen_US
Appears in Collections:Volume 14 Issue 4

Files in This Item:
File Description SizeFormat 
K2021_ISSUE-4 (40-47).pdf306.17 kBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.