A COMPREHENSIVE ANALYSIS OF CURRENT TRENDS IN DATA SECURITY
Keywords:
Database Security, Ai, Blockchain, User Behavior Analytics, Threats And Attacks, Security Policy Implementation, CybersecurityAbstract
In contemporary society, information stands as a paramount and indispensable asset. The field dedicated to the study of information is known as Information Science. Information Science encompasses various aspects of information management, spanning from the collection, selection, organization, processing, and management to the dissemination of information and content. Information Technology, a pivotal player in this domain, comprises distinct components such as Database Technology, Web Technology, Networking Technology, Multimedia Technology, and traditional Software Technology. Each of these technologies contributes to the evolution and functionality of our society.
Database Technology, a subset of Information Technology, is particularly concerned with databases. Notably, a database serves as a repository for interconnected data housed within a structured container or base. The data stored in a database assumes diverse forms, and Database Technology assumes a central role in addressing matters related to databases. The significance of databases has surged in recent times, finding applications in a myriad of organizations and institutions, encompassing both profit-making and non-profit sectors.
Today, numerous organizations and sectors entrusted with sensitive and crucial data opt to store such information within databases, elevating the significance of database security. The security of large-scale databases relies heavily on diverse defensive mechanisms. This paper delves into the fundamentals of databases, exploring their meaning, characteristics, and role, with a particular emphasis on the various security challenges encountered in the database realm.
This paper sheds light on the foundational aspects of security management and the tools employed in safeguarding databases. It comprehensively addresses different dimensions of database security in a straightforward manner, providing insights into the multifaceted landscape of securing valuable information in contemporary databases.
References
Said, H. E., Guimaraes, M. A., Maamar, Z., & Jololian, L. (2009). Database and database application security. ACM SIGCSE Bulletin, 41(3), 90-93.
IBM. What is data security? Why data security is vital for the well-being of any enterprise today. https://www.ibm.com/topics/data-security
Dhawan, M., Purohit, L., & Gupta, N. (2023, February 16). A Comprehensive Study on the Latest Trends of Cyber Security in the Medical Management. Proceedings of the International Conference on Innovative Computing & Communication (ICICC) 2022.
Vinay, S. B., & Balasubramanian, S. (2023). A Comparative Study of Convolutional Neural Networks and Cybernetic Approaches on CIFAR-10 Dataset. International Journal of Machine Learning and Cybernetics (IJMLC), 1(1), 1-12. doi: https://doi.org/0.17605/OSF.IO/QY32B
Neto, A. A., Vieira, M., & Madeira, H. (2009). An appraisal to assess the security of database configurations. In 2009 Second International Conference on Dependability (pp. 73-80). IEEE.
George, B., & Valeva, A. (2006). A database security course on a shoestring. In ACM SIGCSE Bulletin (Vol. 38, No. 1, pp. 7-11). ACM.
AL-Sammarraie, A. H. K. (2018). The Behavior of Databases in Maintaining the Security of Data Transferred Between Two Communication Points. International Journal of Civil Engineering and Technology, 9(1), 126-139.
Mathieu, R. G., & Khalil, O. (1998). Data quality in the database systems course. Data Quality Journal, 4(1), 1-12*.
Ramachandran, K. K. (2024). Data Science in the 21st Century: Evolution, Challenges, and Future Directions. International Journal of Business and Data Analytics (IJBDA), 1(1), 1-13*.
Ramachandran, K. K. (2023). The Use of Data Mining in Education: An Overview of State of The Art, Limitations, and Emerging Research Areas. International Journal of Data Analytics Research and Development (IJDARD), 1(1), 1–8. doi: https://doi.org/10.17605/OSF.IO/YQS9X
Smith, G. W. (1991). Modeling security-relevant data semantics. IEEE Transactions on Software Engineering, (11), 1195-1203.
Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness. MIS Quarterly, 34(3), 523-548.
Sharma, A., & Mishra, P. (2013). E-Business Transaction Security: Changing Trends in Database Security-Critical Review. International Journal of Computer Engineering and Technology (IJCET), 4(6), 175-180.
Khankhoje, Rohit. (2023). An In-Depth Review of Test Automation Frameworks: Types and Trade-offs. International Journal of Advanced Research in Science, Communication and Technology. vol. 3, no. 1, pp. 55-64. DOI: 10.48175/IJARSCT-13108.
Vinay, S. B. (2023). Application of Artificial Intelligence (AI) In School Teaching and Learning Process- Review and Analysis. International Journal of Information Technology and Management Information Systems (IJITMIS), 14(1), 1-5. doi: https://doi.org/10.17605/OSF.IO/AERNV.
Li, Y., Stweart, W., Zhu, J., & Ni, A. (2012). Online privacy policy of the thirty Dow Jones corporations: Compliance with FTC Fair Information Practice Principles and readability assessment. Communications of the IIMA, 12(3), 5.
Khankhoje, Rohit. (2023). AI -Based Test Automation for Intelligent Chatbot Systems. International Journal of Science and Research (IJSR). Vol. 12, Iss. 12, pp. 1302-1309. DOI: 10.21275/SR231216065308.
Ramachandran, M., & Guimaraes, M. (2008). Expanding the database curriculum. Journal of Computing Sciences in Colleges, 23(3), 69-75.
Krishnan, V., McCalley, J. D., Henry, S., & Issad, S. (2011). Efficient database generation for decision tree based power system security assessment. IEEE Transactions on Power Systems, 26(4), 2319-2327*.
AL-Sammarraie, A. H. K. (2018). The Behavior of Databases in Maintaining the Security of Data Transferred Between Two Communication Points. International Journal of Civil Engineering and Technology, 9(1), 126-139.
Murray, M., & Guimaraes, M. (2010). Database security: What students need to know. Journal of Information Technology Education: Innovations in Practice, 9, IIP-61.
Murugavel, R. (2017). Information Systems Software Quality: An Overview. International Journal of Mechanical Engineering and Technology, 8(9), 205–225.
Chinnaraj.T, A study on automation in hospitality industry, International Journal of Management (IJM), 14(7), 2023, pp. 154-157.
Dr. K. Vasudevan, Applications of Artificial Intelligence in Power Electronics and Drives Systems: A Comprehensive Review, Journal of Power Electronics (JPE), 1(1), 2023, pp. 1–14 doi: https://doi.org/10.17605/OSF.IO/68SQR
Published
Issue
Section
License
Copyright (c) 2024 Nivedhaa N (Author)
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.