{"title":"数据库系统安全措施综述:评估认证、访问控制等","authors":"Habeeb Omotunde, Maryam Ahmed","doi":"10.58496/mjcsc/2023/016","DOIUrl":null,"url":null,"abstract":"This paper presents a comprehensive review of security measures in database systems, focusing on authentication, access control, encryption, auditing, intrusion detection, and privacy-enhancing techniques. It aims to provide valuable insights into the latest advancements and best practices in securing databases. The review examines the challenges, vulnerabilities, and mitigation strategies associated with database security. It explores various authentication methods, access control models, encryption techniques, auditing and monitoring approaches, intrusion detection systems, and data leakage prevention mechanisms. The paper also discusses the impact of emerging trends such as cloud computing, big data, and the Internet of Things on database security. By synthesizing existing research, this review aims to contribute to the advancement of database security and assist organizations in protecting their sensitive data.","PeriodicalId":369414,"journal":{"name":"Mesopotamian Journal of Cyber Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"A Comprehensive Review of Security Measures in Database Systems: Assessing Authentication, Access Control, and Beyond\",\"authors\":\"Habeeb Omotunde, Maryam Ahmed\",\"doi\":\"10.58496/mjcsc/2023/016\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper presents a comprehensive review of security measures in database systems, focusing on authentication, access control, encryption, auditing, intrusion detection, and privacy-enhancing techniques. It aims to provide valuable insights into the latest advancements and best practices in securing databases. The review examines the challenges, vulnerabilities, and mitigation strategies associated with database security. It explores various authentication methods, access control models, encryption techniques, auditing and monitoring approaches, intrusion detection systems, and data leakage prevention mechanisms. The paper also discusses the impact of emerging trends such as cloud computing, big data, and the Internet of Things on database security. By synthesizing existing research, this review aims to contribute to the advancement of database security and assist organizations in protecting their sensitive data.\",\"PeriodicalId\":369414,\"journal\":{\"name\":\"Mesopotamian Journal of Cyber Security\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-08-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Mesopotamian Journal of Cyber Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.58496/mjcsc/2023/016\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Mesopotamian Journal of Cyber Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.58496/mjcsc/2023/016","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Comprehensive Review of Security Measures in Database Systems: Assessing Authentication, Access Control, and Beyond
This paper presents a comprehensive review of security measures in database systems, focusing on authentication, access control, encryption, auditing, intrusion detection, and privacy-enhancing techniques. It aims to provide valuable insights into the latest advancements and best practices in securing databases. The review examines the challenges, vulnerabilities, and mitigation strategies associated with database security. It explores various authentication methods, access control models, encryption techniques, auditing and monitoring approaches, intrusion detection systems, and data leakage prevention mechanisms. The paper also discusses the impact of emerging trends such as cloud computing, big data, and the Internet of Things on database security. By synthesizing existing research, this review aims to contribute to the advancement of database security and assist organizations in protecting their sensitive data.