Abstract

At present in our digital world, data comes and leaves cyberspace at huge rates. A representative organization transfers millions of email messages and downloads, stores, and transmits millions of data sets via various channels on a regular basis. Companies always hold private data of customers, stake holders, industry partners, regulators and they expect them to protect. Unfortunately, today’s industries constantly fall victim to massive data loss, and high-profile data leakages involving sensitive personal and corporate data continue to appear (http://opensecurityfoundation.org). Loss of data could significantly damage a company’s goodwill and reputation and could also invite legal issues or regulatory consequences for negligent security. That’s why, organizations should take measures to manage the sensitive data they carried out, how it’s restricted, and how to prevent the loss from being leaked or compromised. In this respect, over the years the database security community has developed a number of different techniques and approaches to assure data confidentiality, integrity, and availability[14]. Thus data loss prevention and in particular protection of data from unauthorized accesses remain important goal of any data management system. Multi Category Security labeling from a user and system administrator standpoint is straightforward. It consists of configuring a set of categories, which are simply text labels, such as "Company_Confidential" or "Medical_Records", and then assigning users to those categories. The system administrator first configures the categories, then assigns users to them as required. The users can then use the labels as they see fit. A system in a home environment may have only one category of "Private", and be configured so that only trusted local users are assigned to this category. In this paper, we first survey the most relevant concepts underlying the notion of database security, types of losses and summarize the menaces to databases and different categories of vulnerabilities in database. This paper focused on Virtual private database, stops various sensitive data from leaving the corporation’s private confines. This paper illustrates and demonstrates how to enable mutli-level access restrictions which ensures accuracy and security,

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.