Study on Database Security and Encryption
Keywords:
Breaches, Cryptography, DoS, Database, Encryption, Encryption and Access Control, SQL, Rootkits, SecurityAbstract
Data is a lot of or less a part of today’s lifetime of a company, Enterprise, State and Country. High of agenda is to safeguard the information from getting in wrong hands. Selecting information for an entity is a crucial call that might save from future embarrassments and loss - be it socially or commercially. Open supply and industrial databases area unit on the market within the market whereby the latter isn't viable commercially. This survey paper describes regarding the information threats, numerous ploys and appropriate techniques to counter them. There are unit several threats in information that leaks the data for prohibited purpose. The most threats in information security area unit Excessive Privilege Abuse, Legitimate Privilege Abuse, Privilege Elevation, information Platform Vulnerabilities, SQL Injection, Weak Audit path, Denial of Service, information Communication Protocol Vulnerabilities, Weak Authentication and Backup knowledge Exposure. The most vital methodology to secure information from attackers/intruders area unit Cryptography, Steganography and Access management. This survey was conducted to spot the problems and threats in information security, needs of information security, and the way secret writing is employed at completely different levels to produce the protection.
Over the years numerous secret writing schemes are developed so as to safeguard the information from numerous attacks by the intruders. This paper conjointly discusses the importance of information secret writing and makes an exhaustive review of varied information secret writing techniques and compare them on basis of their deserves and demerits.