Within the past decade, there has been a tremendous growing need for web servers and databases; also their related service and the two concepts have hit the headlines as the most researched knowledge domains in the technology sphere. Subsequently, this has revolutionized the way many people interact with one another through effective information sharing. This rapid spread and the management effectiveness of advanced technologies are establishing great opportunities for development of distributed system at a large scale. Although, this remarkable growth has also come with some security concerns which need to be carefully handled because some of data available in these platforms is really vulnerable as well as sensitive. For instance business now days have turned to ecommerce platforms to tap the increasing number of Internet user but the industry need to address several security concerns to ensure the safety of their customer and transaction as well. Customers credit cards used for online payments are highly exposed to online attacks such as hacking and needs to be secured.
Database is a generic term used to connote the collection of similar or related information/data in an organized and integrated manner such that can be easily accessed managed and updated. Kroenke 2010 refers to database as a collection of tables plus relationships among rows in those tables, plus special data (metadata) that describes the structure of the database. On the other hand, web server refers to the software, hardware, and networks that help in delivering digital or web content via Internet to users.
As Faubl 2011 asserts, databases are mainly created for three core functions; to organize, store, and retrieve information in a more effective and effic...
... middle of paper ...
...ed to them on demand through the Internet from the provider. The latter is more of depicting an online concept while the former can take both online and offline prototypes.
However, these forms of data representation or structure are prone to multitude of possible threats/attacks due to the mode of accessibility. Common attack in this has been the denial of service (DoS) attack. This type is more linked to the Web server allowing access to the database, but can also be attached to database itself. A couple of measures can be implemented such as use of firewall to secure the web servers as well as the databases. The information sent and accessed over the distributed systems or network can be made secure by number of ways; authentication certificates, use of secure sockets and primarily help to prevent the attack from collecting information through network sniffing.
Denial of Service attacks (DoS) or Distributed Denial of Service Attacks (DDoS), have been around for many years, but only in the past few years have the frequency and magnitude of these attacks increased. They are a significant problem because they can shut an organization off from the Internet for extended periods of time and little can be done to stop them. DoS attacks occur when computer resources become unavailable to legitimate users after being exhausted by false requests for information (Houle and Weaver 1).
The first database systems were based on the network and hierarchical models. A database can be defined as a collection of non-redundant data which can be shared by different application systems. A database implies separation of physical storage from use of the data by an application program to achieve program/data independence. Using a database system, the user or programmer or application specialist need not know the details of how the data are stored and such details are usually "transparent" to the user. .
Security is a wide concept, it is a separated subject with its own theories, "which focus on the process of attack and on preventing, detecting and recovering from attacks" (William 1996). Certainly, these processes should be well organized in coping with the complex system issues. A coherent approach should be taken, which builds on established security standards, procedu...
This paper was written to show the similarities and differences in five different databases. It compared Access, MySQL, SQL Server, DB2, and Oracle in six different areas. It found many similarities in functionality, but large diversity in pricing.
Over the past few years, Internet-enabled businesses, or e-businesses, have drastically improved efficiency and revenue growth. E-business applications such as e-commerce, supply-chain management, and remote access allow companies to streamline processes, lower operating costs, and increase customer satisfaction. Such applications require mission-critical networks that accommodate voice, video, and data traffic, and these networks must be scalable to support increasing numbers of users and the need for greater data. capacity and performance of the system. However, as networks enable more and more applications and are available to more and more users, they become ever more vulnerable to a wider range of security threats.
The sole purpose of existence of such databases is approach to simplicity in design, better horizontal scaling and greater control over the availability of data. See Figure 3 for scaling. The use of other means of storing data and different access mechanism, provide faster access to data based on the problem which the organization aims and this is also the reason NoSQL databases is famous for use in big-data and real-time web applications.
System performance is one of the most critical issues faced by companies dealing with vast amounts of data. Companies use database systems and their applications to store, retrieve and handle this data.
Within the last decade, the internet has proven to be the most efficient way to complete tasks in today’s society. Every major business in today’s society relies on the internet to conduct business. Though the internet is a useful tool, our reliability on it opens up the door for cyber-attacks that can be detrimental to business as a whole. One example of a cyber-attacks that have recently started becoming more prevalent are DDoS attacks. Recently, DDoS attacks have been a rising issue for businesses owners who run their own servers, such as video game companies and other high profile web servers, including banks and other credit card payment gateways.
The ability to conduct warfare through technological methods has increased information security awareness and the need to protect an entity's infrastructure. Subsequently, cyber warfare produces increased risk to security practitioners that employ technology and other methods to mitigate risks to information and the various systems that hold or transmit data. A significant risk to information lies in the conduct of electronic commerce, hereinafter called e-commerce. E-commerce is the purchasing or selling of goods and/or services through the internet or other electronic means (Liu, Chen, Huang, & Yang, 2013). In this article, the researchers will discuss cyber warfare risks, present an evaluation of established security measures, identify potential victims of identity theft, and present an examination of the security of e-commerce companies....
In the world of database technology, there are two main types of databases: SQL and NoSQL—or, relational databases and non-relational databases. The difference speaks to how they’re built, the type of information they store, and how they store it. Relational databases are structured, like phone books that store phone numbers and addresses.
The reason for the selection of this topic is because it falls under the computer science category. We have been studying databases for four years and so the this topic area will be of great use when venturing into the cooperate world.
Databases’ have become a instrumental component within the information technology community, but securing databases has become a issue that reigns supreme throughout all industries and organizations that operate daily by utilizing the rewards offered thru their utilization. There are a number of database applications available for use, but with the use of a database: security, cost, skilled human resources, and scalability must all be factored into the overall selection process.
Numerous web applications are vulnerable to attack because of unsecure code. Common attacks are SQL injection and XSS. The aim of this project is to identify vulnerabilities in source code, then attack the vulnerabilities, and finally, fix the errors to make the code secure. The input fields in the register and login pages of a basic web application will be used to demonstrate the attacks used. The attacks used in the report are SQL injection and XSS. SQL injection will be fixed using PHP Data Objects (PDO) prepared statements and the XSS vulnerabilities will be fixed using htlmentities.
The Database Management System (DBMS) is software that enables the users to define, create, maintain and control the access to the database. It is a software that interact with the user’s applications programs and it database. Meanwhile, information retrieval system is a system that involved the activity that the systems obtain the information. The obtaining information action need the information from it resources.
In our world, people rely heavily on the power of technology every day. Kids are learning how to operate an iPad before they can even say their first word. School assignments have become virtual, making it possible to do anywhere in the world. We can receive information from across the world in less than a second with the touch of a button. Technology is a big part of our lives, and without it life just becomes a lot harder. Just like our phones have such an importance to us in our daily lives, database management systems are the same for businesses. Without this important software, it would be almost impossible for companies to complete simple daily tasks with such ease.