Database Security: An Inventory of Threats, Vulnerabilities, and Security Solutions

dc.contributor.authorNichols, Ryan
dc.date.accessioned2008-11-03T22:24:25Z
dc.date.available2008-11-03T22:24:25Z
dc.date.issued2007-06
dc.descriptionx, 59 p. This paper was completed as part of the final research component in the University of Oregon Applied Information Management Master's Degree Program [see htpp://aim.uoregon.edu].en
dc.description.abstractDatabases are being compromised today at an alarming rate (Britt 2007). This content analysis study provides database administrators and security managers with an inventory of five common threats to and six common vulnerabilities of databases of large corporations when more than 1000 devices require security management (Whitman and Mattord 2004), aligning these threats with potential security solutions. As noted by Vizard (2007), while companies are becoming adept at fighting data breaches, attacks are gaining in sophistication.en
dc.identifier.urihttps://hdl.handle.net/1794/7680
dc.relation.ispartofseriesAIM Capstone 2007;Ryan Nichols
dc.subjectSecurity managementen
dc.subjectData breachesen
dc.subjectApplied Information Managementen
dc.subjectDataen
dc.subjectSecurity managersen
dc.subjectDatabase administratorsen
dc.subjectAIMen
dc.titleDatabase Security: An Inventory of Threats, Vulnerabilities, and Security Solutionsen
dc.typeOtheren

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
2007-nichols.pdf
Size:
533.08 KB
Format:
Adobe Portable Document Format
Description:
AIM Terminal Project
License bundle
Now showing 1 - 1 of 1
Name:
license.txt
Size:
1.79 KB
Format:
Item-specific license agreed upon to submission
Description: