Database Security: An Inventory of Threats, Vulnerabilities, and Security Solutions

Show simple item record

dc.contributor.author Nichols, Ryan
dc.date.accessioned 2008-11-03T22:24:25Z
dc.date.available 2008-11-03T22:24:25Z
dc.date.issued 2007-06
dc.identifier.uri http://hdl.handle.net/1794/7680
dc.description x, 59 p. This paper was completed as part of the final research component in the University of Oregon Applied Information Management Master's Degree Program [see htpp://aim.uoregon.edu]. en
dc.description.abstract Databases are being compromised today at an alarming rate (Britt 2007). This content analysis study provides database administrators and security managers with an inventory of five common threats to and six common vulnerabilities of databases of large corporations when more than 1000 devices require security management (Whitman and Mattord 2004), aligning these threats with potential security solutions. As noted by Vizard (2007), while companies are becoming adept at fighting data breaches, attacks are gaining in sophistication. en
dc.relation.ispartofseries AIM Capstone 2007;Ryan Nichols
dc.subject Security management en
dc.subject Data breaches en
dc.subject Applied Information Management en
dc.subject Data en
dc.subject Security managers en
dc.subject Database administrators en
dc.subject AIM en
dc.title Database Security: An Inventory of Threats, Vulnerabilities, and Security Solutions en
dc.type Other en


Files in this item

Files Size Format View Description
2007-nichols.pdf 533.0Kb PDF View/Open AIM Terminal Project

This item appears in the following Collection(s)

Show simple item record