dc.contributor.author |
Rijah, Muhammed |
|
dc.date.accessioned |
2022-01-11T06:17:21Z |
|
dc.date.available |
2022-01-11T06:17:21Z |
|
dc.date.issued |
2021-12 |
|
dc.identifier.citation |
Kalam, International Research Journal, Faculty of Arts and Culture,14(4), 2021. pp. 40-47. |
en_US |
dc.identifier.issn |
1391-6815, |
|
dc.identifier.issn |
2738-22 |
|
dc.identifier.uri |
http://ir.lib.seu.ac.lk/handle/123456789/5961 |
|
dc.description.abstract |
Database security alludes to keeping unauthorized users from getting into the data set and to its
core whether it is incidental or purposeful. Accordingly, every one of the organizations is giving
uncommon consideration to potential dangers as stepping into database systems. CIA security
triangle that notices the Confidentiality, Integrity, and Availability is normally holding the
fundamental idea behind database security. Confidentiality intends to stay discreet. Integrity
disappointment implies the information is adjusted and degenerate. Availability issues implies the
information, or framework, or both cannot be accessed. Corporate companies should contribute
time and exertion to distinguish and recognize the most genuine dangers. This research paper
assesses existing explorations and research challenges on this specific area. |
en_US |
dc.language.iso |
en_US |
en_US |
dc.publisher |
Faculty of Arts and Culture, South Eastern University of Sri Lanka, University Park, Oluvil. |
en_US |
dc.subject |
DBMS |
en_US |
dc.subject |
Threats |
en_US |
dc.subject |
CIA |
en_US |
dc.subject |
AES |
en_US |
dc.subject |
Security |
en_US |
dc.title |
Security analysis, threats, & challenges in database |
en_US |
dc.type |
Article |
en_US |