A Review on Database Security and Authorization
Keywords:
Attack, Database security, Threat, IntegrityAbstract
Data protection is vital to many secure systems, and majority of users rely on a database management system to
manage the protection. This work is all about the security of database management systems and user
authorization, as an example of how application security can be designed and implemented for specific task,
rights and privileges issued to different categories of users. There is considerable current interest in DBMS
Security because databases are newer than the programming and operating systems. Databases are important to many business and government organizations, in order to enable the retrieval and maintenance of data easy and efficient it is stored in a database. Database creation, organization and contents are considered valuable corporate assets that must be securely protected because databases are a favourite target for information thieves and attackers. The primary security requirements of database system are not unlike those of other computing system. The basic problems are database authorization; access control, exclusion of spurious data, authentication of users and reliability. In this work database authorization and the challenges and threats in database security are identified.