Open In App

Problems due to database unavailability

Improve
Improve
Like Article
Like
Save
Share
Report

Database security is known for the protection of the database against the unintended, accidental or the intentional threats. These threats may or may not be based on the computer. A threat is any situation or the event that will affect the database security and the functioning of the organization. The threat may cause a big loss to the organization. The unavailability of the database will highly affect the performance of the organization.

The unavailability would lead to great loss to the organization.

  1. Data security risks –
    Database security is the main part for the database of the entire organization. The organization must recognize all the factors that may lead to risks in future and all the elements that are weak of the database from the viewpoint of the database.

  2. Data tampering –
    Data tempering is the act of intentional modification of the data. The chances of the data tempering are more when the data is distributed because data moves from one site to another.So, the privacy is essential to secure the data so that it can’t be viewed or modified by the unintended user.

  3. Data theft –
    Data must be transferred and stored safely, so that some important information such as bank details can’t be stolen.

  4. False user identity –
    In distributed systems, the unintended users can easily gain access to the sensitive and important information by using a false identity. These unintended users can gain important information .They can steal bank details, unique codes that can be used somewhere else.

  5. Password related threats –
    In huge organizations users have to remember multiple passwords for different services they use for security concerns. Users can manage multiple passwords in following ways-

    • Users can use passwords that can be easily guessed.
    • Users may choose passwords that are same for each site or they may use standard passwords.

    However, multiple passwords are expensive, hard to manage and complex.


  6. Unauthorized Access to Tables and columns –
    The database may contain some data that is restricted by the unauthorized user. This data can be confidential tables, confidential rows or column. There should be a possibility of the protection for the confidential data.

  7. Lack of accountability –
    If the system administrator is not able to find users activities, then users can’t be held responsible for their activities. There should be a way to monitor all the actions being performed by the user.

  8. Complex user management requirements –
    System must be able to support a huge number of users and hence must the scalable. In large-scale system environments, the load of managing user accounts and passwords makes the system unprotected towards the attacks and errors.

  9. Last Updated : 02 Jun, 2020
    Like Article
    Save Article
    Previous
    Next
    Share your thoughts in the comments
Similar Reads