scholarly journals A Review of Database Security Concepts, Risks, and Problems

2021 ◽  
Vol 5 (2) ◽  
pp. 38-46
Author(s):  
Ramyar Abdulrahman Teimoor

Currently, data production is as quick as possible; however, databases are collections of well-organized data that can be accessed, maintained, and updated quickly. Database systems are critical to your company because they convey data about sales transactions, product inventories, customer profiles, and marketing activities. To accomplish data manipulation and maintenance activities the Database Management System considered. Databases differ because their conclusions based on countless rules about what an invulnerable database constitutes. As a result, database protection seekers encounter difficulties in terms of a fantastic figure selection to maintain their database security. The main goal of this study is to identify the risk and how we can secure databases, encrypt sensitive data, modify system databases, and update database systems, as well as to evaluate some of the methods to handle these problems in security databases. However, because information plays such an important role in any organization, understanding the security risk and preventing it from occurring in any database system require a high level of knowledge. As a result, through this paper, all necessary information for any organization has been explained; in addition, also a new technological tool that plays an essential role in database security was discussed.

2021 ◽  
Vol 35 (35) ◽  
pp. 82-99
Author(s):  
Kaisa Liekovuori ◽  
Samu Rautio ◽  
Aatu Härkönen

Background: The current research brings up the perspective of security-critical information systems in shared parameter databases in the context of processing sensitive data at Finnish Naval Warfare Centre. It refers to the environment of isolated military war gaming simulation and modeling systems. The research problem is: How to make an optimal solution for data distribution in different military war gaming simulation and modeling software? Objectives: The objective is to create a single shared database usable with different detail level software, e.g. high-level scenario simulation, technical system-of-system simulations, and system-level physical simulations. Methods: The methods are modeling, simulation and operation analysis. The approach is inductive, the strategy is a qualitative case study and the data collection was implemented by exploring database models and their combinations. The integration was implemented in an object-relational database management system (ORDBMS), PostgreSQL. Results: The shared database led to efficient access to simulation parameters, more straightforward system integration and improved scalability. Conclusions: The results of modeling and simulation indicated that the integration is possible to implement.


Author(s):  
Oksana Yakymchuk

The formation of a powerful, active, and dynamic axiological foundation of personality is one of the essential tasks of the competency approach because even a high level of knowledge and skills acquired in the process of learning and education cannot ensure the integrity and progressively oriented unity of personal and professional competencies for future successful life, socio-cultural and professional self-realization. Given this, within the competence paradigm of education, qualitatively new content is the unity of learning and education. If before a significant amount of theoretical knowledge, detached from real life, had a shallow educational potential, now any pedagogical action, even focused on the cognitive assimilation of basic scientific knowledge, will have a worldview. An essential characteristic of the competency approach in education is that it can ensure each student’s unique structure the unity of knowledge, competencies, and values.


Author(s):  
Heri Akhmadi ◽  
Muhammad Fauzan

Smartphone is one of the information technology devices that widely used by traders in marketing activities. Aside from being a communication tool, traders also utilize smartphones to obtain market information and communicate about products and services to consumers. This study aims to analyze profile and perceptions of fruit traders in using smartphones as a marketing communication tool. This research employed quantitative method and descriptive analysis using five point Likert scale to examine  the  perception of fruit traders in Yogyakarta City. The results revealed that traders adopted smartphones on fruit marketing communication due to it perceived to provide a relative advantage, with a high level of ease of use, visible benefits, and low complexity and risk. Furthermore, Samsung, Telkomsel, and WhatsApp were brands of smartphones, telecommunications providers, and social media applications mostly chose by traders.


2021 ◽  
Vol 1 ◽  
pp. 84-90
Author(s):  
Rustam Kh. Khamdamov ◽  
◽  
Komil F. Kerimov ◽  

Web applications are increasingly being used in activities such as reading news, paying bills, and shopping online. As these services grow, you can see an increase in the number and extent of attacks on them, such as: theft of personal information, bank data and other cases of cybercrime. All of the above is a consequence of the openness of information in the database. Web application security is highly dependent on database security. Client request data is usually retrieved by a set of requests that request the application user. If the data entered by the user is not scanned very carefully, you can collect a whole host of types of attacks that use web applications to create security threats to the database. Unfortunately, due to time constraints, web application programmers usually focus on the functionality of web applications, but only few worry about security. This article provides methods for detecting anomalies using a database firewall. The methods of penetration and types of hacks are investigated. A database firewall is proposed that can block known and unknown attacks on Web applications. This software can work in various ways depending on the configuration. There are almost no false positives, and the overhead of performance is relatively small. The developed database firewall is designed to protect against attacks on web application databases. It works as a proxy, which means that requests for SQL expressions received from the client will first be sent to the developed firewall, rather than to the database server itself. The firewall analyzes the request: requests that are considered strange are blocked by the firewall and an empty result is returned to the client.


2019 ◽  
Vol 13 (01) ◽  
Author(s):  
Kaustubh Jain ◽  
Jinendra Kumar Jain

The massive Indian market is changing fast. The pace of change is rapid with digital channels and constantly growing with volume and strength perpetually. Digital Marketing is really the High buzz in current scenario. It is one of those sectors in the marketing industry which is considered to be an experience an exponential growth due to this it makes studying about digital really interesting. At a high level, digital marketing refers to advertising of brands delivered through Businesses leverage digital channels such as search engines, mobile applications, website sales, social media, various e-mails to connect with current and prospective customers digitally. The term digital covers a wide range of marketing activities in current era, all of which are still not universally agreed upon, the current research focuses on the most common types of research which is known as exploratory research towards Digital Marketing in India. This issue raised is rarely been addressed by the academicians and researchers in Bhopal. The study used digital marketing parameters to measure the awareness and effectiveness of digital marketing among marketing professionals in Bhopal.


2021 ◽  
Vol 1 (Volume 1 No 1) ◽  
pp. 71-79
Author(s):  
Sri Sarwendah ◽  
Syarif Suwondo ◽  
Irena Nisa Harliani

ABSTRACT Universal precautions are one way to prevent the transmission of disease, which is transmitted by blood and all body fluids, including saliva, either from the patient to health worker and from patient to another patient. Patients should be treated as infected with the disease and potentially infectious every time. This action should be done by all health care staff in the risk of cross-infection between patients, and health workers can be minimized. Basic universal precautions include immunization, hand washing, personal protective equipment, medical equipment management, and hospital waste management. This study aims to describe the level of knowledge about universal precautions in postgraduate students Faculty of Dentistry Universitas Jenderal Achmad Yani Cimahi (Unjani). This study used a descriptive design by cross-sectional. Collection data for research using a questionnaire containing 20 questions tested for validity and reliability, then a questionnaire filled out by respondents as many as 40 people. Presentation of research data is processed and presented to illustrate the level of knowledge in postgraduate students of frequency distribution table. The results showed that most of postgraduate students has a high knowledge (60%), postgraduate students with a moderate level of knowledge (27.5%), and postgraduate students with the knowledge that a low level (12.5%). Conclusions of the research showed that the majority postgraduate students about universal precaution is at a high level.


1995 ◽  
Vol 26 (2) ◽  
pp. 49-57 ◽  
Author(s):  
Christo Boshoff ◽  
Alwyn P. Du Plessis

The high level of human involvement in marketing ensures that it is, and always will be, a dynamic business function. When the impact of accelerating technological developments is added, the dynamism often turns to volatility. The rapidly changing business environment necessitates regular consideration of the role of marketing in the business environment, both from an internal and external point of view. This study analyses marketing and marketing activities from a consumer perspective. It measures consumer attitudes towards the four P's and converts these scores to an overall 'attitude towards marketing' index. It also compares the results with a similar study conducted in 1990 (the 1990 study). The 1990 study reported a negative marketing index of -16.262. Older consumers in particular voiced their disapproval of marketing practices. Pricing was singled out as the most important bone of contention. The pricing and the pricing practices used by marketers were seen as often unfair and unreasonable. Advertising was also viewed rather sceptically. Retailing was the only marketing mix element to return a positive index. The results of this study show that the SA Marketing Index has declined from -16.262 in 1990 to -34.125 in 1993. The decline in the marketing index is primarily due to the considerable decline in the price index from -8.470 to -24.368, a slight decrease in the product index (from -2.719 to -9.939) and a marginal deterioration in the retailing index. The decline in the price index in particular was so severe that the improvement in the advertising index (from -6.434 to +0.606) had almost no influence on the marketing index. When the impact of demographic variables on attitudes were considered, Afrikaans-speaking consumers and those who are relatively well qualified academically, turned out to be particularly dissatisfied with marketing.


2016 ◽  
Vol 4 (2) ◽  
Author(s):  
Budi Herminto ◽  
Risa Setia Ismandani

AbstractWater represent compound which is the necessary for all living. Consumption behaviorirrigate society not yet altogether goodness, society consume water when feel thirsty anddo not so pay attention drinking water and amount matching with requirement. Purpose ofthe study to determine the relationship between the knowledge level about fluid bodyrequirement with pattern consume drinking water at student in Academy of Nursing PantiKosala Surakarta.The subject was used as population in the study was all the first year students. The totalpopulation were 139 students, and the sample were 103 students. The samplingtechnique was simple random sampling.This research method represent analytic research with design research of corelasional toknow relationship between knowledge level about fluid body requirement with patternconsume drinking water of student.The results was the high level of knowledge about the fluid body requirment were 74(72%), moderate level of knowledge about the fluid body requirment were 29 (28%), whilethe behavior of consuming appropiate water were 69 (67%), and the behavior ofconsuming inappropiate water were 34 (33%) with a p-value 0.003 <0.05 significant 95%.There was a significant relationship between the knowledge level about fluid bodyrequirement with pattern consume drinking water at student in Academy of Nursing PantiKosala Surakarta.Keywords: knowlegde level, fluid body requirement, pattern consume drinking water.


2017 ◽  
Vol 13 (3) ◽  
pp. 279
Author(s):  
Grégoire Paraïso ◽  
Bienvenu Adjoha ◽  
Armand Paraïso ◽  
Roméo Ayélerou ◽  
Zackari Orou-Goura

Beekeeping is a very interesting activity having a positive impact on agricultural production and rural incomes. This study conducted in both municipalities of Djidja and Zogbodomey, in southern Benin, aimed at analyzing the determinants and constraints of beekeeping activities. For this purpose, a sample of 110 beekeepers randomly selected was investigated. Data about socio-economic and demographic characteristics of households as well as the difficulties in beekeeping were collected through individual interviews and focus groups. The statistical analysis done with R software version 3.1.2 have shown that beekeeping in the study area was influenced by three important socio-economic factors such asthe municipality of the producer, , literacy level and the producer belonging to a village agricultural association. The studies also revealed that the development of beekeeping faced many problems such as: the lack of financial resources, the low level of knowledge in beekeeping techniques, the lack of extension services, the high level of parasitism and other forms of constraints as theft, bush fire. Taking into account these results will allow to pay more attention on farmers’ and beekeepers situation what will be a means of alleviating of rural poverty.


2014 ◽  
Vol 62 (3) ◽  
pp. 571-582 ◽  
Author(s):  
J.M. Kościelny ◽  
M. Syfert

Abstract The survey presents a selection of the methods of the fault detection and isolation suitable to be useful for the diagnostics of the complex, large scale industrial processes. The paper focuses on these methods that have appropriately high level of potential applicability in industrial practice. The novelty of the paper relies on the discussion of the dependency of the level of knowledge about diagnosed process and recommended diagnostic approaches. Appropriate recommendations were given in the convenient form of the table


Sign in / Sign up

Export Citation Format

Share Document