Requirements For Database Security Element Integrity

Requirements for database security element integrity management
  1. Requirements For Database Security Element Integrity Management
  2. Advantages Of Database Security

The general state in Computer Security has the ability to detect and prevent attacks and to be able to recover. If these attacks are successful as such then it has to contain the disruption of information and services and check if they are kept low or tolerable. Different Elements in Computer SecurityIn order to fulfil these requirements, we come to the three main elements which are confidentiality, integrity, and availability and the recently added authenticity and utility. ConfidentialityConfidentiality is the concealment of information or resources. Also, there is a need to keep information secret from other third parties that want to have access to it, so just the right people can access it.Example in real life − Let’s say there are two people communicating via an encrypted email they know the decryption keys of each other and they read the email by entering these keys into the email program. If someone else can read these decryption keys when they are entered into the program, then the confidentiality of that email is compromised.

This definition explains what the confidentiality, integrity, and availability (CIA). The elements of the triad are considered the three most crucial components of security. Such training would typically include security risks that could threaten this. Number of times it is actually transmitted to complete a required transaction. There are some security requirements for a database like. Preserving structure and relations in a database. Element integrity preserves the accuracy of data.

IntegrityIntegrity is the trustworthiness of data in the systems or resources by the point of view of preventing unauthorized and improper changes. Generally, Integrity is composed of two sub-elements – data-integrity, which it has to do with the content of the data and authentication which has to do with the origin of the data as such information has values only if it is correct.Example in real life − Let’s say you are doing an online payment of 5 USD, but your information is tampered without your knowledge in a way by sending to the seller 500 USD, this would cost you too much.In this case cryptography plays a very major role in ensuring data integrity. Commonly used methods to protect data integrity includes hashing the data you receive and comparing it with the hash of the original message. However, this means that the hash of the original data must be provided in a secure way. AvailabilityAvailability refers to the ability to access data of a resource when it is needed, as such the information has value only if the authorized people can access at right time. Denying access to data nowadays has become a common attack. Imagine a downtime of a live server how costly it can be.Example in real life − Let’s say a hacker has compromised a webserver of a bank and put it down.

Security

You as an authenticated user want to do an e-banking transfer but it is impossible to access it, the undone transfer is a money lost for the bank.

ELEMENT OVERVIEWAsset integrity, the RBPS element that helps ensure that equipment is properly designed, installed in accordance with specifications, and remains fit for use until it is retired, is one of nine elements in the RBPS pillar of managing risk. This chapter describes the attributes of a risk-based management system for ensuring the integrity and reliability of critical equipment and safety systems. Section 12.2 describes the key principles and essential features of a management system for this element. Section 12.3 lists work activities that support these essential features, and presents a range of approaches that might be appropriate for each work activity, depending on perceived risk, resources, and organizational culture.

Sections 12.4 through 12.6 include (1) ideas to improve the effectiveness of management systems and specific programs that support this element, (2) metrics that could be used to monitor this element, and (3) issues that may be appropriate for management review. What Is It?The asset integrity element is the systematic implementation of activities, such as inspections and tests necessary to ensure that important equipment will be suitable for its intended application throughout its life. Specifically, work activities related to this element focus on (1) preventing a catastrophic release of a hazardous material or a sudden release of energy and (2) ensuring high availability (or dependability) ofcritical safety or utility systems that prevent or mitigate the effects of these types of events.

Why Is It Important?Designing and maintaining equipment that it is fit for its purpose and functions when needed is of paramount importance to process industries. Maintaining containment of hazardous materials and ensuring that safety systems work when needed are two of the primary responsibilities of any facility.

Requirements For Database Security Element Integrity Management

Advantages

Advantages Of Database Security

Where/When Is It Done?Asset integrity activities range from technical meetings involving experts seeking to advance the state-of-the art in equipment design, inspection, testing, or reliability, to a plant operator on routine rounds spotting leaks, unusual noises or odors, or detecting other abnormal conditions. However, this element primarily involves (1) inspections, tests, preventive maintenance, predictive maintenance, and repair activities that are performed by maintenance and contractor personnel at operating facilities and (2) quality assurance processes, including procedures and training, that underpin these activities. Asset integrity element activities occur at many places and extend throughout the life of the facility. Who Does It?Asset integrity activities occur at several organizational levels. Industry sponsored technical committees and organizations are continuously working to advance the state of knowledge regarding proper design and inspection, test, and preventive maintenance (ITPM) practices to help ensure that equipment is fit for service at commissioning, and remains fit for service throughout its life. Companies (or business units) often establish centers of excellence in the asset integrity field, establish corporate standards, and promote efforts to continuously improve the safety and reliability of process equipment. At an operating facility, the asset integrity element activities are an integral part of day-to-day operation involving operators, maintenance employees, inspectors, contractors, engineers, and others involved in designing, specifying, installing, operating, or maintaining equipment.