Page 7 - Magazine.indt

This is a SEO version of Magazine.indt. Click here to view full version

« Previous Page Table of Contents Next Page »

Page 7

Data query language

Specifcally involved in the security of the DBMS, monitors login activity, access privileges, and works hand-in-hand with the data structure elements to maintain the integrity of information on a database.

Communication apparatus

Aside from existing to ensure that duplication of records doesn’t occur, a communication apparatus also exists to prevent the exploitation of records and/ or the data itself for security purposes.

Cloud DBMS may utilize all of these components or may have devised new strategies that combine one or more elements (like combining data structures and the data query language, for example). Many organizations are exploring the option of utilizing pre-existing modeling languages as a basis for expansion in a cloud model. This strategy ultimately saves on the time spent developing cloud DBMS, as well as enhances their overall efectiveness, since traditional modeling languages are more than adequate for handling data.

Despite the benefts ofered by cloud-based DBMS, many people still have apprehensions about them.

t i

u e g

r o c d

There is, however, a proposed method for dealing with these types of incongruence. An obvious solution is the deployment of an autonomous network agent, which rigorously monitors and defends all activities related to database access. The limitation of this method, however, is that a network agent may be unable to handle extremely large and dense volumes of activity/trafc.

Arguably, the best solution for dealing with security issues is to employ continuous database auditing. This involves setting up a system that meticulously records, analyzes, and reports on all activities regarding database access, especially suspicious database access. All information regarding these activities is logged and stored in an extremely remote and secure location with alerts being sent out to cloud management (or including any other individual(s) they might have designated to receive this information) in the event of a breach. This will provide those in charge of security with the information necessary to determine who is responsible, where they are located, as well as the specifcs of their machine/hardware.

While deployment of a dedicated and thorough cloud DBMS hasn’t occurred yet, it is certainly under

f d n

Page 7 - Magazine.indt

This is a SEO version of Magazine.indt. Click here to view full version

« Previous Page Table of Contents Next Page »