To prevent the dissemination of sensitive information from the database to unauthorized users or outside competitive or hostile agents, an organization must establish effective security policies. The art of protecting information by transforming it into an unreadable format, calledÂ cipher text. Only those who possess a secretÂ key can decipher (orÂ decrypt) the message intoÂ plain text. Encrypted messages can sometimes be broken by cryptanalysis, also calledÂ codebreaking, although modern cryptography techniques are virtually unbreakable. Database security policies are guidelines for present and future decisions regarding the maintenance of the database security. Database security mechanisms are the functions used to enforce the database security policies.Â There are number of security policies that can be applied on data in order to protect the data against unauthorized access. Protecting the data is the prime need of an organization.
Copyright (c) 2013 INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
This work is licensed under a Creative Commons Attribution 4.0 International License.
The author warrants that the article is original, written by stated author(s), has not been published before, contains no unlawful statements, does not infringe the rights of others, is subject to copyright that is vested exclusively in the author and free of any third party rights, and that any necessary written permissions to quote from other sources have been obtained by the author(s).