Database security is the use of a wide variety of tools to protect large virtual data storage units. The field is made up of several different components. Different areas of database security include protecting the data itself (data level security), the applications used to process and store data, the physical servers, and even the network connections that allow users to access databases (system level security).
Databases have been largely secured against hackers through network security measures such as firewalls, and network-based intrusion detection systems. While network security controls remain valuable in this regard, securing the database systems themselves, and the programs/functions and data within them, has arguably become more critical as networks are increasingly opened to wider access, in particular access from the Internet. Furthermore, system, program, function and data access controls, along with the associated user identification, authentication and rights management functions, have always been important to limit and in some cases log the activities of authorised users and administrators.
Network security is any activity designed to protect the usability and integrity of your network and data. It includes both hardware and software technologies. Effective network security manages access to the network. It targets a variety of threats and stops them from entering or spreading on your network.
- How does network security work?
Network security combines multiple layers of defences at the edge and in the network. Each network security layer implements policies and controls. Authorized users gain access to network resources, but malicious actors are blocked from carrying out exploits and threats.
- How do I benefit from network security?
Digitization has transformed our world. How we live, work, play, and learn have all changed. Every organization that wants to deliver the services that customers and employees demand must protect its network. Network security also helps you protect proprietary information from attack. Ultimately it protects your reputation
Application security is the use of software, hardware, and procedural methods to protect applications from external threatsThere are several strategies to enhance mobile application security including:
- Application white listing
- Ensuring transport layer security
- Strong authentication and authorisation
- Encryption of data when written to memory
- Sandboxing of applications
- Granting application access on a per-API level
- Predefined interactions between the mobile application and the OS
- Requiring user input for privileged/elevated access