THE AWARENESS OF CYBER SECURITY THREATS AND RISKS WILL HELP KEEP EMPLOYEES/STAFF IN CHECK CONCERNING CYBER-ATTACKS AND CYBERCRIMES

0
583

CHAPTER ONE

INTRODUCTION

1.1                        Background of study

Cyber security refers to practices, policies, and technology that are designed to protect computers, servers, networks and connected devices from unauthorized access, while also mitigating the risk of compromise in the event of an intrusion. Cyber security also refers to the measures taken to keep electronic information private and safe from unauthorized access. It applies to software and hardware, as well as information on the internet and can be used to protect everything from personal information to complex government systems. Cyber security threats includes: computer viruses and worms, botnets, SQL injections, phishing attacks.

 Based on the case study (uncial result database), database security and its threats has to be laid emphasis on.

A database security can be defined as a collection of data that is saved on a computer system’s hard drive. Databases allow any authorized user to access, enter and analyse data quickly and easily. It’s a collection of queries, tables, and views. The data stored in the database are usually organised to model aspects that support processes that require information storage and retrieval. The user interface for databases is called a Database Management System (DBMS). DBMS are a software application that interacts with the authorized user, other applications and the database itself to capture and analyse data. It helps to organised data for better performance and faster retrieval by maintain indices. DBMS also performs data recovery operations of database. Examples of database threats include: excessive privileges, SQL injection attack, backup exposure, weak authentication, database vulnerabilities and misconfiguration, unmanaged sensitive data, denial of service, limited security expertise and education.

1.2                        Aim

     The aim of this research is to investigate cyber security threats and risks using uncial result database as case study.

1.3 Objectives

1. Investigate uncial result database if vulnerable to cyber threats and risks.

2. Identify possible threats and risks on the database.

3. Preventive measures of threats and risks on uncial result database.

THE AWARENESS OF CYBER SECURITY THREATS AND RISKS WILL HELP KEEP EMPLOYEES/STAFF IN CHECK CONCERNING CYBER-ATTACKS AND CYBERCRIMES