Você está na página 1de 2

Amanda Watson

Liberty University

CSIS 325

Research Paper- References Page and Sentence Outline

1. Define a database.

a. Explanation of what a database is.

b. Explaining popular types of databases and what they are used for.

c. Explaining, basically, how a database is organized.

2. Explanation of why database security is important.

3. Explain how databases are constantly under attack by hackers.

a. Give an example of a real-life database hack.

b. Explain the flaw in security that led to the hack.

c. Explain what the company/organization did to recover.

4. Explain what can be done to prevent hacks.

5. Explain how a database can recover after a successful attack

References

Cyber Attacks Explained Database Hacking (Part 7). (2012, April 30). LINUX For You. Retrieved from
http://link.galegroup.com.ezproxy.liberty.edu/apps/doc/A288424550/ITOF?u=vic_liberty&sid=ITOF&xid
=c25d9af8
Berrington, J. (2016;2017;). databases. Anaesthesia and Intensive Care Medicine, 18(3), 155-157.
doi:10.1016/j.mpaic.2016.11.016

Meg Coffin Murray (2010). Journal of Information Technology Education: Innovations in Practice.
Retrieved from https://doi.org/10.28945/1132

Burtescu, E. (2009). Database security--attacks and control methods. Journal of Applied Quantitative
Methods, 4(4), 449+. Retrieved from
http://link.galegroup.com.ezproxy.liberty.edu/apps/doc/A353753710/AONE?u=vic_liberty&sid=AONE&
xid=cf8ede64

Morrison, P. (2003). Database security. Network Security, 2003(6), 11-12. doi:10.1016/S1353-


4858(03)00610-X

Bertino, E., & Sandhu, R. (2005). Database security - concepts, approaches, and challenges.IEEE
Transactions on Dependable and Secure Computing, 2(1), 2-19. doi:10.1109/TDSC.2005.9

Bamrara, A. (2015). Evaluating database security and cyber attacks: A relational approach. Journal of
Internet Banking and Commerce, 20(2), 1-17. Retrieved from
http://ezproxy.liberty.edu/login?url=https://search-proquest-
com.ezproxy.liberty.edu/docview/1799378132?accountid=12085

Você também pode gostar