Please use this identifier to cite or link to this item: https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/2528
Title: Database Pluggable Authentication Server
Authors: Sampath, N.U.U.
Issue Date: 26-May-2014
Abstract: A business or organization can only be successful if its critical data is well managed and secure. Everyday the news is filled with stories of corporations, financial institutions, and governments whose data systems have been compromised. Tightly configured identification, authentication and authorization infrastructure, which limit the vulnerabilities of data fraud that can be greatly reduce the overall exposure of application databases. Pluggable authentication is a module and it adds an extra layer of security to the database s authentication and authorization infrastructure AAI. When properly configured and used in conjunction with database AAI, it allows to enforce strong configuration controls on database access control, communications and to monitor incoming connection for any abnormalities. Hereby describe the basic techniques, developed over the last several months, for implementing pluggable authentication module to the database, configuring it for identification, authentication and authorization operation. Not only that our work is looking into other security measures taking consideration such as network security, protect business logic and secure backup by providing means of solutions to mitigate risk involving that areas through encryption methods and facilitates audit.
URI: http://hdl.handle.net/123456789/2528
Appears in Collections:Master of Science in Information Security - 2014

Files in This Item:
File Description SizeFormat 
11770206.pdf
  Restricted Access
1.76 MBAdobe PDFView/Open Request a copy


Items in UCSC Digital Library are protected by copyright, with all rights reserved, unless otherwise indicated.