KNOWLEDGE MANAGEMENT AS A MANAGEMENT TOOLS

1126 Words3 Pages

Despite the increased focus by research and industry toward improving security of our cyber infrastructures, today the protection of data, entrusted to enterprise information systems, is more challenging than ever. There are several factors underlying this trend. Data security concerns are evolving. In addition to the traditional requirements of data confidentiality, integrity and availability, new requirements are emerging such as data quality (P. Missier,2003) completeness, timeliness, and provenance. In particular, it is important that data be complete, correct, and up-to-date with respect to the external world. The increasing quality of data will make data more valuable. Highly valuable data increases the potential to be gained from unauthorized access and the potential damage that can be done if the data is corrupted. The amount of data is increasingly large: “It is estimated that the amount of information in the world is doubling every 20 months, and the size and number of databases are increasing even faster” (R.Agawal, 2002)). Therefore, protection mechanisms must be able to scale well. We see increasing disintermediation in data accesses. The intermediate information processing steps typically carried out by corporate employees such as typing an order received over the phone are removed. Users who are outside the traditional corporate boundary can have direct and immediate online access to business information which pertain to them. In a traditional environment, any access to sensitive information is through employees. Although employees are not always reliable, at least they are known, their access to sensitive data is limited by their function, and employees violating access policies may be subject to disciplinary actio...

... middle of paper ...

... devised and integrated with processing techniques for continuous queries. Finally, the privacy of user location data, acquired from sensors and communication

networks, must be assured.

Database survivability

This is an important topic which has been largely unexplored, despite its relevance. Survivability refers to the ability of the database system to continue its functions, may be with reduced capabilities, despite disruptive events, such as information warfare attacks. To date, issues related to database survivability have not been investigated much. (Liu, 2002) has proposed four database architectures for intrusion-tolerant database systems that focus on the containment of malicious transactions. Even though this is an important initial step, much more research needs to be devoted to techniques and methodologies assuring database system survivability.

More about KNOWLEDGE MANAGEMENT AS A MANAGEMENT TOOLS

Open Document