Price, value and security. How to manage a database on somebody's own
In: Proceedings of FIKUSZ '09
AbstractOur age is called information age which shows the importance of any kind of data. Because of this one should protect their (digital) data to prevent unauthorized entities accessing them. Since the data being managed in a database can have a high value unauthorized entities may somehow find their way to gain unauthorized access to those data. In this paper I show a possible and low cost technical solution of such an attack which could be performed because of some malpractice of the managers of the database.
Download InfoIf you experience problems downloading a file, check if you have the proper application to view it first. In case of further problems read the IDEAS help page. Note that these files are not on the IDEAS site. Please be patient as the files may be large.
This chapter was published in: László Áron Kóczy (ed.) Proceedings of FIKUSZ '09, , pages 109-119, 2009.
This item is provided by Óbuda University, Keleti Faculty of Business and Management in its series Proceedings of FIKUSZ '09 with number 109-119.
Keywords: data security; database cracking; certificate spoofing; arp poisoning; man in the middle attack;
Find related papers by JEL classification:
- L86 - Industrial Organization - - Industry Studies: Services - - - Information and Internet Services; Computer Software
- M15 - Business Administration and Business Economics; Marketing; Accounting - - Business Administration - - - IT Management
You can help add them by filling out this form.
reading list or among the top items on IDEAS.Access and download statisticsgeneral information about how to correct material in RePEc.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Alexandra Vécsey).
If references are entirely missing, you can add them using this form.