

A host file (located at/etc/hosts on UNIX systems, and c:\windows\system32\drivers\etc\hosts on many versions of Microsoft Windows) is an example of a flat file: each entry (line) contains at least an IP address and a host name. The simplest form of database is a flat file: a text file that contains multiple lines of data, each in a standard format. Inference is a similar attack, but the attacker must logically deduce missing details: unlike aggregation, a mystery must be solved.įormal database types include relational (two dimensional), hierarchical, and object- oriented.

Aggregation is a mathematical attack where an attacker aggregates details at a lower classification to determine information at a higher classification. Integrity is a primary concern when replicated databases are updated.Īdditional database confidentiality issues include inference and aggregation attacks. Typical database security issues include the confidentiality and integrity of the stored data. Databases may be searched with a database query language, such as the Structured Query Language (SQL). Databases are managed by Database Administrators (DBAs). The database is managed by the Database Management System (DBMS), which controls all access to the database and enforces the database security. Databases allow queries (searches), insertions (updates), deletions, and many other functions. A database is a structured collection of related data.
