CYBER SECURITY AND NORMALIZATION THEORY
Journal: International Journal of Computer Engineering and Technology (IJCET) (Vol.11, No. 03)Publication Date: 2020-03-31
Authors : Mahmoud Elsayess;
Page : 1-10
Keywords : Cyber Security; Data Breaches; Cyber-Attacks;
Abstract
Corporations allocate resources to protect their data against unauthorized and hostile access to their vital information assets. The purpose of this paper is to investigate the final defense mechanism against unauthorized data access using an efficient and effective design of a database according to Normalization Theory. Technically, there are three layers of defense, and they are presentation layer, programming layer, and the data layer. Though the primary objective of my research is to demystify the role of Normalization Theory within the Cyber security domain, yet I need to reflect on the design process of the data layer. My paper will delve through the data layer only for understanding the ramification and the effectiveness of Normalization Theory constructs concerning Cyber security domain.
Other Latest Articles
- DOMINATING BROADCASTS IN GRAPH THEORY
- ENERGY EFFICIENT ROUTING PROTOCOL IN WIRELESS SENSOR NETWORK
- SECURED CLOUD COMPUTING FOR DATA MANAGEMENT USING BIG DATA FOR SMALL AND MEDIUM EDUCATIONAL INSTITUTIONS
- CROP YIELD PREDICTION USING SUPERVISED LEARNING TECHNIQUES
- A SURVEY ON FRAMEWORKS AND TECHNIQUES OF IMAGE MINING
Last modified: 2021-03-03 15:40:54