ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

CYBER SECURITY AND NORMALIZATION THEORY

Journal: International Journal of Computer Engineering and Technology (IJCET) (Vol.11, No. 03)

Publication Date:

Authors : ;

Page : 1-10

Keywords : Cyber Security; Data Breaches; Cyber-Attacks;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Corporations allocate resources to protect their data against unauthorized and hostile access to their vital information assets. The purpose of this paper is to investigate the final defense mechanism against unauthorized data access using an efficient and effective design of a database according to Normalization Theory. Technically, there are three layers of defense, and they are presentation layer, programming layer, and the data layer. Though the primary objective of my research is to demystify the role of Normalization Theory within the Cyber security domain, yet I need to reflect on the design process of the data layer. My paper will delve through the data layer only for understanding the ramification and the effectiveness of Normalization Theory constructs concerning Cyber security domain.

Last modified: 2021-03-03 15:40:54