Professional Documents
Culture Documents
CH 3
CH 3
Yirga Y. (PhD)
byyirga@gmail.com
Department of Information Technology
• Unauthorized Access
• Any unauthorized use, disclosure, or
manipulation of sensitive data stored in a
database system.
• Individuals gain entry via:
• stolen credentials
• weak authentication mechanisms
• improper access control settings
Research Directions
Database security with AI and ML technologies
Blockchain Technology
Cloud-Based Database Security
Quantum Computing
an emerging technology, holds the potential to influence
database security.