Database Security Over the Last Article Review

Total Length: 904 words ( 3 double-spaced pages)

Total Sources: 2

Page 1 of 3



Strengths vs. Weaknesses

The article 2007 Survey on Database Security; highlights the most pressing issues that could be facing an organization (someone from within who could have access to the data). Where, this strength points out a situation that many it managers are overlooking. However, the weakness of the article is that it points out the problem, while at the same time saying there is no effective solution. In many ways this is the equivalent of point out a fire and then not having the tools to put it out. (Ponemon, 2010)

The article How to Secure Sensitive Data in a Cloud Environment; highlights how many businesses are turning to virtual networks to perform many functions. The biggest strengths of the article are: the overall dangers it points with this type of it protocol and how an organization can address these issues. The main weakness of the article is that it only has two solutions. tThis is problematic because businesses need a number of different tools, to adapt to the changing threats that are being encountered on a daily basis. (Markovich, 2010)

The Differences between the Two

The peer reviewed article (2007 Survey on Database Security) is obviously more focused on pointing out issues that could become a problem over the long-term.

Stuck Writing Your "Database Security Over the Last" Article Review?

This is because the issues that are being identified could be just emerging as possible situation, based upon their interviews with it managers. Therefore, a solution for the problem presented may not be available. The media reviewed article (How to Secure Sensitive Data in a Cloud Environment) highlights current issues that are facing businesses over the short to medium term. Where, the article will identify the problems and will then point out different solutions that can be implemented.

What the two different articles highlight, is that the overall focus on the various it related issues are different, with both showing two critical problems. As a result, the extent of the issues covered will be more in depth in the peer reviewed article, as opposed to the main stream media article. This is because the audience is more technically focused and the content from the peer viewed article, must address issues that are most important to them. Therefore, one can easily see how the accuracy elements are consistent, but the focus of the articles will be geared to reflect the intended audience......

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Database Security Over The Last" (2010, May 14) Retrieved May 17, 2024, from
https://www.aceyourpaper.com/essays/database-security-last-12750

Latest MLA Format (8th edition)

Copy Reference
"Database Security Over The Last" 14 May 2010. Web.17 May. 2024. <
https://www.aceyourpaper.com/essays/database-security-last-12750>

Latest Chicago Format (16th edition)

Copy Reference
"Database Security Over The Last", 14 May 2010, Accessed.17 May. 2024,
https://www.aceyourpaper.com/essays/database-security-last-12750