Best Practices for Database Security in the Age of AI

Authors

  • Sandeep Kumar Nangunori Salesforce, USA Author

DOI:

https://doi.org/10.32628/CSEIT241061152

Keywords:

AI-Powered Database Security, Threat Detection Analytics, Security Implementation Framework, Compliance Monitoring Systems, Security Audit Protocols

Abstract

Database security has seen a dramatic change as a result of artificial intelligence's incorporation into contemporary technology, bringing with it previously unheard-of opportunities as well as obstacles. This thorough article looks at how businesses can use AI capabilities to safeguard sensitive data assets while fortifying their database security postures. With an emphasis on financial institutions and healthcare organizations, it looks at the changing threat landscape, crucial security measures, and practical implementation tactics across a range of sectors. The article further demonstrates the efficacy of threat detection systems, sophisticated encryption techniques, AI-powered security solutions, and thorough audit frameworks. It illustrates the vital significance of putting in place multi-layered security techniques that combine conventional safeguards with AI-enhanced protective measures through in-depth case studies and empirical analysis.

Downloads

Download data is not yet available.

References

Akash Takyar, "Data security in AI systems: Types of threats, principles and techniques to mitigate them and best practices," Leeway Hertz. [Online]. Available: https://www.leewayhertz.com/data-security-in-ai-systems/

Ricardo Jorge Raimundo and Albérico Manuel Rosário, "The Impact of Artificial Intelligence on Data System Security: A Literature Review," ResearchGate, October 2021. [Online]. Available: https://www.researchgate.net/publication/355549234_The_Impact_of_Artificial_Intelligence_on_Data_System_Security_A_Literature_Review

Aya H. Salem, Safaa M. Azzam, O. E. Emam and Amr A. Abohany, "Advancing cybersecurity: a comprehensive review of AI-driven detection techniques," Journal of Big Data Security, August 4, 2024. [Online]. Available: https://journalofbigdata.springeropen.com/articles/10.1186/s40537-024-00957-y

Irshaad Jada and Thembekile O. Mayayise, "The impact of artificial intelligence on organisational cyber security: An outcome of a systematic literature review," International Journal of Medical Informatics, Dec 25. 2023. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S2543925123000372

Prakash Somasundaram, "Enhancing Organizational Data Protection: Advanced Security Measures for Database Systems," International Journal of Recent Advances in Computer Applications and Information Technology, Jan-Dec 2023. [Online]. Available: https://iaeme.com/MasterAdmin/Journal_uploads/IJRCAIT/VOLUME_6_ISSUE_1/IJRCAIT_06_01_004.pdf

Anthony Lawrence Paul, "The Role of Artificial Intelligence in Enhancing Data Security," ResearchGate, May 2024. [Online]. Available: https://www.researchgate.net/publication/381004546_The_Role_of_Artificial_Intelligence_in_Enhancing_Data_Security

Dr. Kostis Chlouverakis, "How artificial intelligence is reshaping the financial services industry," EY Financial Services Research, April 26, 2024. [Online]. Available: https://www.ey.com/en_gr/insights/financial-services/how-artificial-intelligence-is-reshaping-the-financial-services-industry

Private Banker, "How banking and payments companies are tackling cybersecurity challenges," Private Banker International, 2024. [Online]. Available: https://private-banker.nridigital.com/private_banker_international_jul24/case-studies-cybersecurity-banking

Sergeja Slapničar, Tina Vuko, Marko Čular, Matej Drašček, "Effectiveness of cybersecurity audit," ScienceDirect, Journal of Information Systems, Jan 15, 2022. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S1467089521000506

MSB Corp, "The Importance of Regular Security Audits and Vulnerability Assessments," International Journal of Cybersecurity, Nov 23, 2023. [Online]. Available: https://www.mbccs.com/importance-of-regular-security-audits-and-vulnerability-assessments/

Ruth Breu, "Quantitative Assessment of Enterprise Security System," International Journal of Information Security, April 2008. [Online]. Available: https://www.researchgate.net/publication/4339457_Quantitative_Assessment_of_Enterprise_Security_System

Microsoft, "What is Database Security?," Microsoft Azure Security Research, Technical Report. [Online]. Available: https://azure.microsoft.com/en-us/resources/cloud-computing-dictionary/what-is-database-security

Downloads

Published

30-11-2024

Issue

Section

Research Articles