Journal of Cybersecurity and Information Management
JCIM
2690-6775
2769-7851
10.54216/JCIM
https://www.americaspg.com/journals/show/3730
2019
2019
Effective Integration of Database Security Tools into SDLC Phases: A Structured Framework
Faculty of Information Technology and Computer Science, Nile University, Egypt
Ahmed
Ahmed
Faculty of Information Technology and Computer Science, Nile University, Egypt
Haba K.
Aslan
Faculty of Computers and Artificial Intelligence, Benha University, Egypt; Faculty of Computer Science and Engineering, New Mansoura University, Egypt
Khaled M.
Fouad
As organizations increasingly rely on digital data, securing database systems has become a critical priority for protecting sensitive information, ensuring system integrity, and meeting regulatory compliance standards. This paper explores a comprehensive framework for database security, focusing on developing, assessing, and testing effective security tools. We begin by outlining the essential steps in creating robust security tools, including defining specific requirements based on database types and access needs and implementing real-time monitoring systems for immediate threat detection. The paper also emphasizes the importance of regular vulnerability assessments and advanced security analytics to identify and address potential risks proactively. Insights from a recent survey conducted among database administrators revealed that key areas of concern include access control, real-time monitoring, and vulnerability assessments. Furthermore, we highlight the significance of integrating security practices throughout the Software Development Life Cycle (SDLC). Additionally, best practices for evaluating and testing database security, including penetration testing to uncover vulnerabilities and stress testing to assess performance under load, are discussed. By synthesizing these strategies and survey feedback, this paper provides a comprehensive approach to enhancing database security, ensuring data protection, and maintaining system resilience against evolving cyber threats
2025
2025
176
207
10.54216/JCIM.160114
https://www.americaspg.com/articleinfo/2/show/3730