Call Us: US - +1 845 478 5244 | UK - +44 20 7193 7850 | AUS - +61 2 8005 4826

Semi-structured and Unstructured data

2. Intellectual property rights –
As the use of Internet and intranet is increasing day by day, legal and informational aspects of data are becoming major concerns for many organizations. To address this concerns watermark technique are used which will help to protect content from unauthorized duplication and distribution by giving the provable power to the ownership of the content.

Traditionally they are dependent upon the availability of a large domain within which the objects can be altered while retaining its essential or important properties.
However, research is needed to access the robustness of many such techniques and the study and investigate many different approaches or methods that aimed to prevent intellectual property rights violation.

3. Database survivability –
Database systems need to operate and continued their functions even with the reduced capabilities, despite disruptive events such as information warfare attacks
A DBMS in addition to making every effort to prevent an attack and detecting one in the event of the occurrence should be able to do the following:

  • Confident:
    We should take immediate action to eliminate the attacker’s access to the system and to isolate or contain the problem to prevent further spread.
  • Damage assessment:
    Determine the extent of the problem, including failed function and corrupted data.
  • Recover:
    Recover corrupted or lost data and repair or reinstall failed function to reestablish a normal level of operation.
  • Reconfiguration:
    Reconfigure to allow the operation to continue in a degraded mode while recovery proceeds.
  • Fault treatment:
    To the extent possible, identify the weakness exploited in the attack and takes steps to prevent a recurrence.