A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is
The topic of this work is to simulate common database threats on a relational database, with the goal of identifying vulnerabilities. Furthermore, security metrics are used to assess the damage of the executed threats. Confidentiality, integrity and availability are the traditional security goal examples, which are also used in this work. It is necessary to figure out which threat is afflicting damage to which security goal. In this sense it is possible to analyze security goals and if requireddoi:10.25365/thesis.45969 fatcat:sfpcjmoxnndpzhcvcqjzm26tdm