Asian Journal of Computer and Information Systems (ISSN: 2321 – 5658) Volume 02 – Issue 02, April 2014 Asian Online Journals (www.ajouronline.com ) 14 Overview of Database Architecture and Security Measures – Attacks and Control Methods Otusile Oluwabukola 1 , S. A. Idowu 2 and Ajayi Adebowale 3 1 Computer Science Department, School of Computing and Engineering Sciences Babcock University, Ilishan Remo, Ogun State, Nigeria. Email: buhkieotusile {at} yahoo.com 2 Computer Science Department, School of Computing and Engineering Sciences Babcock University, Ilishan Remo, Ogun State, Nigeria. Email: saidowu {at} yahoo.com 3 Computer Science Department, School of Computing and Engineering Sciences Babcock University, Ilishan Remo, Ogun State, Nigeria. Email: deboxyl {at} gmail.com _________________________________________________________________________________ ABSTRACT— In this paper, we describe the different database architecture and security measures. The architecture of a database system is greatly influenced by the underlying computer system on which the database system runs. Database systems can be centralized, where one server machine executes operations on the database. Database systems can also be designed to exploit parallel computer architectures. Distributed databases span multiple geographically separated machines. Ensuring the security of databases is also a complex issue when discussing database architecture. The purpose of this paper is to highlight and identify the architectures of database systems running on server systems, which are used in centralized and client –server architectures and the security measures pertaining to database systems. Keywords— Database, Database-Management System (DBMS), Database Architecture, security. 1. INTRODUCTION A database-management system (DBMS) is a collection of interrelated data and a set of programs, the collection of data, usually referred to as the database contains information relevant to an enterprise. The primary goal of a DBMS is to provide a way to store and retrieve database information that is both convenient and efficient. A primary goal of a database system is to retrieve information from and store new information into the database. Database systems are designed to manage large bodies of information. Management of data involves both defining structures for storage of information and providing mechanisms for the manipulation of information. In addition, the database system must ensure the safety of the information stored, despite system crashes or attempts at unauthorized access [11]. If data are to be shared among several users, the system must avoid possible anomalous results. Because information is so important in most organizations, computer scientists have developed a large body of concepts and techniques for managing data. These concepts and techniques form the focus of this paper. This article briefly introduces the principles of database systems. The database architecture is the set of specifications, rules, and processes that dictate how data is stored in a database and how data is accessed by components of a system. It includes data types, relationships, and naming conventions. The database architecture describes the organization of all database objects and how they work together. It affects integrity, reliability, scalability, and performance. The database architecture involves anything that defines the nature of the data, the structure of the data, or how the data flows [10]. The architecture of a database system is greatly influenced by the underlying computer system on which the database system runs. Database systems can be centralized, or client-server, where one server machine executes work on behalf of multiple client machines. Database systems can also be designed to exploit parallel computer architectures. Distributed databases span multiple geographically separated machines [1]. Most users of a database system today are not present at the site of the database system, but connect to it through a network. We can therefore differentiate between client machines, on which remote database users’ work, and server machines, on which the database system runs and discuss the security means involved in securing the database system.