Python as an automation tool in IS. Protecting Database Access in Python
The activity of modern organizations, regardless of the form of ownership, is highly risky. There are up to 600 risk factors in total. It is possible to reduce risk levels only after assessing them. The basis of risk assessment is analytical processing of information relating to the sphere of organi...
Gespeichert in:
Veröffentlicht in: | Journal of physics. Conference series 2022-03, Vol.2182 (1), p.12093 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 1 |
container_start_page | 12093 |
container_title | Journal of physics. Conference series |
container_volume | 2182 |
creator | Dronov, V Y Dronova, G A |
description | The activity of modern organizations, regardless of the form of ownership, is highly risky. There are up to 600 risk factors in total. It is possible to reduce risk levels only after assessing them. The basis of risk assessment is analytical processing of information relating to the sphere of organization’s activity. The information to be analyzed is usually accumulated in databases. This information is usually accessed with SQL queries and analyzed with application software. The most rational variant is when the business unit employees are able to select the data from the database and perform their analytics independently. The most convenient, both for sampling information from databases, and for its analysis to use python. However, python, which is an interpreted language, has a disadvantage in terms of information security - access parameters, including user login and password, database connection parameters, are located in the program body in clear form. The option proposed in this article allows you to reduce the risks of privacy violation when accessing the database. |
doi_str_mv | 10.1088/1742-6596/2182/1/012093 |
format | Article |
fullrecord | <record><control><sourceid>proquest_iop_j</sourceid><recordid>TN_cdi_proquest_journals_2642481991</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2642481991</sourcerecordid><originalsourceid>FETCH-LOGICAL-c2743-35329d15f9daf8a05b8e06ad64ccc97b7581c34a11677f9db56ed1e552e95713</originalsourceid><addsrcrecordid>eNqFkEFLwzAYhoMoOKe_wYI3oWu-pGmS45jOTQYOtntI01Q7tqY22WH_3pbKRBDMIflInvcNPAjdA54AFiIBnpI4YzJLCAiSQIKBYEkv0Oj8cnmehbhGN97vMKbd4iO0WJ_Ch6sj7SPd7cfgDjpU3UVwbh9VdbTcTKJ164I1oarfoycddK69jabGWO97Ymi4RVel3nt7932O0Xb-vJ0t4tXby3I2XcWG8JTGlFEiC2ClLHQpNGa5sDjTRZYaYyTPORNgaKoBMs47KGeZLcAyRqxkHOgYPQy1Tes-j9YHtXPHtu5-VCRLSSpAyp7iA2Va531rS9W01UG3JwVY9dZU70P1blRvTYEarHVJOiQr1_xU_596_CP1up5tfoOqKUr6BdCCeqY</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2642481991</pqid></control><display><type>article</type><title>Python as an automation tool in IS. Protecting Database Access in Python</title><source>IOP Publishing Free Content</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><source>IOPscience extra</source><source>Alma/SFX Local Collection</source><source>Free Full-Text Journals in Chemistry</source><creator>Dronov, V Y ; Dronova, G A</creator><creatorcontrib>Dronov, V Y ; Dronova, G A</creatorcontrib><description>The activity of modern organizations, regardless of the form of ownership, is highly risky. There are up to 600 risk factors in total. It is possible to reduce risk levels only after assessing them. The basis of risk assessment is analytical processing of information relating to the sphere of organization’s activity. The information to be analyzed is usually accumulated in databases. This information is usually accessed with SQL queries and analyzed with application software. The most rational variant is when the business unit employees are able to select the data from the database and perform their analytics independently. The most convenient, both for sampling information from databases, and for its analysis to use python. However, python, which is an interpreted language, has a disadvantage in terms of information security - access parameters, including user login and password, database connection parameters, are located in the program body in clear form. The option proposed in this article allows you to reduce the risks of privacy violation when accessing the database.</description><identifier>ISSN: 1742-6588</identifier><identifier>EISSN: 1742-6596</identifier><identifier>DOI: 10.1088/1742-6596/2182/1/012093</identifier><language>eng</language><publisher>Bristol: IOP Publishing</publisher><subject>Access control ; Mathematical analysis ; Parameters ; Physics ; Risk analysis ; Risk assessment ; Risk levels ; Risk management</subject><ispartof>Journal of physics. Conference series, 2022-03, Vol.2182 (1), p.12093</ispartof><rights>Published under licence by IOP Publishing Ltd</rights><rights>Published under licence by IOP Publishing Ltd. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://iopscience.iop.org/article/10.1088/1742-6596/2182/1/012093/pdf$$EPDF$$P50$$Giop$$Hfree_for_read</linktopdf><link.rule.ids>314,776,780,27901,27902,38845,38867,53815,53842</link.rule.ids></links><search><creatorcontrib>Dronov, V Y</creatorcontrib><creatorcontrib>Dronova, G A</creatorcontrib><title>Python as an automation tool in IS. Protecting Database Access in Python</title><title>Journal of physics. Conference series</title><addtitle>J. Phys.: Conf. Ser</addtitle><description>The activity of modern organizations, regardless of the form of ownership, is highly risky. There are up to 600 risk factors in total. It is possible to reduce risk levels only after assessing them. The basis of risk assessment is analytical processing of information relating to the sphere of organization’s activity. The information to be analyzed is usually accumulated in databases. This information is usually accessed with SQL queries and analyzed with application software. The most rational variant is when the business unit employees are able to select the data from the database and perform their analytics independently. The most convenient, both for sampling information from databases, and for its analysis to use python. However, python, which is an interpreted language, has a disadvantage in terms of information security - access parameters, including user login and password, database connection parameters, are located in the program body in clear form. The option proposed in this article allows you to reduce the risks of privacy violation when accessing the database.</description><subject>Access control</subject><subject>Mathematical analysis</subject><subject>Parameters</subject><subject>Physics</subject><subject>Risk analysis</subject><subject>Risk assessment</subject><subject>Risk levels</subject><subject>Risk management</subject><issn>1742-6588</issn><issn>1742-6596</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>O3W</sourceid><sourceid>BENPR</sourceid><recordid>eNqFkEFLwzAYhoMoOKe_wYI3oWu-pGmS45jOTQYOtntI01Q7tqY22WH_3pbKRBDMIflInvcNPAjdA54AFiIBnpI4YzJLCAiSQIKBYEkv0Oj8cnmehbhGN97vMKbd4iO0WJ_Ch6sj7SPd7cfgDjpU3UVwbh9VdbTcTKJ164I1oarfoycddK69jabGWO97Ymi4RVel3nt7932O0Xb-vJ0t4tXby3I2XcWG8JTGlFEiC2ClLHQpNGa5sDjTRZYaYyTPORNgaKoBMs47KGeZLcAyRqxkHOgYPQy1Tes-j9YHtXPHtu5-VCRLSSpAyp7iA2Va531rS9W01UG3JwVY9dZU70P1blRvTYEarHVJOiQr1_xU_596_CP1up5tfoOqKUr6BdCCeqY</recordid><startdate>20220301</startdate><enddate>20220301</enddate><creator>Dronov, V Y</creator><creator>Dronova, G A</creator><general>IOP Publishing</general><scope>O3W</scope><scope>TSCCA</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>H8D</scope><scope>HCIFZ</scope><scope>L7M</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope></search><sort><creationdate>20220301</creationdate><title>Python as an automation tool in IS. Protecting Database Access in Python</title><author>Dronov, V Y ; Dronova, G A</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c2743-35329d15f9daf8a05b8e06ad64ccc97b7581c34a11677f9db56ed1e552e95713</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Access control</topic><topic>Mathematical analysis</topic><topic>Parameters</topic><topic>Physics</topic><topic>Risk analysis</topic><topic>Risk assessment</topic><topic>Risk levels</topic><topic>Risk management</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Dronov, V Y</creatorcontrib><creatorcontrib>Dronova, G A</creatorcontrib><collection>IOP Publishing Free Content</collection><collection>IOPscience (Open Access)</collection><collection>CrossRef</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Aerospace Database</collection><collection>SciTech Premium Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Journal of physics. Conference series</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Dronov, V Y</au><au>Dronova, G A</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Python as an automation tool in IS. Protecting Database Access in Python</atitle><jtitle>Journal of physics. Conference series</jtitle><addtitle>J. Phys.: Conf. Ser</addtitle><date>2022-03-01</date><risdate>2022</risdate><volume>2182</volume><issue>1</issue><spage>12093</spage><pages>12093-</pages><issn>1742-6588</issn><eissn>1742-6596</eissn><abstract>The activity of modern organizations, regardless of the form of ownership, is highly risky. There are up to 600 risk factors in total. It is possible to reduce risk levels only after assessing them. The basis of risk assessment is analytical processing of information relating to the sphere of organization’s activity. The information to be analyzed is usually accumulated in databases. This information is usually accessed with SQL queries and analyzed with application software. The most rational variant is when the business unit employees are able to select the data from the database and perform their analytics independently. The most convenient, both for sampling information from databases, and for its analysis to use python. However, python, which is an interpreted language, has a disadvantage in terms of information security - access parameters, including user login and password, database connection parameters, are located in the program body in clear form. The option proposed in this article allows you to reduce the risks of privacy violation when accessing the database.</abstract><cop>Bristol</cop><pub>IOP Publishing</pub><doi>10.1088/1742-6596/2182/1/012093</doi><tpages>6</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1742-6588 |
ispartof | Journal of physics. Conference series, 2022-03, Vol.2182 (1), p.12093 |
issn | 1742-6588 1742-6596 |
language | eng |
recordid | cdi_proquest_journals_2642481991 |
source | IOP Publishing Free Content; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals; IOPscience extra; Alma/SFX Local Collection; Free Full-Text Journals in Chemistry |
subjects | Access control Mathematical analysis Parameters Physics Risk analysis Risk assessment Risk levels Risk management |
title | Python as an automation tool in IS. Protecting Database Access in Python |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-02T17%3A23%3A41IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_iop_j&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Python%20as%20an%20automation%20tool%20in%20IS.%20Protecting%20Database%20Access%20in%20Python&rft.jtitle=Journal%20of%20physics.%20Conference%20series&rft.au=Dronov,%20V%20Y&rft.date=2022-03-01&rft.volume=2182&rft.issue=1&rft.spage=12093&rft.pages=12093-&rft.issn=1742-6588&rft.eissn=1742-6596&rft_id=info:doi/10.1088/1742-6596/2182/1/012093&rft_dat=%3Cproquest_iop_j%3E2642481991%3C/proquest_iop_j%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2642481991&rft_id=info:pmid/&rfr_iscdi=true |