| Every information system of e-commerce, finance, securities and the military, depends on database, which is usually kept a vital business information and confidential data. The integrity, availability and of data of these systems are very important, but the measures of protecting database of these systems arc often too weak to provide real protection.In recent years, with the development of technology, manufacturers were gradually increased the input of the development of protecting the database system, provided a variety of tools and instruments to protect user data. To a certain extent, it improved the database system security. However, these tools and instruments is only a database system software components, depended on specific database software products, its scope is limited to the protection of the database itself, not with other information security protection measures for the realization of integration. As the network of information services of different systems, different platform, based on the concrete platform of security protection measures can only be a specific system to deploy, but no actual promotional value.This article discusses a common information system security threats, as well as several commonly used methods of information security and protection, with the typical structure of the database application system analysis, brought out the platform-independent methods of protecting database. Through the Internet-based database applications typical case analysis, in-depth study in how not to change the original application of logic and structure of the whole system under the premise of using packet filtering, intrusion prevention, data monitoring, data backup, and other common safety Protection methods, to increase the relevant security systems, to achieve effective protection of the database to verify the platform-independent method of database protection is effective. |