Now that the problem has been defined, it becomes necessary to find a best solution for that.Several solutions like firewalls, encryption, virus protection etc. are already in use. But then these have also been targets sometimes. This work aims at adding more security to the existing security of the database . It is to ensure double safety where even if the first level of security is broken then still the hacker(here a threat to security) is blocked by the second level.

Our method includes adopting any of the commonly available solutions to it. This would act as the first security solution. To strengthen the security, a second level of security would be adopted.The method we are hoping to implement is LDAP (Lighweight Directory Access Protocol).

A brief description about LDAP is as follows.LDAP is a directory service protocol that runs over TCP/IP.In LDAP, directory entries are arranged in a hierarchical tree-like structure.One of the main advantages of LDAP is access control. It provides a rich and powerful access control facility and allows the control access to the information in the concerned database. The access to entries are controlled based on LDAP authentication information, IP address, domain name and other criteria.

The proposed work would be to implement LDAP in databases to ensure greater security and more efficiently.