SlideShare uma empresa Scribd logo
1 de 24
A Presentation by : Amir Khanzada 
Roll No: 2k11/SWE/24 
1
OUTLINE 
 Overview To Database Security. 
 What is Database Security 
 Why need of database security. 
 Concepts of Database Security. 
 Security Problems 
 Security Controls 
2
Mobile Computer 
Vehicles 
OVERVI 
EW 
In today’s world, we need everything secured whether it 
is your mobile phone , computer , vehicle or almost 
anything. 
3
What is database 
Database: security? 
It is a collection of information stored in a computer. 
Security: 
It is being free from danger. 
Database Security: 
It is the mechanisms that protect the database against intentional or 
accidental threats. 
4
Definition of Database Security 
Database Security is 
defined as the process by 
which “Confidentiality, 
Integrity and Availability” of 
the database can be 
protected 
5
Why need of database security? 
If there is no 
security to 
database what 
happens??? 
Data will be easily 
corrupted 
It is important to restrict access 
to the database from authorized 
users to protect sensitive data. 
6
Concepts of Database Security 
Three are 3 main aspects 
1. Secrecy or Confidentiality 
2. Integrity 
3. Availability 
7
SECRECY / 
 It is protecting the database from unauthorized users. 
Ensures that users are allowed to do the things they are 
trying to do. 
 Encryption is a technique or a process by which the data 
is encoded in such a way that only that authorized users 
are able to read the data. 
8
9 
INTEGRITY 
 Protecting the database from authorized users. 
Ensures that what users are trying to do is correct. 
For examples, 
 An employee should be able to modify his or her own 
information.
10 
AVAILABILITY 
 Database must have not unplanned downtime. 
 To ensure this ,following steps should be taken 
Restrict the amount of the storage space given to each user in the 
database. 
 Limit the number of concurrent sessions made available to each 
database user. 
Back up the data at periodic intervals to ensure data recovery in case of 
application users.
SECURITY 
PROBLEMS 
11
Any circumstance or event with the potential to adversely 
impact an IS through unauthorized access, destruction, 
disclosure, modification of data, and/or denial of service. 
There are two kinds of threat. 
Non-fraudulent Threat 
fraudulent Threat 
12
1. Non-fraudulent Threat 
 Natural or accidental disasters. 
 Errors or bugs in hardware or software. 
 Human errors. 
2. fraudulent Threat 
 Authorized users 
 Those who abuse their privileges and authority. 
 Hostile agents 
 Those improper users (outsider or insiders). 
 who attack the software and/or hardware system, or read or 
write data in a database. 
13
DATABASE PROTECTION 
REQUIREMENTS 
1. Protection from Improper Access 
2. Protection from Inference 
3. Integrity of the Database 
4. User Authentication 
5. Multilevel Protection 
6. Confinement 
7. Management and Protection of Sensitive Data 
14
SECURITY 
CONTROLS 
15
 Authorization - privileges, views. 
 Encryption - public key / private key, secure 
sockets. 
 Authentication – passwords. 
 Logical - firewalls, net proxies. 
16
A FIREWALL is dedicated software on another computer which 
inspects network traffic passing through it and denies (or) permits 
passage based on set of rules. Basically it is a piece of software that 
monitors all traffic that goes from your system to another via the 
Internet or network and Vice Versa 
Database Firewalls are a type ofWeb Application Firewalls that 
monitor databases to identify and protect against database specific 
attacks that mostly seek to access sensitive information stored in the 
databases. 
17
18
 Data encryption enables to encrypt sensitive data, such as credit 
card numbers, stored in table columns. 
 Encrypted data is decrypted for a database user who has access to 
the data. 
 Data encryption helps protect data stored on media in the event 
that the storage media or data file gets stolen. 
19
 As a security administrator, one can be sure that sensitive data is safe in 
case the storage media or data file gets stolen. 
 You do not need to create triggers or views to decrypt data. Data from 
tables is decrypted for the database user. 
 Database users need not be aware of the fact that the data they are 
accessing is stored in encrypted form. Data is transparently decrypted for 
the database users and does not require any action on their part. 
 Applications need not be modified to handle encrypted data. Data 
encryption/decryption is managed by the database. 
20
 Read authorization - allows reading, but not modification of data 
 Insert authorization - allows insertion of new data, but not 
modification of existing data. 
 Update authorization - allows modification, but not deletion of data. 
 Delete authorization - allows deletion of data 
21
select: allows read access to relation, or the ability to query using the view 
insert: the ability to insert tuples 
update: the ability to update using the SQL update statement 
delete: the ability to delete tuples. 
22
With grant option: 
allows a user who is 
granted a privilege to 
pass the privilege on 
to other users. 
Example: 
grant select on 
branch to U1 with 
grant option 
gives U1 the select 
privileges on branch and 
allows U1 to grant this 
privilege to others 
23
24

Mais conteúdo relacionado

Mais procurados (20)

Data security
Data securityData security
Data security
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
DB security
 DB security DB security
DB security
 
Web Security
Web SecurityWeb Security
Web Security
 
Access Controls
Access ControlsAccess Controls
Access Controls
 
System security
System securitySystem security
System security
 
SQL INJECTION
SQL INJECTIONSQL INJECTION
SQL INJECTION
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 
Dbms architecture
Dbms architectureDbms architecture
Dbms architecture
 
Data dictionary
Data dictionaryData dictionary
Data dictionary
 
Basic DBMS ppt
Basic DBMS pptBasic DBMS ppt
Basic DBMS ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Cia security model
Cia security modelCia security model
Cia security model
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
 
Database security
Database securityDatabase security
Database security
 
Database security
Database securityDatabase security
Database security
 
Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanisms
 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design Principles
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 

Destaque

Database Security
Database SecurityDatabase Security
Database Securityalraee
 
Methodology conceptual databases design roll no. 99 & 111
Methodology conceptual databases design roll no. 99 & 111Methodology conceptual databases design roll no. 99 & 111
Methodology conceptual databases design roll no. 99 & 111Manoj Nolkha
 
Topic 4 database recovery
Topic 4 database recoveryTopic 4 database recovery
Topic 4 database recoveryacap paei
 
Database backup and recovery
Database backup and recoveryDatabase backup and recovery
Database backup and recoveryAnne Lee
 

Destaque (9)

Database Security
Database SecurityDatabase Security
Database Security
 
Database Design
Database DesignDatabase Design
Database Design
 
Methodology conceptual databases design roll no. 99 & 111
Methodology conceptual databases design roll no. 99 & 111Methodology conceptual databases design roll no. 99 & 111
Methodology conceptual databases design roll no. 99 & 111
 
Topic 4 database recovery
Topic 4 database recoveryTopic 4 database recovery
Topic 4 database recovery
 
Data recovery
Data recoveryData recovery
Data recovery
 
Database backup and recovery
Database backup and recoveryDatabase backup and recovery
Database backup and recovery
 
Database recovery
Database recoveryDatabase recovery
Database recovery
 
Data integrity
Data integrityData integrity
Data integrity
 
Data integrity
Data integrityData integrity
Data integrity
 

Semelhante a Database security

databasesecurit-phpapp01.pdf
databasesecurit-phpapp01.pdfdatabasesecurit-phpapp01.pdf
databasesecurit-phpapp01.pdfAnSHiKa187943
 
Database Security Management
Database Security Management Database Security Management
Database Security Management Ahsin Yousaf
 
Database security in database management.pptx
Database security in database management.pptxDatabase security in database management.pptx
Database security in database management.pptxFarhanaMariyam1
 
Database Security, Threats & Countermeasures.pptx
Database Security, Threats & Countermeasures.pptxDatabase Security, Threats & Countermeasures.pptx
Database Security, Threats & Countermeasures.pptxSaqibAhmedKhan4
 
A Database System Security Framework
A Database System Security FrameworkA Database System Security Framework
A Database System Security FrameworkMaria Perkins
 
A DATABASE SYSTEM SECURITY FRAMEWORK
A DATABASE SYSTEM SECURITY FRAMEWORKA DATABASE SYSTEM SECURITY FRAMEWORK
A DATABASE SYSTEM SECURITY FRAMEWORKijcsit
 
MobileDBSecurity.pptx
MobileDBSecurity.pptxMobileDBSecurity.pptx
MobileDBSecurity.pptxmissionsk81
 
Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01ITNet
 
Locking Down Your Data: Best Practices for Database Security
Locking Down Your Data: Best Practices for Database SecurityLocking Down Your Data: Best Practices for Database Security
Locking Down Your Data: Best Practices for Database SecurityFredReynolds2
 
Database Security Presentation Why database Security is important
Database Security Presentation Why database Security is importantDatabase Security Presentation Why database Security is important
Database Security Presentation Why database Security is importantKamruzzamansohel2
 
CS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptx
CS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptxCS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptx
CS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptxShreyaChavan28
 
Lecture 01- What is Information Security.ppt
Lecture 01- What is Information Security.pptLecture 01- What is Information Security.ppt
Lecture 01- What is Information Security.pptshahadd2021
 
Data base security & integrity
Data base security &  integrityData base security &  integrity
Data base security & integrityPooja Dixit
 
Protection and security
Protection and securityProtection and security
Protection and securitymbadhi
 

Semelhante a Database security (20)

databasesecurit-phpapp01.pdf
databasesecurit-phpapp01.pdfdatabasesecurit-phpapp01.pdf
databasesecurit-phpapp01.pdf
 
uu (2).pdf
uu (2).pdfuu (2).pdf
uu (2).pdf
 
Database Security Management
Database Security Management Database Security Management
Database Security Management
 
Database security in database management.pptx
Database security in database management.pptxDatabase security in database management.pptx
Database security in database management.pptx
 
203135 Muhammad Usama.pptx
203135 Muhammad Usama.pptx203135 Muhammad Usama.pptx
203135 Muhammad Usama.pptx
 
Database Security, Threats & Countermeasures.pptx
Database Security, Threats & Countermeasures.pptxDatabase Security, Threats & Countermeasures.pptx
Database Security, Threats & Countermeasures.pptx
 
A Database System Security Framework
A Database System Security FrameworkA Database System Security Framework
A Database System Security Framework
 
A DATABASE SYSTEM SECURITY FRAMEWORK
A DATABASE SYSTEM SECURITY FRAMEWORKA DATABASE SYSTEM SECURITY FRAMEWORK
A DATABASE SYSTEM SECURITY FRAMEWORK
 
MobileDBSecurity.pptx
MobileDBSecurity.pptxMobileDBSecurity.pptx
MobileDBSecurity.pptx
 
Comparative Analysis of Windows and Linux System.pptx
Comparative Analysis of Windows and Linux System.pptxComparative Analysis of Windows and Linux System.pptx
Comparative Analysis of Windows and Linux System.pptx
 
Importance of DBMS.pptx
Importance of DBMS.pptxImportance of DBMS.pptx
Importance of DBMS.pptx
 
Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01
 
Dstca
DstcaDstca
Dstca
 
Locking Down Your Data: Best Practices for Database Security
Locking Down Your Data: Best Practices for Database SecurityLocking Down Your Data: Best Practices for Database Security
Locking Down Your Data: Best Practices for Database Security
 
Database Security Presentation Why database Security is important
Database Security Presentation Why database Security is importantDatabase Security Presentation Why database Security is important
Database Security Presentation Why database Security is important
 
CS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptx
CS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptxCS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptx
CS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptx
 
Database security
Database securityDatabase security
Database security
 
Lecture 01- What is Information Security.ppt
Lecture 01- What is Information Security.pptLecture 01- What is Information Security.ppt
Lecture 01- What is Information Security.ppt
 
Data base security & integrity
Data base security &  integrityData base security &  integrity
Data base security & integrity
 
Protection and security
Protection and securityProtection and security
Protection and security
 

Último

Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalLionel Briand
 
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...Akihiro Suda
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationBradBedford3
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Developmentvyaparkranti
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceBrainSell Technologies
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...OnePlan Solutions
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfMarharyta Nedzelska
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentationvaddepallysandeep122
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsChristian Birchler
 
How To Manage Restaurant Staff -BTRESTRO
How To Manage Restaurant Staff -BTRESTROHow To Manage Restaurant Staff -BTRESTRO
How To Manage Restaurant Staff -BTRESTROmotivationalword821
 
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identityteam-WIBU
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commercemanigoyal112
 

Último (20)

Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive Goal
 
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion Application
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Development
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdf
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentation
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
 
How To Manage Restaurant Staff -BTRESTRO
How To Manage Restaurant Staff -BTRESTROHow To Manage Restaurant Staff -BTRESTRO
How To Manage Restaurant Staff -BTRESTRO
 
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identity
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commerce
 

Database security

  • 1. A Presentation by : Amir Khanzada Roll No: 2k11/SWE/24 1
  • 2. OUTLINE  Overview To Database Security.  What is Database Security  Why need of database security.  Concepts of Database Security.  Security Problems  Security Controls 2
  • 3. Mobile Computer Vehicles OVERVI EW In today’s world, we need everything secured whether it is your mobile phone , computer , vehicle or almost anything. 3
  • 4. What is database Database: security? It is a collection of information stored in a computer. Security: It is being free from danger. Database Security: It is the mechanisms that protect the database against intentional or accidental threats. 4
  • 5. Definition of Database Security Database Security is defined as the process by which “Confidentiality, Integrity and Availability” of the database can be protected 5
  • 6. Why need of database security? If there is no security to database what happens??? Data will be easily corrupted It is important to restrict access to the database from authorized users to protect sensitive data. 6
  • 7. Concepts of Database Security Three are 3 main aspects 1. Secrecy or Confidentiality 2. Integrity 3. Availability 7
  • 8. SECRECY /  It is protecting the database from unauthorized users. Ensures that users are allowed to do the things they are trying to do.  Encryption is a technique or a process by which the data is encoded in such a way that only that authorized users are able to read the data. 8
  • 9. 9 INTEGRITY  Protecting the database from authorized users. Ensures that what users are trying to do is correct. For examples,  An employee should be able to modify his or her own information.
  • 10. 10 AVAILABILITY  Database must have not unplanned downtime.  To ensure this ,following steps should be taken Restrict the amount of the storage space given to each user in the database.  Limit the number of concurrent sessions made available to each database user. Back up the data at periodic intervals to ensure data recovery in case of application users.
  • 12. Any circumstance or event with the potential to adversely impact an IS through unauthorized access, destruction, disclosure, modification of data, and/or denial of service. There are two kinds of threat. Non-fraudulent Threat fraudulent Threat 12
  • 13. 1. Non-fraudulent Threat  Natural or accidental disasters.  Errors or bugs in hardware or software.  Human errors. 2. fraudulent Threat  Authorized users  Those who abuse their privileges and authority.  Hostile agents  Those improper users (outsider or insiders).  who attack the software and/or hardware system, or read or write data in a database. 13
  • 14. DATABASE PROTECTION REQUIREMENTS 1. Protection from Improper Access 2. Protection from Inference 3. Integrity of the Database 4. User Authentication 5. Multilevel Protection 6. Confinement 7. Management and Protection of Sensitive Data 14
  • 16.  Authorization - privileges, views.  Encryption - public key / private key, secure sockets.  Authentication – passwords.  Logical - firewalls, net proxies. 16
  • 17. A FIREWALL is dedicated software on another computer which inspects network traffic passing through it and denies (or) permits passage based on set of rules. Basically it is a piece of software that monitors all traffic that goes from your system to another via the Internet or network and Vice Versa Database Firewalls are a type ofWeb Application Firewalls that monitor databases to identify and protect against database specific attacks that mostly seek to access sensitive information stored in the databases. 17
  • 18. 18
  • 19.  Data encryption enables to encrypt sensitive data, such as credit card numbers, stored in table columns.  Encrypted data is decrypted for a database user who has access to the data.  Data encryption helps protect data stored on media in the event that the storage media or data file gets stolen. 19
  • 20.  As a security administrator, one can be sure that sensitive data is safe in case the storage media or data file gets stolen.  You do not need to create triggers or views to decrypt data. Data from tables is decrypted for the database user.  Database users need not be aware of the fact that the data they are accessing is stored in encrypted form. Data is transparently decrypted for the database users and does not require any action on their part.  Applications need not be modified to handle encrypted data. Data encryption/decryption is managed by the database. 20
  • 21.  Read authorization - allows reading, but not modification of data  Insert authorization - allows insertion of new data, but not modification of existing data.  Update authorization - allows modification, but not deletion of data.  Delete authorization - allows deletion of data 21
  • 22. select: allows read access to relation, or the ability to query using the view insert: the ability to insert tuples update: the ability to update using the SQL update statement delete: the ability to delete tuples. 22
  • 23. With grant option: allows a user who is granted a privilege to pass the privilege on to other users. Example: grant select on branch to U1 with grant option gives U1 the select privileges on branch and allows U1 to grant this privilege to others 23
  • 24. 24