SlideShare a Scribd company logo
1 of 21
DATABASE SECURITY
Presented by:
Maryam Asghar - 401
Nurmeen Shahid - 377
Usama Shahbaz - 363
Umar Ejaz - 430
Presented To: Ma’am Maria Tariq
OUTLINE
• What is database Security?
• Need of Database Security
• Concepts
• Security Problems
• Security Controls
OVERVIEW
• In today’s world, we need everything secured whether it is
your mobile phone, computer, vehicle or almost anything.
• Securing the DB may be the single biggest action
an organization can take to protect its assets.
David C. Knox
Database:
A database is a collection of information that is organized so
that can easily be accessed, managed and update.
Security:
Freedom from risk or danger: safety.
Database Security:
It is degree to which all data is fully protected from tampering
and unauthorized acts.
What if there is no
Security to database?
Data will easily corrupted.
It is important to restrict
access to the database from
authorized users to protect
sensitive data.
WHAT IF?
DATABASE SECURITY:
• Database security refers to the collective measures used to
protect and secure a database or database management
software from illegitimate use and malicious cyber threats and
attacks.
• Database security procedures are aimed at protecting not just
the data inside the database, but the database management
system and all the applications that access it from intrusion,
misuse of data, and damage.
WE CONSIDER DATABASE SECURITY
ABOUT THE FOLLOWING SITUATIONS:
• Theft and fraudulent.
• Loss of confidentiality or secrecy.
• Loss of data privacy.
• Loss of data integrity.
• Loss of availability of data
ASPECTS IN DATABASE
There are three main aspects in database:
• Confidentiality or Secrecy
• Integrity
• Availability
Confidentiality
Availability
Integrity
SECRECY OR CONFIDENTIALITY
• It is protecting the database from unauthorized users.
• Ensure that users are allowed to do things they are trying to do.
Encryption:
• Encryption is a technique or a process by which data is encoded
in such a way that only that authorized user are able to read the
data
INTEGRITY
• Protecting the database from authorized user.
• Ensure that what user are trying to do is allowed or not.
For Example:
• An employee should be able to modify his or her own information.
AVAILABILITY:
• Database must have not unplanned downtime.
• To ensure this, following steps should be taken
• Restrict the amount of the storage space given to each user
In the database
• Limit the number of concurrent sessions made available to
each database user.
• Back up the data at periodic intervals to ensure data
recovery in case of application users.
Security Problems
Any circumstance or event with the potential to adversely
impact and is through unauthorized access ,destruction
,disclosure , modification of data or denial of service.
There are many issues that can arise in database security.
Stolen
Database
Backups
SQL
Injections
Data Leaks
Non
Fraudulent
Threat
1 2 3 4
Stolen
Database
Backups
1 People regularly take backups of their valuable data. Its benefit is that it
contains a copy of our data, but that is also a big problem .Mostly focus is on
securing the data in the database but when it comes to backup ,many starts
to get less concerned.The backups contain same sensitive data and
therefore we have to protect them the same way. Anyone that can get a hold
of a backup file can just restore the database on one of their own servers,
and go about dissecting the sensitive data within it undisturbed.
SQL
Injections
2 This is a type of attack that hackers use. Hackers identifies
vulnerable, SQL driven websites and inject malicious Sql query
via input data. Malicious SQL query is validated and command is
executed by database.Then the hacker is granted access to view
and alter records or potentially act as database administration.
A Data Leak can involve information leakage, also known as
exfiltration; unauthorized copying or transmission of data, without
affecting the source data. Data leak is the release of sensitive,
confidential or protected data to an untrusted environment. It can
occur as a result of a hacker attack, an inside job by individuals
currently or previously employed by an organization, or
unintentional loss or exposure of data.
This might include certain factors ;
● Natural or accidental disasters
● Human or bug n hardware or software
● Human errors
Data Leaks
3
Non
Fraudulent
Threat
4
SECURITY
CONTROLS
METHODS OF SECURING THE
DATABASE
 Authorization - privileges,views.
 Encryption - public key / private key,
secure sockets.
 Authentication –passwords.
 Logical - firewalls, net proxies.
SECURING THE
DATABASE THROUGH
FIREWALL
A FIREWALLis dedicated software on another computer
which inspects network traffic passing through it and
denies passage based on set of rules.
• Basically it is a piece of software that monitors all
traffic that goes from your system to another via the
Internet or network andViceVersa
DATABASE FIREWALL
Database Firewalls are a type of Web Application
Firewalls that monitor databases to identify and
protect against database specific attacks.
Purpose:-
It is mostly seek to access sensitive information stored in
the databases.
SECURITY OF THE DATABASE
THROUGH ABSTRACTION:
• Data encryption enables to encrypt sensitive data, such
as credit card numbers, stored in table columns.
• Encrypted data is decrypted for a database user who has
access to the data.
• Data encryption helps protect data stored on media in
the event that the storage media or data file gets stolen.
Database security

More Related Content

What's hot

Database Systems Security
Database Systems SecurityDatabase Systems Security
Database Systems Securityamiable_indian
 
Data security and Integrity
Data security and IntegrityData security and Integrity
Data security and IntegrityZaid Shabbir
 
Fundamentals of Database ppt ch01
Fundamentals of Database ppt ch01Fundamentals of Database ppt ch01
Fundamentals of Database ppt ch01Jotham Gadot
 
Operating system security
Operating system securityOperating system security
Operating system securityRamesh Ogania
 
Database security
Database securityDatabase security
Database securityCAS
 
Database Security Management
Database Security Management Database Security Management
Database Security Management Ahsin Yousaf
 
Data mining (lecture 1 & 2) conecpts and techniques
Data mining (lecture 1 & 2) conecpts and techniquesData mining (lecture 1 & 2) conecpts and techniques
Data mining (lecture 1 & 2) conecpts and techniquesSaif Ullah
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
Computer security overview
Computer security overviewComputer security overview
Computer security overviewCAS
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer securityArzath Areeff
 
File systems versus a dbms
File systems versus a dbmsFile systems versus a dbms
File systems versus a dbmsRituBhargava7
 

What's hot (20)

Database Security
Database SecurityDatabase Security
Database Security
 
Database Systems Security
Database Systems SecurityDatabase Systems Security
Database Systems Security
 
Data security and Integrity
Data security and IntegrityData security and Integrity
Data security and Integrity
 
Fundamentals of Database ppt ch01
Fundamentals of Database ppt ch01Fundamentals of Database ppt ch01
Fundamentals of Database ppt ch01
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Database security
Database securityDatabase security
Database security
 
Database security
Database securityDatabase security
Database security
 
Security threats
Security threatsSecurity threats
Security threats
 
Database Security Management
Database Security Management Database Security Management
Database Security Management
 
Data mining (lecture 1 & 2) conecpts and techniques
Data mining (lecture 1 & 2) conecpts and techniquesData mining (lecture 1 & 2) conecpts and techniques
Data mining (lecture 1 & 2) conecpts and techniques
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Network attacks
Network attacksNetwork attacks
Network attacks
 
Data warehousing
Data warehousingData warehousing
Data warehousing
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
 
Data science unit1
Data science unit1Data science unit1
Data science unit1
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 
File systems versus a dbms
File systems versus a dbmsFile systems versus a dbms
File systems versus a dbms
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Information Security
Information SecurityInformation Security
Information Security
 
Database concepts
Database conceptsDatabase concepts
Database concepts
 

Similar to Database security

Database Security Presentation Why database Security is important
Database Security Presentation Why database Security is importantDatabase Security Presentation Why database Security is important
Database Security Presentation Why database Security is importantKamruzzamansohel2
 
Database security in database management.pptx
Database security in database management.pptxDatabase security in database management.pptx
Database security in database management.pptxFarhanaMariyam1
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security conceptsG Prachi
 
MobileDBSecurity.pptx
MobileDBSecurity.pptxMobileDBSecurity.pptx
MobileDBSecurity.pptxmissionsk81
 
Week-09-10-11-12 Fundamentals of Cybersecurity.pptx
Week-09-10-11-12 Fundamentals of Cybersecurity.pptxWeek-09-10-11-12 Fundamentals of Cybersecurity.pptx
Week-09-10-11-12 Fundamentals of Cybersecurity.pptxyasirkhokhar7
 
Database Security, Threats & Countermeasures.pptx
Database Security, Threats & Countermeasures.pptxDatabase Security, Threats & Countermeasures.pptx
Database Security, Threats & Countermeasures.pptxSaqibAhmedKhan4
 
databasesecurit-phpapp01.pdf
databasesecurit-phpapp01.pdfdatabasesecurit-phpapp01.pdf
databasesecurit-phpapp01.pdfAnSHiKa187943
 
SECURITY AND CONTROL
SECURITY AND CONTROLSECURITY AND CONTROL
SECURITY AND CONTROLshinydey
 
Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionNicholas Davis
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss PreventionNicholas Davis
 
Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionNicholas Davis
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)Zara Nawaz
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lectureZara Nawaz
 
Database Security And Authentication
Database Security And AuthenticationDatabase Security And Authentication
Database Security And AuthenticationSudeb Das
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedBule Hora University
 

Similar to Database security (20)

203135 Muhammad Usama.pptx
203135 Muhammad Usama.pptx203135 Muhammad Usama.pptx
203135 Muhammad Usama.pptx
 
Database Security Presentation Why database Security is important
Database Security Presentation Why database Security is importantDatabase Security Presentation Why database Security is important
Database Security Presentation Why database Security is important
 
Database security in database management.pptx
Database security in database management.pptxDatabase security in database management.pptx
Database security in database management.pptx
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
MobileDBSecurity.pptx
MobileDBSecurity.pptxMobileDBSecurity.pptx
MobileDBSecurity.pptx
 
Week-09-10-11-12 Fundamentals of Cybersecurity.pptx
Week-09-10-11-12 Fundamentals of Cybersecurity.pptxWeek-09-10-11-12 Fundamentals of Cybersecurity.pptx
Week-09-10-11-12 Fundamentals of Cybersecurity.pptx
 
uu (2).pdf
uu (2).pdfuu (2).pdf
uu (2).pdf
 
Database Security, Threats & Countermeasures.pptx
Database Security, Threats & Countermeasures.pptxDatabase Security, Threats & Countermeasures.pptx
Database Security, Threats & Countermeasures.pptx
 
databasesecurit-phpapp01.pdf
databasesecurit-phpapp01.pdfdatabasesecurit-phpapp01.pdf
databasesecurit-phpapp01.pdf
 
Database security
Database securityDatabase security
Database security
 
SECURITY AND CONTROL
SECURITY AND CONTROLSECURITY AND CONTROL
SECURITY AND CONTROL
 
Dstca
DstcaDstca
Dstca
 
Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss Prevention
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss Prevention
 
Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_prevention
 
System security
System securitySystem security
System security
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
 
Database Security And Authentication
Database Security And AuthenticationDatabase Security And Authentication
Database Security And Authentication
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
 

Recently uploaded

EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Matt Ray
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceBrainSell Technologies
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...Technogeeks
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 

Recently uploaded (20)

EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 

Database security

  • 1. DATABASE SECURITY Presented by: Maryam Asghar - 401 Nurmeen Shahid - 377 Usama Shahbaz - 363 Umar Ejaz - 430 Presented To: Ma’am Maria Tariq
  • 2. OUTLINE • What is database Security? • Need of Database Security • Concepts • Security Problems • Security Controls
  • 3. OVERVIEW • In today’s world, we need everything secured whether it is your mobile phone, computer, vehicle or almost anything. • Securing the DB may be the single biggest action an organization can take to protect its assets. David C. Knox
  • 4. Database: A database is a collection of information that is organized so that can easily be accessed, managed and update. Security: Freedom from risk or danger: safety. Database Security: It is degree to which all data is fully protected from tampering and unauthorized acts.
  • 5. What if there is no Security to database? Data will easily corrupted. It is important to restrict access to the database from authorized users to protect sensitive data. WHAT IF?
  • 6. DATABASE SECURITY: • Database security refers to the collective measures used to protect and secure a database or database management software from illegitimate use and malicious cyber threats and attacks. • Database security procedures are aimed at protecting not just the data inside the database, but the database management system and all the applications that access it from intrusion, misuse of data, and damage.
  • 7. WE CONSIDER DATABASE SECURITY ABOUT THE FOLLOWING SITUATIONS: • Theft and fraudulent. • Loss of confidentiality or secrecy. • Loss of data privacy. • Loss of data integrity. • Loss of availability of data
  • 8. ASPECTS IN DATABASE There are three main aspects in database: • Confidentiality or Secrecy • Integrity • Availability Confidentiality Availability Integrity
  • 9. SECRECY OR CONFIDENTIALITY • It is protecting the database from unauthorized users. • Ensure that users are allowed to do things they are trying to do. Encryption: • Encryption is a technique or a process by which data is encoded in such a way that only that authorized user are able to read the data
  • 10. INTEGRITY • Protecting the database from authorized user. • Ensure that what user are trying to do is allowed or not. For Example: • An employee should be able to modify his or her own information.
  • 11. AVAILABILITY: • Database must have not unplanned downtime. • To ensure this, following steps should be taken • Restrict the amount of the storage space given to each user In the database • Limit the number of concurrent sessions made available to each database user. • Back up the data at periodic intervals to ensure data recovery in case of application users.
  • 12. Security Problems Any circumstance or event with the potential to adversely impact and is through unauthorized access ,destruction ,disclosure , modification of data or denial of service. There are many issues that can arise in database security. Stolen Database Backups SQL Injections Data Leaks Non Fraudulent Threat 1 2 3 4
  • 13. Stolen Database Backups 1 People regularly take backups of their valuable data. Its benefit is that it contains a copy of our data, but that is also a big problem .Mostly focus is on securing the data in the database but when it comes to backup ,many starts to get less concerned.The backups contain same sensitive data and therefore we have to protect them the same way. Anyone that can get a hold of a backup file can just restore the database on one of their own servers, and go about dissecting the sensitive data within it undisturbed. SQL Injections 2 This is a type of attack that hackers use. Hackers identifies vulnerable, SQL driven websites and inject malicious Sql query via input data. Malicious SQL query is validated and command is executed by database.Then the hacker is granted access to view and alter records or potentially act as database administration.
  • 14. A Data Leak can involve information leakage, also known as exfiltration; unauthorized copying or transmission of data, without affecting the source data. Data leak is the release of sensitive, confidential or protected data to an untrusted environment. It can occur as a result of a hacker attack, an inside job by individuals currently or previously employed by an organization, or unintentional loss or exposure of data. This might include certain factors ; ● Natural or accidental disasters ● Human or bug n hardware or software ● Human errors Data Leaks 3 Non Fraudulent Threat 4
  • 16. METHODS OF SECURING THE DATABASE  Authorization - privileges,views.  Encryption - public key / private key, secure sockets.  Authentication –passwords.  Logical - firewalls, net proxies.
  • 18. A FIREWALLis dedicated software on another computer which inspects network traffic passing through it and denies passage based on set of rules. • Basically it is a piece of software that monitors all traffic that goes from your system to another via the Internet or network andViceVersa
  • 19. DATABASE FIREWALL Database Firewalls are a type of Web Application Firewalls that monitor databases to identify and protect against database specific attacks. Purpose:- It is mostly seek to access sensitive information stored in the databases.
  • 20. SECURITY OF THE DATABASE THROUGH ABSTRACTION: • Data encryption enables to encrypt sensitive data, such as credit card numbers, stored in table columns. • Encrypted data is decrypted for a database user who has access to the data. • Data encryption helps protect data stored on media in the event that the storage media or data file gets stolen.