Database security is an important topic in DBMS course. This is my group presentation of this course. We discus three are security aspects, security problems, security controls, database and firewall.
2. OUTLINE
• What is database Security?
• Need of Database Security
• Concepts
• Security Problems
• Security Controls
3. OVERVIEW
• In today’s world, we need everything secured whether it is
your mobile phone, computer, vehicle or almost anything.
• Securing the DB may be the single biggest action
an organization can take to protect its assets.
David C. Knox
4. Database:
A database is a collection of information that is organized so
that can easily be accessed, managed and update.
Security:
Freedom from risk or danger: safety.
Database Security:
It is degree to which all data is fully protected from tampering
and unauthorized acts.
5. What if there is no
Security to database?
Data will easily corrupted.
It is important to restrict
access to the database from
authorized users to protect
sensitive data.
WHAT IF?
6. DATABASE SECURITY:
• Database security refers to the collective measures used to
protect and secure a database or database management
software from illegitimate use and malicious cyber threats and
attacks.
• Database security procedures are aimed at protecting not just
the data inside the database, but the database management
system and all the applications that access it from intrusion,
misuse of data, and damage.
7. WE CONSIDER DATABASE SECURITY
ABOUT THE FOLLOWING SITUATIONS:
• Theft and fraudulent.
• Loss of confidentiality or secrecy.
• Loss of data privacy.
• Loss of data integrity.
• Loss of availability of data
8. ASPECTS IN DATABASE
There are three main aspects in database:
• Confidentiality or Secrecy
• Integrity
• Availability
Confidentiality
Availability
Integrity
9. SECRECY OR CONFIDENTIALITY
• It is protecting the database from unauthorized users.
• Ensure that users are allowed to do things they are trying to do.
Encryption:
• Encryption is a technique or a process by which data is encoded
in such a way that only that authorized user are able to read the
data
10. INTEGRITY
• Protecting the database from authorized user.
• Ensure that what user are trying to do is allowed or not.
For Example:
• An employee should be able to modify his or her own information.
11. AVAILABILITY:
• Database must have not unplanned downtime.
• To ensure this, following steps should be taken
• Restrict the amount of the storage space given to each user
In the database
• Limit the number of concurrent sessions made available to
each database user.
• Back up the data at periodic intervals to ensure data
recovery in case of application users.
12. Security Problems
Any circumstance or event with the potential to adversely
impact and is through unauthorized access ,destruction
,disclosure , modification of data or denial of service.
There are many issues that can arise in database security.
Stolen
Database
Backups
SQL
Injections
Data Leaks
Non
Fraudulent
Threat
1 2 3 4
13. Stolen
Database
Backups
1 People regularly take backups of their valuable data. Its benefit is that it
contains a copy of our data, but that is also a big problem .Mostly focus is on
securing the data in the database but when it comes to backup ,many starts
to get less concerned.The backups contain same sensitive data and
therefore we have to protect them the same way. Anyone that can get a hold
of a backup file can just restore the database on one of their own servers,
and go about dissecting the sensitive data within it undisturbed.
SQL
Injections
2 This is a type of attack that hackers use. Hackers identifies
vulnerable, SQL driven websites and inject malicious Sql query
via input data. Malicious SQL query is validated and command is
executed by database.Then the hacker is granted access to view
and alter records or potentially act as database administration.
14. A Data Leak can involve information leakage, also known as
exfiltration; unauthorized copying or transmission of data, without
affecting the source data. Data leak is the release of sensitive,
confidential or protected data to an untrusted environment. It can
occur as a result of a hacker attack, an inside job by individuals
currently or previously employed by an organization, or
unintentional loss or exposure of data.
This might include certain factors ;
● Natural or accidental disasters
● Human or bug n hardware or software
● Human errors
Data Leaks
3
Non
Fraudulent
Threat
4
18. A FIREWALLis dedicated software on another computer
which inspects network traffic passing through it and
denies passage based on set of rules.
• Basically it is a piece of software that monitors all
traffic that goes from your system to another via the
Internet or network andViceVersa
19. DATABASE FIREWALL
Database Firewalls are a type of Web Application
Firewalls that monitor databases to identify and
protect against database specific attacks.
Purpose:-
It is mostly seek to access sensitive information stored in
the databases.
20. SECURITY OF THE DATABASE
THROUGH ABSTRACTION:
• Data encryption enables to encrypt sensitive data, such
as credit card numbers, stored in table columns.
• Encrypted data is decrypted for a database user who has
access to the data.
• Data encryption helps protect data stored on media in
the event that the storage media or data file gets stolen.