SlideShare a Scribd company logo
1 of 19
Database Security
Introduction
Database:
It is a collection Of information stored in a Computer.
What is Security ?
It is being free from danger.
Database security
It is mechanism that protect the database
against intentional or accidental threats.
Why need of database Security?
If there is no security to database What Happens ???
Data will be easily corrupted
It is important to restrict access to the database from
authorized users to protect sensitive data.
Main aspects of database security
Theft and Fraud
Loss of confidentiality
Loss of privacy
Loss of integrity
Loss of availability
Threats
Threat is
any intentional or accidental event that may
adversely affect the system
Examples of threats:
- Using another person’s log-in name to
access data
- Unauthorized copying data
- Program/Data alteration
- Illegal entry by hacker
-Viruses
There are two kinds of threat
Non-fraudulent threat:
 Natural or accidental disasters
 Error or bugs in hardware or software.
 Human errors
Fraudulent threat.
Authorized Users
Those who abuse their authority.
Hostile agents
Those improper users(outsider or insiders).
Who attack the software and hardware system, or read or write data in a database.
Loss of confidentiality
It is protecting data from unauthorized users.
Ensures that the users are allowed to do things they
are trying to do.
Encryption is a technique or a process by which the
data is encoded in such a way that only that
authorized users are able to read data.
Loss of integrity
It is protecting data from unauthorized users.
Ensures that what users are trying to do is
correct.
For example
An employee should be able to modify his or her own information
Loss of availability
Database must have not unplanned downtime.
To ensure this following steps should be taken.
Restrict the amount of the storage space given to each user in
the database.
Limit the number of concurrent sessions made available to
each database user.
Back up the data at periodic intervals to ensure data recovery
in case of application users.
Countermeasures
Computer-Based Controls:
- Authorization
-Views
- Backup and Recovery
- Integrity
- Encryption
- RAID Technology
Authorization
The granting of a privilege that enable a user to have
a legitimate
access to a system.
They are sometimes referred as access controls.
The process of authorization involves authenticating
the user
requesting access to objects.
Authenticating
A system administrator is responsible
for allowing users to have
access to the system by creating
individual user accounts.
Closed Vs Open Systems
Closed Systems:
Some DBMS required authorization for authorized DBMS users
to access specific objects.
Open Systems:
Allow users to have complete access to all objects within the
database.
Views
The view mechanism provides a powerful and flexible security
mechanism by hiding parts of the database from certain
users.
The user is not aware of the existence of any
attributes or rows
that are missing from the view
Backup & Recovery
Is the process of periodically taking a
copy of the database and log
file on to offline storage media.
DBMS should provide backup facilities to
assist with the recovery
of a database failure.
Integrity
Maintaining a secure database
system by preventing data
from
becoming invalid.
Encryption
The encoding of data by a special
algorithm that renders the data
unreadable by any program without the
decryption key.
It also protects the data transmitted over
communication lines.
RAID
Redundant Array of Independent Disks
The hardware that the DBMS is running on must be fault-tolerant,
meaning that the DBMS should continue to operate even if one
of the hardware components fails.
One solution is the use of RAID technology.
RAID works on having a large disk array comprising an
arrangement of several independent disks that are organized to
improve reliability and at the same time increase performance.

More Related Content

What's hot

Database Security Management
Database Security Management Database Security Management
Database Security Management
Ahsin Yousaf
 
Database administrator
Database administratorDatabase administrator
Database administrator
Tech_MX
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
John Ely Masculino
 

What's hot (20)

DB security
 DB security DB security
DB security
 
Database Security Management
Database Security Management Database Security Management
Database Security Management
 
Web security
Web securityWeb security
Web security
 
Chapter 5 database security
Chapter 5   database securityChapter 5   database security
Chapter 5 database security
 
Database security
Database securityDatabase security
Database security
 
Data base security & integrity
Data base security &  integrityData base security &  integrity
Data base security & integrity
 
Data security
Data securityData security
Data security
 
Distributed database management system
Distributed database management  systemDistributed database management  system
Distributed database management system
 
Data Security
Data SecurityData Security
Data Security
 
multilevel security Database
 multilevel security Database multilevel security Database
multilevel security Database
 
two tier and three tier
two tier and three tiertwo tier and three tier
two tier and three tier
 
Database replication
Database replicationDatabase replication
Database replication
 
Web Security
Web SecurityWeb Security
Web Security
 
Database administrator
Database administratorDatabase administrator
Database administrator
 
Web security
Web securityWeb security
Web security
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Data security
Data securityData security
Data security
 
Lecture 11 - distributed database
Lecture 11 - distributed databaseLecture 11 - distributed database
Lecture 11 - distributed database
 
Cia security model
Cia security modelCia security model
Cia security model
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 

Similar to Database security

Mis presentation by suraj vaidya
Mis presentation by suraj vaidyaMis presentation by suraj vaidya
Mis presentation by suraj vaidya
Suraj Vaidya
 
Security ConceptsDr. Y. ChuCIS3360 Security in Computing.docx
Security ConceptsDr. Y. ChuCIS3360 Security in Computing.docxSecurity ConceptsDr. Y. ChuCIS3360 Security in Computing.docx
Security ConceptsDr. Y. ChuCIS3360 Security in Computing.docx
bagotjesusa
 
Database Security, Threats & Countermeasures.pptx
Database Security, Threats & Countermeasures.pptxDatabase Security, Threats & Countermeasures.pptx
Database Security, Threats & Countermeasures.pptx
SaqibAhmedKhan4
 

Similar to Database security (20)

Database security in database management.pptx
Database security in database management.pptxDatabase security in database management.pptx
Database security in database management.pptx
 
databasesecurit-phpapp01.pdf
databasesecurit-phpapp01.pdfdatabasesecurit-phpapp01.pdf
databasesecurit-phpapp01.pdf
 
uu (2).pdf
uu (2).pdfuu (2).pdf
uu (2).pdf
 
Database security
Database securityDatabase security
Database security
 
Security and management
Security and managementSecurity and management
Security and management
 
Data security and Integrity
Data security and IntegrityData security and Integrity
Data security and Integrity
 
Protection and security
Protection and securityProtection and security
Protection and security
 
Comparative Analysis of Windows and Linux System.pptx
Comparative Analysis of Windows and Linux System.pptxComparative Analysis of Windows and Linux System.pptx
Comparative Analysis of Windows and Linux System.pptx
 
Importance of DBMS.pptx
Importance of DBMS.pptxImportance of DBMS.pptx
Importance of DBMS.pptx
 
5db-security.pdf
5db-security.pdf5db-security.pdf
5db-security.pdf
 
Mis presentation by suraj vaidya
Mis presentation by suraj vaidyaMis presentation by suraj vaidya
Mis presentation by suraj vaidya
 
Locking Down Your Data: Best Practices for Database Security
Locking Down Your Data: Best Practices for Database SecurityLocking Down Your Data: Best Practices for Database Security
Locking Down Your Data: Best Practices for Database Security
 
Dbms ii mca-ch12-security-2013
Dbms ii mca-ch12-security-2013Dbms ii mca-ch12-security-2013
Dbms ii mca-ch12-security-2013
 
Data base security and injection
Data base security and injectionData base security and injection
Data base security and injection
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Computer security
Computer securityComputer security
Computer security
 
A DATABASE SYSTEM SECURITY FRAMEWORK
A DATABASE SYSTEM SECURITY FRAMEWORKA DATABASE SYSTEM SECURITY FRAMEWORK
A DATABASE SYSTEM SECURITY FRAMEWORK
 
A Database System Security Framework
A Database System Security FrameworkA Database System Security Framework
A Database System Security Framework
 
Security ConceptsDr. Y. ChuCIS3360 Security in Computing.docx
Security ConceptsDr. Y. ChuCIS3360 Security in Computing.docxSecurity ConceptsDr. Y. ChuCIS3360 Security in Computing.docx
Security ConceptsDr. Y. ChuCIS3360 Security in Computing.docx
 
Database Security, Threats & Countermeasures.pptx
Database Security, Threats & Countermeasures.pptxDatabase Security, Threats & Countermeasures.pptx
Database Security, Threats & Countermeasures.pptx
 

Recently uploaded

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Recently uploaded (20)

General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health Education
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 

Database security

  • 2. Introduction Database: It is a collection Of information stored in a Computer. What is Security ? It is being free from danger. Database security It is mechanism that protect the database against intentional or accidental threats.
  • 3. Why need of database Security? If there is no security to database What Happens ??? Data will be easily corrupted It is important to restrict access to the database from authorized users to protect sensitive data.
  • 4.
  • 5. Main aspects of database security Theft and Fraud Loss of confidentiality Loss of privacy Loss of integrity Loss of availability
  • 6. Threats Threat is any intentional or accidental event that may adversely affect the system Examples of threats: - Using another person’s log-in name to access data - Unauthorized copying data - Program/Data alteration - Illegal entry by hacker -Viruses
  • 7. There are two kinds of threat Non-fraudulent threat:  Natural or accidental disasters  Error or bugs in hardware or software.  Human errors Fraudulent threat. Authorized Users Those who abuse their authority. Hostile agents Those improper users(outsider or insiders). Who attack the software and hardware system, or read or write data in a database.
  • 8. Loss of confidentiality It is protecting data from unauthorized users. Ensures that the users are allowed to do things they are trying to do. Encryption is a technique or a process by which the data is encoded in such a way that only that authorized users are able to read data.
  • 9. Loss of integrity It is protecting data from unauthorized users. Ensures that what users are trying to do is correct. For example An employee should be able to modify his or her own information
  • 10. Loss of availability Database must have not unplanned downtime. To ensure this following steps should be taken. Restrict the amount of the storage space given to each user in the database. Limit the number of concurrent sessions made available to each database user. Back up the data at periodic intervals to ensure data recovery in case of application users.
  • 11. Countermeasures Computer-Based Controls: - Authorization -Views - Backup and Recovery - Integrity - Encryption - RAID Technology
  • 12. Authorization The granting of a privilege that enable a user to have a legitimate access to a system. They are sometimes referred as access controls. The process of authorization involves authenticating the user requesting access to objects.
  • 13. Authenticating A system administrator is responsible for allowing users to have access to the system by creating individual user accounts.
  • 14. Closed Vs Open Systems Closed Systems: Some DBMS required authorization for authorized DBMS users to access specific objects. Open Systems: Allow users to have complete access to all objects within the database.
  • 15. Views The view mechanism provides a powerful and flexible security mechanism by hiding parts of the database from certain users. The user is not aware of the existence of any attributes or rows that are missing from the view
  • 16. Backup & Recovery Is the process of periodically taking a copy of the database and log file on to offline storage media. DBMS should provide backup facilities to assist with the recovery of a database failure.
  • 17. Integrity Maintaining a secure database system by preventing data from becoming invalid.
  • 18. Encryption The encoding of data by a special algorithm that renders the data unreadable by any program without the decryption key. It also protects the data transmitted over communication lines.
  • 19. RAID Redundant Array of Independent Disks The hardware that the DBMS is running on must be fault-tolerant, meaning that the DBMS should continue to operate even if one of the hardware components fails. One solution is the use of RAID technology. RAID works on having a large disk array comprising an arrangement of several independent disks that are organized to improve reliability and at the same time increase performance.