SlideShare a Scribd company logo
Database Security, Threats &
Countermeasures
1
PREPARED BY : YourName
UniversityName, City, Country
EMAIL : YourEmailAddress
What is Database Security.?
DataBase
2
It is a collection of information stored in computer
What is Database Security.?
DataBase
It is a collection of information stored in computer
Security
3
It is being free from danger
What is Database Security.?
Database Security
It is the mechanism that protect the database against intentional or
accidental threats.
Or
Protection from malicious attempts to steal (view) or modify data.
DataBase
It is a collection of information stored in computer
Security
4
It is being free from danger
Security risk to database includes
5
• Bank Accounts
• Credit card, salary, income tax data
• University Admissions, marks/grades
• Land records, licences
What is Threats.?
6
Threats – Any situation or event, whether intentional or accidental, that may
adversely affect a system and consequently the organization.
• Computer System
• Databases
Threats
Hardware :
Fire/Flood/Bomb
Data corruption
due to power loss
7
DBMS & Application s/w :
Failure of security mechanism
giving greater access
Theft of program
Database :
Unauthorized access or
copying of data
Data corruption
Communication Networks :
Wire tapping
Breaking or disconnection of
cables
Definition of Database Security
Database security is defined as the process by which “Confidentiality, integrity, and
Availability” of the database can be protected.
8
Countermeasure
• Authorization
• Access Control
• Views
• Backup and Recovery
• Encryption
• RAID Technology
Database Security Concepts
9
Three main aspects :
• Confidentiality
• Integrity
• Availability
Threats to database :
• Loss of Integrity
• Loss of Availability
• Loss of Confidentiality
Confidentiality
• No one can read our data / communication unless we want them to
• It is protecting the database from unauthorized users.
• Ensures that users are allowed to do the things they are trying to do.
• For example :
• The employees should not see the salaries of their managers.
Data
10
Integrity
• No one can manipulate our data / processing / communication unless we want them
to
• Protecting the database from authorized users
• Ensures that what users are trying to do is correct
• For example :
• An employee should be able to modify his or her own information
Data
11
Availability
• We can access our data / conduct our processing / use our communication
capabilities when we want to
• Authorized users should be able to access data for legal purpose as necessary
• For example
• Payment orders regarding taxes should be made on time by the tax law
Data
Availability
12
Relationship between Confidentiality,
Integrity and Availability
Confidentiality
Integrity
Secure
Availability
Data
13
Methods for securing the Database
14
• Authorization – privileges, vies.
• Encryption – public key / private key, secure sockets.
• Authentication – passwords
• Logical – firewalls, net proxies.
Security of the database through
FIREWALLS
15
• A FIREWALL is dedicated software on another computer which inspects network
traffic passing through it and denies (or) permits passage based on set of rules.
• Basically it is a piece of software that monitors all traffic that goes from your system
to another via the internet or network and vice versa.
• Database FIREWALLS are type of Web Application Firewalls that monitor databases
to identify and protect against database specific attack that mostly seek to access
sensitive information stored in the database.
How database FIREWALL works
16
• The database firewalls includes a set of pre-defined, customizable security audit
policies and they can identify database attacks based on threat patterns called
signatures.
• The SQL input statements (or) queries are compared to these signatures, which are
updated frequently by the vendors to identify known attacks on the databases.
• Database firewalls build (or come with) white list of approved SQL Commands (or)
statements that are safe.
• All the input commands are compared with this white list and only those that are
already present in the white list are sent to the database.
Advantages of using FIREWALLS
17
• Database firewalls maintains the black list of certain specific and potential harmful
commands (or) SQL statements and do not allow this type of inputs.
• Database firewalls identifies the database, operating system and protocol
vulnerabilities in the databases and intimate the administrator, who can take steps
to patch them.
• Database firewalls monitors for database responses (from the db server) to block
potential data leakage.
• Database firewalls notifies the suspicious activity, instead of blocking them right
away.
How data encryption works
18
• Data encryption is a key-based access control system. Even if the encrypted data is
received, it cannot be understood until authorized decryption occurs, which is
automatic for users authorized to access the tables.
• When a table contains the encrypted columns, a single key is used regardless of the
number of encrypted columns. This key is called the column encryption key.
• The column encryption key for all tables, containing encrypted columns, are
encrypted with the database server master encryption key and stored in a dictionary
table in the database.
• The master encryption key is stored in an external security module that is outside the
database and accessible only to the security administrator.
Advantages of Data Encryption
19
• As a security administrator, one can sure that sensitive data is safe in case the storage
media or data file gets stolen.
• You do not need to create triggers or views to decrypt data. Data from tables is
decrypted for the database user.
• Database users need not be aware of the fact that the data they are accessing is
stored in encrypted form. Data is transparently decrypted for the database users and
does not require an action on their part.
• Applications need not be modified to handle encrypted data. Data
encryption/decryption is managed by the database.
Authorization
20
• Read Authorization – allows reading, but not modification of data
• Insert authorization – allows insertion of new data, but not modification of existing
data
• Update authorization – allows modification, but not deletion of data
• Delete authorization – allows deletion of data.
Security Controls
21
• Type of Database Security controls
1. Flow Control
2. Inference Control
3. Access Control
Flow Control
22
• Flow controls regulates the distribution (flow) of information among accessible
objects.
• A flow between object X and object Y occurs when a statement reads values from X
and writes into Y.
• Copying data from X to Y is the typical example of information flow.
Inference Control
23
• Inference control aim at protecting data from indirect deletion.
• Information inference occurs when: a set X of data items to be read by a user can be
used to get the set Y of data.
• An inference channel is a channel where users can find an item X and then use X to
get Y as Y=f(X)
Access Control
24
• Access control in information system are responsible for ensuring that all direct
accesses to the system objects occur base on models and rules fixed by protection
policies.
• An access control system includes :
• Subjects (Users, processes)
• Who access objects (data, programs)
• Through operations (‘read’ , ‘write’, ‘run’)
Conclusion
25
• The goal of database security is to protect your critical and confidential data from
unauthorized access.
• Each organization should have a data security policy, which is a set of high-level
guidelines determined by:
• User requirements.
• Environmental aspects.
• Internal regulations.
• Governmental laws.
Thank you 
26

More Related Content

What's hot

Database security
Database securityDatabase security
Database security
afzaalkhalid1
 
How to Migrate from Oracle to EDB Postgres
How to Migrate from Oracle to EDB PostgresHow to Migrate from Oracle to EDB Postgres
How to Migrate from Oracle to EDB Postgres
Ashnikbiz
 
User, roles and privileges
User, roles and privilegesUser, roles and privileges
User, roles and privileges
Yogiji Creations
 
Oracle Enterprise Manager Cloud Control 13c for DBAs
Oracle Enterprise Manager Cloud Control 13c for DBAsOracle Enterprise Manager Cloud Control 13c for DBAs
Oracle Enterprise Manager Cloud Control 13c for DBAs
Gokhan Atil
 
Database system environment ppt.
Database system environment ppt.Database system environment ppt.
Database system environment ppt.
yhen06
 
Oracle Tablespace - Basic
Oracle Tablespace - BasicOracle Tablespace - Basic
Oracle Tablespace - Basic
Eryk Budi Pratama
 
Database Security
Database SecurityDatabase Security
Database Security
alraee
 
Owasp top 10 vulnerabilities
Owasp top 10 vulnerabilitiesOwasp top 10 vulnerabilities
Owasp top 10 vulnerabilities
OWASP Delhi
 
Emerging Trends in Data Engineering
Emerging Trends in Data EngineeringEmerging Trends in Data Engineering
Emerging Trends in Data Engineering
Ananth PackkilDurai
 
Chapter 5 database security
Chapter 5   database securityChapter 5   database security
Chapter 5 database security
Syaiful Ahdan
 
Database security
Database securityDatabase security
Database security
CAS
 
Backup And Recovery
Backup And RecoveryBackup And Recovery
Backup And Recovery
raghu_designer
 
Oracle database performance tuning
Oracle database performance tuningOracle database performance tuning
Oracle database performance tuning
Yogiji Creations
 
Introducing Oracle Audit Vault and Database Firewall
Introducing Oracle Audit Vault and Database FirewallIntroducing Oracle Audit Vault and Database Firewall
Introducing Oracle Audit Vault and Database Firewall
Troy Kitch
 
Chapter 1 introduction to sql server
Chapter 1 introduction to sql serverChapter 1 introduction to sql server
Chapter 1 introduction to sql server
baabtra.com - No. 1 supplier of quality freshers
 
Sql injection
Sql injectionSql injection
Sql injection
Hemendra Kumar
 
DB security
 DB security DB security
DB security
ERSHUBHAM TIWARI
 
AV/DF Advanced Security Option
AV/DF Advanced Security OptionAV/DF Advanced Security Option
AV/DF Advanced Security Option
DLT Solutions
 
Database security
Database securityDatabase security
Database security
Software Engineering
 
Types of access control systems
Types of access control systemsTypes of access control systems
Types of access control systems
SecurePass
 

What's hot (20)

Database security
Database securityDatabase security
Database security
 
How to Migrate from Oracle to EDB Postgres
How to Migrate from Oracle to EDB PostgresHow to Migrate from Oracle to EDB Postgres
How to Migrate from Oracle to EDB Postgres
 
User, roles and privileges
User, roles and privilegesUser, roles and privileges
User, roles and privileges
 
Oracle Enterprise Manager Cloud Control 13c for DBAs
Oracle Enterprise Manager Cloud Control 13c for DBAsOracle Enterprise Manager Cloud Control 13c for DBAs
Oracle Enterprise Manager Cloud Control 13c for DBAs
 
Database system environment ppt.
Database system environment ppt.Database system environment ppt.
Database system environment ppt.
 
Oracle Tablespace - Basic
Oracle Tablespace - BasicOracle Tablespace - Basic
Oracle Tablespace - Basic
 
Database Security
Database SecurityDatabase Security
Database Security
 
Owasp top 10 vulnerabilities
Owasp top 10 vulnerabilitiesOwasp top 10 vulnerabilities
Owasp top 10 vulnerabilities
 
Emerging Trends in Data Engineering
Emerging Trends in Data EngineeringEmerging Trends in Data Engineering
Emerging Trends in Data Engineering
 
Chapter 5 database security
Chapter 5   database securityChapter 5   database security
Chapter 5 database security
 
Database security
Database securityDatabase security
Database security
 
Backup And Recovery
Backup And RecoveryBackup And Recovery
Backup And Recovery
 
Oracle database performance tuning
Oracle database performance tuningOracle database performance tuning
Oracle database performance tuning
 
Introducing Oracle Audit Vault and Database Firewall
Introducing Oracle Audit Vault and Database FirewallIntroducing Oracle Audit Vault and Database Firewall
Introducing Oracle Audit Vault and Database Firewall
 
Chapter 1 introduction to sql server
Chapter 1 introduction to sql serverChapter 1 introduction to sql server
Chapter 1 introduction to sql server
 
Sql injection
Sql injectionSql injection
Sql injection
 
DB security
 DB security DB security
DB security
 
AV/DF Advanced Security Option
AV/DF Advanced Security OptionAV/DF Advanced Security Option
AV/DF Advanced Security Option
 
Database security
Database securityDatabase security
Database security
 
Types of access control systems
Types of access control systemsTypes of access control systems
Types of access control systems
 

Similar to Database Security, Threats & Countermeasures.pptx

Database security
Database securityDatabase security
Database security
Birju Tank
 
Database security in database management.pptx
Database security in database management.pptxDatabase security in database management.pptx
Database security in database management.pptx
FarhanaMariyam1
 
MobileDBSecurity.pptx
MobileDBSecurity.pptxMobileDBSecurity.pptx
MobileDBSecurity.pptx
missionsk81
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
G Prachi
 
203135 Muhammad Usama.pptx
203135 Muhammad Usama.pptx203135 Muhammad Usama.pptx
203135 Muhammad Usama.pptx
muhammadusama257191
 
Data security and Integrity
Data security and IntegrityData security and Integrity
Data security and Integrity
Zaid Shabbir
 
Importance of DBMS.pptx
Importance of DBMS.pptxImportance of DBMS.pptx
Importance of DBMS.pptx
Green University of Bangladesh
 
Database security
Database securityDatabase security
Database security
MaryamAsghar9
 
Comparative Analysis of Windows and Linux System.pptx
Comparative Analysis of Windows and Linux System.pptxComparative Analysis of Windows and Linux System.pptx
Comparative Analysis of Windows and Linux System.pptx
Green University of Bangladesh
 
Database Security Management
Database Security Management Database Security Management
Database Security Management
Ahsin Yousaf
 
Database managementsystemes_Unit-7.pptxe
Database managementsystemes_Unit-7.pptxeDatabase managementsystemes_Unit-7.pptxe
Database managementsystemes_Unit-7.pptxe
chnrketan
 
Database security
Database securityDatabase security
Database security
Mehrdad Jingoism
 
System security
System securitySystem security
System security
ReachLocal Services India
 
uu (2).pdf
uu (2).pdfuu (2).pdf
uu (2).pdf
uzairAsif268
 
Database Security Presentation Why database Security is important
Database Security Presentation Why database Security is importantDatabase Security Presentation Why database Security is important
Database Security Presentation Why database Security is important
Kamruzzamansohel2
 
Data Network Security
Data Network SecurityData Network Security
Data Network Security
Atif Rehmat
 
Week-09-10-11-12 Fundamentals of Cybersecurity.pptx
Week-09-10-11-12 Fundamentals of Cybersecurity.pptxWeek-09-10-11-12 Fundamentals of Cybersecurity.pptx
Week-09-10-11-12 Fundamentals of Cybersecurity.pptx
yasirkhokhar7
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
Seth Nurul
 
databasesecurit-phpapp01.pdf
databasesecurit-phpapp01.pdfdatabasesecurit-phpapp01.pdf
databasesecurit-phpapp01.pdf
AnSHiKa187943
 
System Security Sem 2(Module 1).pptx
System Security Sem 2(Module     1).pptxSystem Security Sem 2(Module     1).pptx
System Security Sem 2(Module 1).pptx
rahulkumarcscsf21
 

Similar to Database Security, Threats & Countermeasures.pptx (20)

Database security
Database securityDatabase security
Database security
 
Database security in database management.pptx
Database security in database management.pptxDatabase security in database management.pptx
Database security in database management.pptx
 
MobileDBSecurity.pptx
MobileDBSecurity.pptxMobileDBSecurity.pptx
MobileDBSecurity.pptx
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
203135 Muhammad Usama.pptx
203135 Muhammad Usama.pptx203135 Muhammad Usama.pptx
203135 Muhammad Usama.pptx
 
Data security and Integrity
Data security and IntegrityData security and Integrity
Data security and Integrity
 
Importance of DBMS.pptx
Importance of DBMS.pptxImportance of DBMS.pptx
Importance of DBMS.pptx
 
Database security
Database securityDatabase security
Database security
 
Comparative Analysis of Windows and Linux System.pptx
Comparative Analysis of Windows and Linux System.pptxComparative Analysis of Windows and Linux System.pptx
Comparative Analysis of Windows and Linux System.pptx
 
Database Security Management
Database Security Management Database Security Management
Database Security Management
 
Database managementsystemes_Unit-7.pptxe
Database managementsystemes_Unit-7.pptxeDatabase managementsystemes_Unit-7.pptxe
Database managementsystemes_Unit-7.pptxe
 
Database security
Database securityDatabase security
Database security
 
System security
System securitySystem security
System security
 
uu (2).pdf
uu (2).pdfuu (2).pdf
uu (2).pdf
 
Database Security Presentation Why database Security is important
Database Security Presentation Why database Security is importantDatabase Security Presentation Why database Security is important
Database Security Presentation Why database Security is important
 
Data Network Security
Data Network SecurityData Network Security
Data Network Security
 
Week-09-10-11-12 Fundamentals of Cybersecurity.pptx
Week-09-10-11-12 Fundamentals of Cybersecurity.pptxWeek-09-10-11-12 Fundamentals of Cybersecurity.pptx
Week-09-10-11-12 Fundamentals of Cybersecurity.pptx
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
databasesecurit-phpapp01.pdf
databasesecurit-phpapp01.pdfdatabasesecurit-phpapp01.pdf
databasesecurit-phpapp01.pdf
 
System Security Sem 2(Module 1).pptx
System Security Sem 2(Module     1).pptxSystem Security Sem 2(Module     1).pptx
System Security Sem 2(Module 1).pptx
 

More from SaqibAhmedKhan4

Lecture_Network Design, InterVlan Routing and Trunking_.pptx
Lecture_Network Design, InterVlan Routing and Trunking_.pptxLecture_Network Design, InterVlan Routing and Trunking_.pptx
Lecture_Network Design, InterVlan Routing and Trunking_.pptx
SaqibAhmedKhan4
 
NetEss_Lecture Notes 1 (1).pptx
NetEss_Lecture Notes 1 (1).pptxNetEss_Lecture Notes 1 (1).pptx
NetEss_Lecture Notes 1 (1).pptx
SaqibAhmedKhan4
 
Lecture Notes- Network Services - Copy.pptx
Lecture Notes- Network Services - Copy.pptxLecture Notes- Network Services - Copy.pptx
Lecture Notes- Network Services - Copy.pptx
SaqibAhmedKhan4
 
Notion.pptx
Notion.pptxNotion.pptx
Notion.pptx
SaqibAhmedKhan4
 
CPS Theory Presentation.pptx
CPS Theory Presentation.pptxCPS Theory Presentation.pptx
CPS Theory Presentation.pptx
SaqibAhmedKhan4
 
Mental Health.pptx
Mental Health.pptxMental Health.pptx
Mental Health.pptx
SaqibAhmedKhan4
 
Wireless Network Design for Walmart.pptx
Wireless Network Design for Walmart.pptxWireless Network Design for Walmart.pptx
Wireless Network Design for Walmart.pptx
SaqibAhmedKhan4
 

More from SaqibAhmedKhan4 (7)

Lecture_Network Design, InterVlan Routing and Trunking_.pptx
Lecture_Network Design, InterVlan Routing and Trunking_.pptxLecture_Network Design, InterVlan Routing and Trunking_.pptx
Lecture_Network Design, InterVlan Routing and Trunking_.pptx
 
NetEss_Lecture Notes 1 (1).pptx
NetEss_Lecture Notes 1 (1).pptxNetEss_Lecture Notes 1 (1).pptx
NetEss_Lecture Notes 1 (1).pptx
 
Lecture Notes- Network Services - Copy.pptx
Lecture Notes- Network Services - Copy.pptxLecture Notes- Network Services - Copy.pptx
Lecture Notes- Network Services - Copy.pptx
 
Notion.pptx
Notion.pptxNotion.pptx
Notion.pptx
 
CPS Theory Presentation.pptx
CPS Theory Presentation.pptxCPS Theory Presentation.pptx
CPS Theory Presentation.pptx
 
Mental Health.pptx
Mental Health.pptxMental Health.pptx
Mental Health.pptx
 
Wireless Network Design for Walmart.pptx
Wireless Network Design for Walmart.pptxWireless Network Design for Walmart.pptx
Wireless Network Design for Walmart.pptx
 

Recently uploaded

TRUE BOOK OF LIFE 1.15 OF TRUE JESUS CHRIST
TRUE BOOK OF LIFE 1.15 OF TRUE JESUS CHRISTTRUE BOOK OF LIFE 1.15 OF TRUE JESUS CHRIST
TRUE BOOK OF LIFE 1.15 OF TRUE JESUS CHRIST
Cheong Man Keong
 
Item # 10 -- Historical Presv. Districts
Item # 10 -- Historical Presv. DistrictsItem # 10 -- Historical Presv. Districts
Item # 10 -- Historical Presv. Districts
ahcitycouncil
 
Bharat Mata - History of Indian culture.pdf
Bharat Mata - History of Indian culture.pdfBharat Mata - History of Indian culture.pdf
Bharat Mata - History of Indian culture.pdf
Bharat Mata
 
CBO's Immigration Projections - Presentation
CBO's Immigration Projections - PresentationCBO's Immigration Projections - Presentation
CBO's Immigration Projections - Presentation
Congressional Budget Office
 
快速办理(Bristol毕业证书)布里斯托大学毕业证Offer一模一样
快速办理(Bristol毕业证书)布里斯托大学毕业证Offer一模一样快速办理(Bristol毕业证书)布里斯托大学毕业证Offer一模一样
快速办理(Bristol毕业证书)布里斯托大学毕业证Offer一模一样
3woawyyl
 
PPT Item # 5 - 318 Tuxedo Ave. (sign. review)
PPT Item # 5 - 318 Tuxedo Ave. (sign. review)PPT Item # 5 - 318 Tuxedo Ave. (sign. review)
PPT Item # 5 - 318 Tuxedo Ave. (sign. review)
ahcitycouncil
 
在线办理(英国UEA毕业证书)东英格利亚大学毕业证成绩单一模一样
在线办理(英国UEA毕业证书)东英格利亚大学毕业证成绩单一模一样在线办理(英国UEA毕业证书)东英格利亚大学毕业证成绩单一模一样
在线办理(英国UEA毕业证书)东英格利亚大学毕业证成绩单一模一样
3woawyyl
 
karnataka housing board schemes . all schemes
karnataka housing board schemes . all schemeskarnataka housing board schemes . all schemes
karnataka housing board schemes . all schemes
narinav14
 
Indira awas yojana housing scheme renamed as PMAY
Indira awas yojana housing scheme renamed as PMAYIndira awas yojana housing scheme renamed as PMAY
Indira awas yojana housing scheme renamed as PMAY
narinav14
 
在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样
在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样
在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样
9d5c8i83
 
一比一原版(Adelaide毕业证)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证)阿德莱德大学毕业证如何办理
teeaszt
 
原版制作(Hope毕业证书)利物浦霍普大学毕业证文凭证书一模一样
原版制作(Hope毕业证书)利物浦霍普大学毕业证文凭证书一模一样原版制作(Hope毕业证书)利物浦霍普大学毕业证文凭证书一模一样
原版制作(Hope毕业证书)利物浦霍普大学毕业证文凭证书一模一样
ii2sh2v
 
PPT Item # 8&9 - Demolition Code Amendments
PPT Item # 8&9 - Demolition Code AmendmentsPPT Item # 8&9 - Demolition Code Amendments
PPT Item # 8&9 - Demolition Code Amendments
ahcitycouncil
 
PPT Item # 7 - 231 Encino Avenue (sign. review)
PPT Item # 7 - 231 Encino Avenue (sign. review)PPT Item # 7 - 231 Encino Avenue (sign. review)
PPT Item # 7 - 231 Encino Avenue (sign. review)
ahcitycouncil
 
一比一原版(theauckland毕业证书)新西兰奥克兰大学毕业证成绩单如何办理
一比一原版(theauckland毕业证书)新西兰奥克兰大学毕业证成绩单如何办理一比一原版(theauckland毕业证书)新西兰奥克兰大学毕业证成绩单如何办理
一比一原版(theauckland毕业证书)新西兰奥克兰大学毕业证成绩单如何办理
odmqk
 
2024: The FAR - Federal Acquisition Regulations, Part 40
2024: The FAR - Federal Acquisition Regulations, Part 402024: The FAR - Federal Acquisition Regulations, Part 40
2024: The FAR - Federal Acquisition Regulations, Part 40
JSchaus & Associates
 
加急办理华威大学毕业证硕士文凭证书原版一模一样
加急办理华威大学毕业证硕士文凭证书原版一模一样加急办理华威大学毕业证硕士文凭证书原版一模一样
加急办理华威大学毕业证硕士文凭证书原版一模一样
uu1psyf6
 
Milton Keynes Hospital Charity - A guide to leaving a gift in your Will
Milton Keynes Hospital Charity - A guide to leaving a gift in your WillMilton Keynes Hospital Charity - A guide to leaving a gift in your Will
Milton Keynes Hospital Charity - A guide to leaving a gift in your Will
fundraising4
 
AHMR volume 10 number 1 January-April 2024
AHMR volume 10 number 1 January-April 2024AHMR volume 10 number 1 January-April 2024
AHMR volume 10 number 1 January-April 2024
Scalabrini Institute for Human Mobility in Africa
 
ColombiaPresentation.pptx macroeconomics
ColombiaPresentation.pptx macroeconomicsColombiaPresentation.pptx macroeconomics
ColombiaPresentation.pptx macroeconomics
JuanFelipeHerrera4
 

Recently uploaded (20)

TRUE BOOK OF LIFE 1.15 OF TRUE JESUS CHRIST
TRUE BOOK OF LIFE 1.15 OF TRUE JESUS CHRISTTRUE BOOK OF LIFE 1.15 OF TRUE JESUS CHRIST
TRUE BOOK OF LIFE 1.15 OF TRUE JESUS CHRIST
 
Item # 10 -- Historical Presv. Districts
Item # 10 -- Historical Presv. DistrictsItem # 10 -- Historical Presv. Districts
Item # 10 -- Historical Presv. Districts
 
Bharat Mata - History of Indian culture.pdf
Bharat Mata - History of Indian culture.pdfBharat Mata - History of Indian culture.pdf
Bharat Mata - History of Indian culture.pdf
 
CBO's Immigration Projections - Presentation
CBO's Immigration Projections - PresentationCBO's Immigration Projections - Presentation
CBO's Immigration Projections - Presentation
 
快速办理(Bristol毕业证书)布里斯托大学毕业证Offer一模一样
快速办理(Bristol毕业证书)布里斯托大学毕业证Offer一模一样快速办理(Bristol毕业证书)布里斯托大学毕业证Offer一模一样
快速办理(Bristol毕业证书)布里斯托大学毕业证Offer一模一样
 
PPT Item # 5 - 318 Tuxedo Ave. (sign. review)
PPT Item # 5 - 318 Tuxedo Ave. (sign. review)PPT Item # 5 - 318 Tuxedo Ave. (sign. review)
PPT Item # 5 - 318 Tuxedo Ave. (sign. review)
 
在线办理(英国UEA毕业证书)东英格利亚大学毕业证成绩单一模一样
在线办理(英国UEA毕业证书)东英格利亚大学毕业证成绩单一模一样在线办理(英国UEA毕业证书)东英格利亚大学毕业证成绩单一模一样
在线办理(英国UEA毕业证书)东英格利亚大学毕业证成绩单一模一样
 
karnataka housing board schemes . all schemes
karnataka housing board schemes . all schemeskarnataka housing board schemes . all schemes
karnataka housing board schemes . all schemes
 
Indira awas yojana housing scheme renamed as PMAY
Indira awas yojana housing scheme renamed as PMAYIndira awas yojana housing scheme renamed as PMAY
Indira awas yojana housing scheme renamed as PMAY
 
在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样
在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样
在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样
 
一比一原版(Adelaide毕业证)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证)阿德莱德大学毕业证如何办理
 
原版制作(Hope毕业证书)利物浦霍普大学毕业证文凭证书一模一样
原版制作(Hope毕业证书)利物浦霍普大学毕业证文凭证书一模一样原版制作(Hope毕业证书)利物浦霍普大学毕业证文凭证书一模一样
原版制作(Hope毕业证书)利物浦霍普大学毕业证文凭证书一模一样
 
PPT Item # 8&9 - Demolition Code Amendments
PPT Item # 8&9 - Demolition Code AmendmentsPPT Item # 8&9 - Demolition Code Amendments
PPT Item # 8&9 - Demolition Code Amendments
 
PPT Item # 7 - 231 Encino Avenue (sign. review)
PPT Item # 7 - 231 Encino Avenue (sign. review)PPT Item # 7 - 231 Encino Avenue (sign. review)
PPT Item # 7 - 231 Encino Avenue (sign. review)
 
一比一原版(theauckland毕业证书)新西兰奥克兰大学毕业证成绩单如何办理
一比一原版(theauckland毕业证书)新西兰奥克兰大学毕业证成绩单如何办理一比一原版(theauckland毕业证书)新西兰奥克兰大学毕业证成绩单如何办理
一比一原版(theauckland毕业证书)新西兰奥克兰大学毕业证成绩单如何办理
 
2024: The FAR - Federal Acquisition Regulations, Part 40
2024: The FAR - Federal Acquisition Regulations, Part 402024: The FAR - Federal Acquisition Regulations, Part 40
2024: The FAR - Federal Acquisition Regulations, Part 40
 
加急办理华威大学毕业证硕士文凭证书原版一模一样
加急办理华威大学毕业证硕士文凭证书原版一模一样加急办理华威大学毕业证硕士文凭证书原版一模一样
加急办理华威大学毕业证硕士文凭证书原版一模一样
 
Milton Keynes Hospital Charity - A guide to leaving a gift in your Will
Milton Keynes Hospital Charity - A guide to leaving a gift in your WillMilton Keynes Hospital Charity - A guide to leaving a gift in your Will
Milton Keynes Hospital Charity - A guide to leaving a gift in your Will
 
AHMR volume 10 number 1 January-April 2024
AHMR volume 10 number 1 January-April 2024AHMR volume 10 number 1 January-April 2024
AHMR volume 10 number 1 January-April 2024
 
ColombiaPresentation.pptx macroeconomics
ColombiaPresentation.pptx macroeconomicsColombiaPresentation.pptx macroeconomics
ColombiaPresentation.pptx macroeconomics
 

Database Security, Threats & Countermeasures.pptx

  • 1. Database Security, Threats & Countermeasures 1 PREPARED BY : YourName UniversityName, City, Country EMAIL : YourEmailAddress
  • 2. What is Database Security.? DataBase 2 It is a collection of information stored in computer
  • 3. What is Database Security.? DataBase It is a collection of information stored in computer Security 3 It is being free from danger
  • 4. What is Database Security.? Database Security It is the mechanism that protect the database against intentional or accidental threats. Or Protection from malicious attempts to steal (view) or modify data. DataBase It is a collection of information stored in computer Security 4 It is being free from danger
  • 5. Security risk to database includes 5 • Bank Accounts • Credit card, salary, income tax data • University Admissions, marks/grades • Land records, licences
  • 6. What is Threats.? 6 Threats – Any situation or event, whether intentional or accidental, that may adversely affect a system and consequently the organization. • Computer System • Databases
  • 7. Threats Hardware : Fire/Flood/Bomb Data corruption due to power loss 7 DBMS & Application s/w : Failure of security mechanism giving greater access Theft of program Database : Unauthorized access or copying of data Data corruption Communication Networks : Wire tapping Breaking or disconnection of cables
  • 8. Definition of Database Security Database security is defined as the process by which “Confidentiality, integrity, and Availability” of the database can be protected. 8 Countermeasure • Authorization • Access Control • Views • Backup and Recovery • Encryption • RAID Technology
  • 9. Database Security Concepts 9 Three main aspects : • Confidentiality • Integrity • Availability Threats to database : • Loss of Integrity • Loss of Availability • Loss of Confidentiality
  • 10. Confidentiality • No one can read our data / communication unless we want them to • It is protecting the database from unauthorized users. • Ensures that users are allowed to do the things they are trying to do. • For example : • The employees should not see the salaries of their managers. Data 10
  • 11. Integrity • No one can manipulate our data / processing / communication unless we want them to • Protecting the database from authorized users • Ensures that what users are trying to do is correct • For example : • An employee should be able to modify his or her own information Data 11
  • 12. Availability • We can access our data / conduct our processing / use our communication capabilities when we want to • Authorized users should be able to access data for legal purpose as necessary • For example • Payment orders regarding taxes should be made on time by the tax law Data Availability 12
  • 13. Relationship between Confidentiality, Integrity and Availability Confidentiality Integrity Secure Availability Data 13
  • 14. Methods for securing the Database 14 • Authorization – privileges, vies. • Encryption – public key / private key, secure sockets. • Authentication – passwords • Logical – firewalls, net proxies.
  • 15. Security of the database through FIREWALLS 15 • A FIREWALL is dedicated software on another computer which inspects network traffic passing through it and denies (or) permits passage based on set of rules. • Basically it is a piece of software that monitors all traffic that goes from your system to another via the internet or network and vice versa. • Database FIREWALLS are type of Web Application Firewalls that monitor databases to identify and protect against database specific attack that mostly seek to access sensitive information stored in the database.
  • 16. How database FIREWALL works 16 • The database firewalls includes a set of pre-defined, customizable security audit policies and they can identify database attacks based on threat patterns called signatures. • The SQL input statements (or) queries are compared to these signatures, which are updated frequently by the vendors to identify known attacks on the databases. • Database firewalls build (or come with) white list of approved SQL Commands (or) statements that are safe. • All the input commands are compared with this white list and only those that are already present in the white list are sent to the database.
  • 17. Advantages of using FIREWALLS 17 • Database firewalls maintains the black list of certain specific and potential harmful commands (or) SQL statements and do not allow this type of inputs. • Database firewalls identifies the database, operating system and protocol vulnerabilities in the databases and intimate the administrator, who can take steps to patch them. • Database firewalls monitors for database responses (from the db server) to block potential data leakage. • Database firewalls notifies the suspicious activity, instead of blocking them right away.
  • 18. How data encryption works 18 • Data encryption is a key-based access control system. Even if the encrypted data is received, it cannot be understood until authorized decryption occurs, which is automatic for users authorized to access the tables. • When a table contains the encrypted columns, a single key is used regardless of the number of encrypted columns. This key is called the column encryption key. • The column encryption key for all tables, containing encrypted columns, are encrypted with the database server master encryption key and stored in a dictionary table in the database. • The master encryption key is stored in an external security module that is outside the database and accessible only to the security administrator.
  • 19. Advantages of Data Encryption 19 • As a security administrator, one can sure that sensitive data is safe in case the storage media or data file gets stolen. • You do not need to create triggers or views to decrypt data. Data from tables is decrypted for the database user. • Database users need not be aware of the fact that the data they are accessing is stored in encrypted form. Data is transparently decrypted for the database users and does not require an action on their part. • Applications need not be modified to handle encrypted data. Data encryption/decryption is managed by the database.
  • 20. Authorization 20 • Read Authorization – allows reading, but not modification of data • Insert authorization – allows insertion of new data, but not modification of existing data • Update authorization – allows modification, but not deletion of data • Delete authorization – allows deletion of data.
  • 21. Security Controls 21 • Type of Database Security controls 1. Flow Control 2. Inference Control 3. Access Control
  • 22. Flow Control 22 • Flow controls regulates the distribution (flow) of information among accessible objects. • A flow between object X and object Y occurs when a statement reads values from X and writes into Y. • Copying data from X to Y is the typical example of information flow.
  • 23. Inference Control 23 • Inference control aim at protecting data from indirect deletion. • Information inference occurs when: a set X of data items to be read by a user can be used to get the set Y of data. • An inference channel is a channel where users can find an item X and then use X to get Y as Y=f(X)
  • 24. Access Control 24 • Access control in information system are responsible for ensuring that all direct accesses to the system objects occur base on models and rules fixed by protection policies. • An access control system includes : • Subjects (Users, processes) • Who access objects (data, programs) • Through operations (‘read’ , ‘write’, ‘run’)
  • 25. Conclusion 25 • The goal of database security is to protect your critical and confidential data from unauthorized access. • Each organization should have a data security policy, which is a set of high-level guidelines determined by: • User requirements. • Environmental aspects. • Internal regulations. • Governmental laws.