SlideShare a Scribd company logo
1 of 16
ImportanceofDatabaseSecurity
Presented By
Md Nazmul Hoque Shourob
ID: 201002305
Content
 About Database Security
 Security risk to database includes
 About threads
 Database security concepts
 Confidentially
 Integrity
 Availability
 Methods for securing the database
 Security controls
 Flow controls
 Interface control
 Access control
 conclusion
Introduction
Database
It is a collection of information in computer
Security
It is being free from danger
Database Security
It is the mechanism that protect the database against intentional or
accidental threats/
Protection from malicious attempts to seat (view) or modify data.
Securityrisktodatabase
includes
Bank risk to database includes :
-> Bank Accounts
-> Credit card, salary, income tax data
-> University Admission, marks/grades
-> Land records, licence’s
Aboutthreads
What isThreats ?
Threats – Any situation or event, international or accidental,
that may adversely affect a system and consequently the
organization.
*Computer System
*Database
threads
Threats
Hardware: Fire/Flood/Bomb
Dara corruption due to
power loss
DBMS & Application s/w:
Failure of security mechanism
giving greater access theft of
program
Communication Networks:
Wire tapping breaking or
disconnection of cables
Database: Unauthorized
access or copying of data
Data corruption
Databasesecurity
concepts
Three main aspects :
*Confidentiality
*Integrity
*Availability
Threats to database ::
* Loss of Integrity
* Loss of Availability
* Loss of Confidentiality
Confidentially
 No one can read our data / communication unless we want them to
 It is protecting the database from unauthorized users.
 Ensures that users are allowed to do the things they are trying to do.
For example :
The employees should not see the salaries of their managers.
Data
Integrity
 No one can manipulate our data / processing / communication unless we want
them to
 Protecting the database from authorized users
 Ensures that what users are trying to do is correct
For example :
An employee should be able to modify his or her own information
Data
Availability
 We can access our data / conduct our processing / use our communication
Capabilities when we want to
 Authorized users should be able to access data for purpose as necessary
For example :
payment orders regarding taxes should be made on time by the lax law
Data
Availability
Methodsforsecuring
thedatabase
Authorization – Privileges, vies.
Encryption – public key / private key, secure sockets.
Authentication – passwords.
Logical – firewalls, net proxies.
Securitycontrols
Type of Database Security controls :
1. Flow Control
2. Interface Control
3. AccessControl
 Flow controls regulates the distribution (flow) of information among
accessible objects. A flow between object X andY occurs when a
statement reads values from X and writes intoY.
 Interface control occurs when : a set X of data items to be ready by a user
can be used to get the setY of data.
 Access control in information system are responsible for ensuring that all
direct accesses to the system object occur base on models and rules fixed
by protection.
Conclusion
The goal of database security is to protect our critical and confidential data
from unauthorized access.
Each organization should have a data security policy, which is a set of high-
level guidelines determide by:
 User requirements.
 Environmental aspects.
 Internal regulations.
 Governmental laws.
Database Security Concepts
Database Security Concepts

More Related Content

Similar to Database Security Concepts

Security in network computing
Security in network computingSecurity in network computing
Security in network computingManoj VNV
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesisidro luna beltran
 
CS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptx
CS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptxCS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptx
CS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptxShreyaChavan28
 
Client server network threat
Client server network threatClient server network threat
Client server network threatRaj vardhan
 
Security ConceptsDr. Y. ChuCIS3360 Security in Computing.docx
Security ConceptsDr. Y. ChuCIS3360 Security in Computing.docxSecurity ConceptsDr. Y. ChuCIS3360 Security in Computing.docx
Security ConceptsDr. Y. ChuCIS3360 Security in Computing.docxbagotjesusa
 
Protection and security
Protection and securityProtection and security
Protection and securitymbadhi
 
Security and management
Security and managementSecurity and management
Security and managementArtiSolanki5
 
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docxExcel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docxgitagrimston
 
security system by desu star chapter 1.pptx
security system by desu star chapter 1.pptxsecurity system by desu star chapter 1.pptx
security system by desu star chapter 1.pptxdesalewminale
 
databasesecurit-phpapp01.pdf
databasesecurit-phpapp01.pdfdatabasesecurit-phpapp01.pdf
databasesecurit-phpapp01.pdfAnSHiKa187943
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfJazmine Brown
 
Cyber Security Part-I.pptx
Cyber Security Part-I.pptxCyber Security Part-I.pptx
Cyber Security Part-I.pptxRavikumarVadana
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture NotesFellowBuddy.com
 

Similar to Database Security Concepts (20)

Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:
 
Database security
Database securityDatabase security
Database security
 
Dstca
DstcaDstca
Dstca
 
Security in network computing
Security in network computingSecurity in network computing
Security in network computing
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- ingles
 
CS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptx
CS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptxCS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptx
CS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptx
 
Client server network threat
Client server network threatClient server network threat
Client server network threat
 
Security ConceptsDr. Y. ChuCIS3360 Security in Computing.docx
Security ConceptsDr. Y. ChuCIS3360 Security in Computing.docxSecurity ConceptsDr. Y. ChuCIS3360 Security in Computing.docx
Security ConceptsDr. Y. ChuCIS3360 Security in Computing.docx
 
Protection and security
Protection and securityProtection and security
Protection and security
 
Security and management
Security and managementSecurity and management
Security and management
 
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docxExcel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
 
security system by desu star chapter 1.pptx
security system by desu star chapter 1.pptxsecurity system by desu star chapter 1.pptx
security system by desu star chapter 1.pptx
 
databasesecurit-phpapp01.pdf
databasesecurit-phpapp01.pdfdatabasesecurit-phpapp01.pdf
databasesecurit-phpapp01.pdf
 
Health Information Privacy and Security
Health Information Privacy and SecurityHealth Information Privacy and Security
Health Information Privacy and Security
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
 
Cyber Security Part-I.pptx
Cyber Security Part-I.pptxCyber Security Part-I.pptx
Cyber Security Part-I.pptx
 
Database security
Database securityDatabase security
Database security
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 
Insecurity vssut
Insecurity vssutInsecurity vssut
Insecurity vssut
 
Data security
Data securityData security
Data security
 

More from Green University of Bangladesh

More from Green University of Bangladesh (6)

Comparative Analysis of Windows and Linux System.pptx
Comparative Analysis of Windows and Linux System.pptxComparative Analysis of Windows and Linux System.pptx
Comparative Analysis of Windows and Linux System.pptx
 
Ready-made garments of Bangladesh.pptx
Ready-made garments of Bangladesh.pptxReady-made garments of Bangladesh.pptx
Ready-made garments of Bangladesh.pptx
 
File Management System in Shell Script.pptx
File Management System in Shell Script.pptxFile Management System in Shell Script.pptx
File Management System in Shell Script.pptx
 
Library Management System Project in DBMS.pptx
Library Management System Project in DBMS.pptxLibrary Management System Project in DBMS.pptx
Library Management System Project in DBMS.pptx
 
Database Normalization.pptx
Database Normalization.pptxDatabase Normalization.pptx
Database Normalization.pptx
 
Power Amplifier EEE.pptx
Power Amplifier EEE.pptxPower Amplifier EEE.pptx
Power Amplifier EEE.pptx
 

Recently uploaded

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 

Recently uploaded (20)

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 

Database Security Concepts

  • 2. Presented By Md Nazmul Hoque Shourob ID: 201002305
  • 3. Content  About Database Security  Security risk to database includes  About threads  Database security concepts  Confidentially  Integrity  Availability  Methods for securing the database  Security controls  Flow controls  Interface control  Access control  conclusion
  • 4. Introduction Database It is a collection of information in computer Security It is being free from danger Database Security It is the mechanism that protect the database against intentional or accidental threats/ Protection from malicious attempts to seat (view) or modify data.
  • 5. Securityrisktodatabase includes Bank risk to database includes : -> Bank Accounts -> Credit card, salary, income tax data -> University Admission, marks/grades -> Land records, licence’s
  • 6. Aboutthreads What isThreats ? Threats – Any situation or event, international or accidental, that may adversely affect a system and consequently the organization. *Computer System *Database
  • 7. threads Threats Hardware: Fire/Flood/Bomb Dara corruption due to power loss DBMS & Application s/w: Failure of security mechanism giving greater access theft of program Communication Networks: Wire tapping breaking or disconnection of cables Database: Unauthorized access or copying of data Data corruption
  • 8. Databasesecurity concepts Three main aspects : *Confidentiality *Integrity *Availability Threats to database :: * Loss of Integrity * Loss of Availability * Loss of Confidentiality
  • 9. Confidentially  No one can read our data / communication unless we want them to  It is protecting the database from unauthorized users.  Ensures that users are allowed to do the things they are trying to do. For example : The employees should not see the salaries of their managers. Data
  • 10. Integrity  No one can manipulate our data / processing / communication unless we want them to  Protecting the database from authorized users  Ensures that what users are trying to do is correct For example : An employee should be able to modify his or her own information Data
  • 11. Availability  We can access our data / conduct our processing / use our communication Capabilities when we want to  Authorized users should be able to access data for purpose as necessary For example : payment orders regarding taxes should be made on time by the lax law Data Availability
  • 12. Methodsforsecuring thedatabase Authorization – Privileges, vies. Encryption – public key / private key, secure sockets. Authentication – passwords. Logical – firewalls, net proxies.
  • 13. Securitycontrols Type of Database Security controls : 1. Flow Control 2. Interface Control 3. AccessControl  Flow controls regulates the distribution (flow) of information among accessible objects. A flow between object X andY occurs when a statement reads values from X and writes intoY.  Interface control occurs when : a set X of data items to be ready by a user can be used to get the setY of data.  Access control in information system are responsible for ensuring that all direct accesses to the system object occur base on models and rules fixed by protection.
  • 14. Conclusion The goal of database security is to protect our critical and confidential data from unauthorized access. Each organization should have a data security policy, which is a set of high- level guidelines determide by:  User requirements.  Environmental aspects.  Internal regulations.  Governmental laws.