SlideShare a Scribd company logo
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
Introduction to Information Technology
INT-1010
Prof C
Luis R Castellanos
1
07.4
Databases:
Databases and Security Issues
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
2
Data and
Databases
Before
Databases
Relational
Model
Databases and
security
Database
concepts
Database
design
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
3
Data Security Data Breaches Threats
Databases and
security
Vulnerabilities Protect PII
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
4
Data Security
Databases
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
5
It is the confidentiality, integrity, and
availability (CIA) of the data in a
database that need to be protected.
Confidentiality can be lost if an
unauthorized person gains entry or
access to a database, or if a person who
is authorized to view selected records
in a database accesses other records he
or she should not be able to view.
If the data is altered by someone who is
unauthorized to do so, the result is a
loss of data integrity.
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
6
And if those who need to have access to the
database and its services are blocked from
doing so, there is a resulting loss of
availability.
Security of any database is significantly
impacted by any one or more of these basic
components of CIA being violated.
There are various reasons for spending
money, time, and effort on data protection.
The main reason is reducing financial loss,
followed by compliance with regulatory
requirements, maintaining high levels of
productivity, and meeting customer
expectations
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
7
Both businesses and home computer users
should be concerned about data security. The
information stored in databases—client
information, payment information, personal
files, bank account details, and more—can be
hard to replace, whether the loss results from
• physical threats such as a fire or a significant power
outage
• human error that results in errors in the processing
of information or unintended deletion of data, or
from erroneous input
• corporate espionage, theft, or malicious activity.
Loss of this data is potentially dangerous if it
falls into the wrong hands
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
8
It is in these three areas that a risk
assessment of the database’s security and
protection of the data should focus.
Is there a backup procedure that would
allow access to the data if the primary
database is destroyed by a physical
threat?
That same backup procedure might be
important in case the CIA of the database
is inadvertently affected by human error.
And what safeguards can/should be put in
place to prevent incidents of espionage,
theft, or other malicious activity?
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
9
Data Security Data Breaches Threats
Databases and
security
Vulnerabilities Protect PII
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
10
How Common
Are Database
Breaches?
Databases
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
11
Just how prevalent are the threats against
databases?
Is it worth the time, money, and personnel
effort to ensure that the database is
safeguarded?
Remember the Target and Neiman Marcus
problems that surfaced in late 2013?
And the continuing saga of Edward Snowden
and the NSA leaks?
These may have been the most widely
publicized data breaches of 2013.
But they were definitely just two of many such
database breaches.
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
12
In 2013, Edward Snowden, a former
intelligence contractor for the U.S. National
Security Agency (NSA), revealed the existence
of previously highly classified intelligence-
gathering surveillance programs run by the
NSA and the U.K.’s equivalent, the GCHQ.
While working at the NSA, Snowden began
accumulating information on NSA surveillance
programs and activities while contracted there
from 2009 to 2013.
He gave information to “The Guardian”, was
charged with espionage and had to leave the
US.
https://www.whistleblowers.org/whistleblowers/edward-snowden/
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
13
In 2021 a ransomware attack was made
against Colonial Pipeline.
Colonial Pipeline, which operates the biggest
gasoline conduit to the East Coast, said it has
no estimate on when it could restart the 5,500-
mile pipeline that it shut Friday after a
cyberattack. The 5,500-mile conduit carries
2.5 million barrels a day to the East Coast, or
45% of its supply of diesel, gasoline and jet
fuel. (May 2021).
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
14
Wells Fargo accidentally leaks
50,000 clients' records
Wells Fargo accidentally leaked thousands of
sensitive documents, it just inadvertently sent 1.4
gigabytes of files to a former financial adviser
who subpoenaed the company as part of a
lawsuit against one of its current employees.
While 1.4GB of files doesn't seem that big, the
collection includes at least 50,000 customers'
names, Social Security numbers and sensitive
financial info.
Wells Fargo discloses another
data breach in 2021
In a replay of similar incidents over the past
3 years, Wells Fargo began to notify people
about the potential compromise of their
personal information. Letters are going to
an undisclosed number of employees whose
personal information was contained in a
computer and a hard disk stolen from the
trunk of a locked vehicle belonging to an
employee of an auditing firm.
https://www.computerworld.com/article/2547477/
wells-fargo-discloses-another-data-breach.html
https://www.engadget.com/2017-07-22-wells-
fargo-accidentally-leaks-client-info.html
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
15
Database breaches are the exposure of database records containing personally
identifiable information (PII) or other sensitive information to unauthorized
viewers.
Risk-Based Security (RBS), a group of consultants and founders of the Open
Security Foundation (OSF), reported that 2013 saw a record number of data
records exposed via data breaches.
Open Security Foundation (OSF) operated from 2005 to 2016, as a non-profit public
organization.
Over 822 million such records were made available
to persons who had no authority to view these
records (Risk Based Security, 2014).
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
16
But remember, the number of reported
database breaches does not reflect the
total number of breaches that
occurred.
Some companies do not report
breaches in order to protect their
reputations or to prevent customers
from abandoning the company.
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
17
The following is a shortlist of what RBS discovered:
• The business sector accounted for 53.4% of reported
incidents, followed by government (19.3%), medical
(11.5%), education (8.2%), and unknown (7.6%).
• Hacking was the cause of 59.8% of reported incidents,
accounting for 72.0% of exposed records.
• Of the reported incidents, 4.8% were the result of web-
related attacks, which amounted to 16.9% of exposed
records.
• Four incidents in 2013 alone secured a place on the Top
10 All-Time Breaches list:
• Adobe—152 million records. Customer IDs, encrypted
passwords, debit or credit card numbers, and other
information relating to customer orders was
compromised.
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
18
• Unknown organizations—140 million records.
North Korean hackers exposed e-mail addresses
and identification numbers of South Korean
individuals.
• Target—110 million records. The information
included customer names, addresses, phone
numbers, e-mail addresses, credit/debit card
numbers, PINs, and security codes.
• Pinterest—70 million records. A flaw in the site’s
application programming interface (API) exposed
users' e-mail addresses.
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
19
Even if you were not impacted by any of these data breaches, if you have used a
credit card, made an airline reservation, subscribed to a magazine, been a
patient in a hospital, or shopped at a chain store (supermarket or department
store), or if you are a member of an online social media site, your personally
identifiable information (PII) is stored in a database.
How vulnerable is your PII?
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
20
What Are the Most Common
Causes of Database Breaches?
As evidenced by the NSA Snowden
leaks and the Target breach, no
database, and no government agency,
company, or business is as secure as
the owners of that database think.
It is difficult for database
administrators and security managers
to keep pace with the new threats and
vulnerabilities that continually emerge.
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
21
And to compound the issues, every
company/business/government has
different security issues, making it a
particularly hard challenge to
standardize any one solution that fits
all.
However, there are some common
threats and vulnerabilities that seem to
occur repeatedly.
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
22
Data Security Data Breaches Threats
Databases and
security
Vulnerabilities Protect PII
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
23
Threats
Databases
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
24
A cyber or cybersecurity threat
is a malicious act that seeks to
damage data, steal data, or
disrupt digital life in general.
https://www.upguard.com/blog/cyber
-threat
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
25
Unauthorized Access by Insiders
The malicious insider with approved access to
the system is one of the greatest threats to
database security.
People attack computers because that's where
the information is, and in our hyper-competitive,
hi-tech business and international environment,
information increasingly has great value.
Some alienated individuals also gain a sense of
power, control, and self-importance through
successful penetration of computer systems to
steal or destroy the information or disrupt an
organization's activities.
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
26
Another scenario might involve employees affected
by a workforce reduction who take customer account
lists, financial data, or strategic plans with them
when they leave.
Proprietary information could end up in the hands of
competitors or be widely disseminated online (Data
Loss Prevention).
Insiders may also be a threat to database security if
they are granted database access privileges that go
beyond the requirements of their job function, abuse
legitimate database privileges for unauthorized
purposes, or convert access privileges from those of
an ordinary user to those of an administrator.
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
27
Accidental Breaches Resulting from
Incorrect—but Not Malicious—Usage
The data breach is not always the result of a
deliberate attempt to subvert data security;
sometimes it is an unintended consequence.
For example, employees might export data from the
parent database system at work and send it, typically
unencrypted, to personal e-mail addresses so they
can work from home.
The data then might be subsequently compromised
on someone’s home computer.
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
28
Or a data mining application might
contain flaws that allow a user without
the correct access credentials to
stumble upon database records
inadvertently.
(If the user deliberately continues to
access the data without permission,
this situation becomes a malicious
insider threat.)
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
29
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
30
Unprotected Personal Hardware
Collection
It is becoming increasingly common
for data to be transferred to other
personal mobile devices—USB flash
drives, smartphones, tablets, and the
like.
It is rare now to find an employee who
never uses a mobile device—personal
or company-supplied—for business
purposes.
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
31
However, mobile devices continue to
be a significant source of data
breaches, stemming from a range of
circumstances, including loss or theft
of the devices, failure to install
antimalware tools on the devices, or
failing to password-protect a device
being used for business purposes.
Data is at risk if an employee stores
any proprietary information on such a
device or if that device is used to access
a company's network and/or database.
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
32
Stolen Laptops
Forgetful or careless laptop owners
whose equipment is taken expose data
on that laptop to persons not
authorized to have access to the data.
This can also happen if a laptop is
replaced and the hard drive on the
original machine is not properly erased
or destroyed.
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
33
Weak Authentication
A legitimate database user typically is
required to submit an ID and password in
order to gain access to a protected database.
Authentication is the process (internal to the
database program itself) by which the
credentials of the user are verified and access
may be granted.
If the process of authentication is weak, an
attacker can assume the identity of a
legitimate user by stealing or obtaining login
credentials.
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
34
Credentials may be illegitimately
obtained by various means:
• Credential theft. The attacker accesses
password files or finds a paper on which the
legitimate user has written down the ID and
password.
• Social engineering. The attacker deceives
someone into providing the login ID and
password by posing as a supervisor, IT
maintenance personnel, or other authority.
• Brute-force attacks. Have you ever been
locked out of an account after attempting to
log in more than 3 times with an incorrect
password? If so, this is the simplest (and
least effective) means of blocking a brute
force attack.
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
35
However, not all password-protected systems, databases,
or files block you from access after 3 attempts. For
example, if you have put a lock on a file on your computer,
you most likely have not set a limit on the number of
attempts on that file.
A brute-force attack is a password-guessing approach in
which the attacker attempts to discover a password by
systematically testing every combination of letters,
numbers, and symbols until the correct combination is
found. Depending upon the password's length and
complexity, this can be a very difficult task to complete.
However, there are widely available tools that hackers can
use to find the password, and it can be difficult to block all
the means by which hacker will try to find the password.
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
36
2023
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
37
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
38
Exploiting Weaknesses in an Operating
System or Network
Worms, viruses, or Trojan horses could be introduced
into an unprotected or poorly protected operating
system or computer network that supports the
database, leading to potential unauthorized database
access (loss of confidentiality), data corruption (loss
of integrity), or denial of service (DOS), a loss of
access to legitimate users.
A DOS may be achieved by causing a server to stop
functioning, or “crash,” flooding a network with
message traffic or overloading resources on the
computer, forcing it to stop handling additional tasks
or processing.
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
39
Theft of Database Backup Tapes
or Hard Drives
Database backups typically do not have
the same security measures in place
that the primary database employs.
These backups may not be encrypted,
and the media on which backups are
stored are also unprotected.
Theft of the backup media may
allow the attacker full access to
the data stored within the
backup.
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
40
Data Security Data Breaches Threats
Databases and
security
Vulnerabilities Protect PII
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
41
Vulnerabilities
Databases
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
42
A vulnerability is a weakness
that can be exploited by
cybercriminals to gain
unauthorized access to a
computer system.
https://www.upguard.com/blog/
vulnerability
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
43
There are other means by which
databases are exposed to security
breaches, and these are considered
vulnerabilities that may subject a
database to a security breach. These
are more passive, but they can do as
much harm as direct threats:
• Data at rest (unencrypted information)
that is passively residing in storage within
the boundaries of company computers,
perhaps waiting to be moved to a secure
database. Data at rest typically is not as well
protected as data that has been entered into
the database and enjoys the database
security measures.
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
44
• Data in motion is information that is being electronically
transmitted outside the company’s protected network via e-
mail or other communication mediums. For example, the
data might be transferred to a backup facility that is not
part of the internal storage media used for daily work. Or if
the company uses the cloud for data storage backups, the
transfer might take place outside of the company’s
protected network. This can lead to a loss of sensitive data if
there is a malicious attack via malware during the transfer
process or during the execution of a flawed business process
that allows unauthorized persons to view or obtain the data.
(This is not the same as the accidental breach resulting from
incorrect but not malicious usage noted above, where the
home computer to which the data has been transferred is
attacked or breached. That accidental breach occurred
without any intention of harm by the employee.)
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
45
• Poor architecture, in which security was
not adequately factored into the design and
development of the database structure. This
vulnerability may not be discovered until
there is an attempted or successful data
breach.
• Vendor bugs, particularly programming
flaws that allow actions to take place within
the database and with the data that were
not intended or planned.
Much like poor application architecture,
this vulnerability may not be uncovered
until there is an attempted or successful
data breach.
• An unlocked database is one that has no
security measures in place to control access
or auditing.
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
46
This seems counterintuitive, but many
home users employing a database for
personal needs, or even for working on
company data while at home, maybe
working with an unlocked database.
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
47
Risk Assessments
In the business environment, it is critical that a thorough risk assessment takes
place and be periodically reviewed.
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
48
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
49
The assessment should address:
• who has access to what data
• the circumstances under which access to the
database may need to change
• who maintains the passwords needed to
access the database
• who uses the company's computers for
access to the internet, e-mail programs, etc.,
and how employees access those resources
• what type of firewalls and anti-malware
solutions to put in place
• the training of the staff
• who has responsibility for enforcement
procedures related to data security.
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
50
There are identified solutions for each
of the threats and vulnerabilities
discussed here, including well-defined
and enforced access policies, use of
strong data encryption, vulnerability
assessments, policies related to strong
passwords, and installation of
firewalls.
There are companies that specialize in
designing plans, procedures, and
software to prevent data loss or data
leakage.
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
51
With data loss, the data is lost
forever, either by deletion,
theft, or data corruption. Data leakage allows unauthorized
people to get access to the data, either
by intentional action or by mistake.
So data loss and data leakage
can be intentional or
unintentional, and both can be
malicious or just human errors.
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
52
Data Security Data Breaches Threats
Databases and
security
Vulnerabilities Protect PII
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
53
Protect Personally
Identifiable
Information (PII)
Databases
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
54
Protecting databases and the data contained
within can be a costly and all-consuming
activity.
But what does this mean for you, the
individual who uses that credit card, makes
airline reservations, files taxes online,
subscribes to a magazine, has been a patient
in a hospital, shops at a chain store, or is a
member of an online social media site?
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
55
Your PII is out there, stored in multiple
databases.
Obviously, you cannot implement
security measures for the company,
business, or government agency that
holds your PII.
But are there many measures you can
take to better protect yourself?
Let’s see some few rules of thumb that
you can implement…
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
56
Keep your passwords to yourself
Do not leave a slip with a list of
passwords under your computer, or
anywhere where it can be viewed or
taken by someone.
Just giving your password to a friend is
not a good idea, either.
Use strong passwords
Many of your user IDs must have strong
passwords to gain entry into one or more
systems.
In those instances when you can choose
any password configuration, pick a strong
password to protect your information.
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
57
Use different passwords for
different accounts
Remembering multiple passwords can
be a challenge, and it’s often
convenient to use the same password
for multiple accounts, ranging from
Facebook and your bank account to
your X (formerly Twitter) page.
The danger here is that a compromise
of any one of these accounts could also
result in the compromise of others if
the same password is used for multiple
accounts.
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
58
Check your credit reports annually
Sometimes people don’t learn that
they’re victims of identity theft until their
credit rating and identity are destroyed.
It’s proactive to get copies of your credit
reports from the credit bureaus and
carefully review them for any errors.
Be sure to follow-up with the credit
bureaus to make any corrections to your
reports, if needed.
By law, you can get one free credit report
from each of the three credit bureaus
every year.
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
59
The three nationwide consumer reporting companies are:
✓ Equifax,
✓ Experian, and
✓ TransUnion
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
60
Google yourself
Enter your own name in Google, Yahoo
or other search engine and see what
data comes up.
Investigate any postings about yourself
in the information that you find.
Look for any suggestions that your PII
may be compromised. Remember that people can be a
very weak link in security
No matter how secure you make your
passwords and how careful you are
with your technology, there is always a
human element to protecting your
information.
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
61
Control physical access to your
devices
It’s important not leave laptops and
other mobile devices unattended in
public locations, like a coffee shop or
other location with free WiFi.
An unattended machine is at risk, for
both theft and other security threats.
When you aren't controlling physical
access to your machine, you shouldn’t
let it out of your sight.
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
62
Remember to logout of a website
when you are finished using it
Whether it’s your email, bank account,
retail store shopping account or library
account, always remember to logout
when you leave the website. Remember to lock your computer
with a password when you are
finished using it
By requiring a password to access your
computer (or other electronic device)
you are protecting your information.
You are also making your computer
useless to a thief who cannot break
password locks.
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
63
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
64
What does CIA stands for?
(No, it’s not Central Intelligence Agency)
C
I
A
Consistency
Confidentiality
Coherence
Adherence
Availability
Abstraction
Independence
Integrity
Importance
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
65
True or False?
Some companies do not report
breaches in order to protect their
reputations or to prevent customers
from abandoning the company.
True False
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
66
What is a brute-force attack?
1. password-guessing approach in which the
attacker attempts to discover a password by
testing every combination of letters, numbers,
and symbols until the correct combination is
found
2. attacker accesses password files or finds a paper
on which the legitimate user has written down
the ID and password
3. attacker deceives someone into providing the
login ID and password by posing as a supervisor,
IT maintenance personnel, or other authority
4. attacker steals backup media and has access to
the data stored within the backup
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
67
What is a vulnerability?
1. a malicious act that seeks to damage data, steal data,
or disrupt digital life in general
2. The probability of exposure, loss of critical assets and
sensitive information, or reputational harm as a result
of a cyber attack or breach within an organization’s
network
3. flooding a network with message traffic or
overloading resources on the computer, forcing it to
stop handling additional tasks or processing
4. a weakness that can be exploited by cybercriminals to
gain unauthorized access to a computer system
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
68
Remember some measures you can take to
better protect yourself:
• Keep your passwords to yourself
• Use strong passwords
• Use different passwords for different accounts
• Check your credit reports annually
• Google yourself
• Remember that people can be a very weak link in
security
• Control physical access to your devices
• Remember to logout of a website when you are
finished using it
• Remember to lock your computer with a password
when you are finished using it
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
69
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
Textbook
71
https://eng.libretexts.org/Courses/Prince_
Georges_Community_College/INT_1010%
3A_Concepts_in_Computing
Purchase of a book is not
required.
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
Professor C
72
castellr@pgcc.edu
eLearning Expert
BS & MS in Systems Engineering
BS & MS in Military Arts and Science
HC Dr in Education
IT Professor | Spanish Instructor
LCINT1010.wordpress.com
Presentation created in 01/2022.
Slides last updated on 10/2023
Introduction to Information Technology
7.4. Databases: Databases and Security Issues
Introduction to Information Technology
INT-1010
Prof C
Luis R Castellanos
73
07.4
Databases:
Databases and Security Issues

More Related Content

What's hot

Positive & Negative Sides of Internet
Positive  &  Negative  Sides of  InternetPositive  &  Negative  Sides of  Internet
Positive & Negative Sides of Internet
Sagarneel Majumder
 
Dbms interview questions s.pdf
Dbms interview questions s.pdfDbms interview questions s.pdf
Dbms interview questions s.pdf
Shivani139202
 
Chapter 1 semantic web
Chapter 1 semantic webChapter 1 semantic web
Chapter 1 semantic webR A Akerkar
 
OWL and OBO
OWL and OBOOWL and OBO
OWL and OBO
Duncan Hull
 
CS8080 INFORMATION RETRIEVAL TECHNIQUES - IRT - UNIT - I PPT IN PDF
CS8080 INFORMATION RETRIEVAL TECHNIQUES - IRT - UNIT - I  PPT  IN PDFCS8080 INFORMATION RETRIEVAL TECHNIQUES - IRT - UNIT - I  PPT  IN PDF
CS8080 INFORMATION RETRIEVAL TECHNIQUES - IRT - UNIT - I PPT IN PDF
AALIM MUHAMMED SALEGH COLLEGE OF ENGINEERING
 
Digital citizenship for Students
Digital citizenship for StudentsDigital citizenship for Students
Digital citizenship for Students
Kelgator
 
Cs6703 grid and cloud computing unit 4
Cs6703 grid and cloud computing unit 4Cs6703 grid and cloud computing unit 4
Cs6703 grid and cloud computing unit 4
RMK ENGINEERING COLLEGE, CHENNAI
 
Understanding Plagiarism
Understanding PlagiarismUnderstanding Plagiarism
Understanding Plagiarism
Santosh C. Hulagabali
 
Plagiarism: What's the BIG DEAL?
Plagiarism: What's the BIG DEAL?Plagiarism: What's the BIG DEAL?
Plagiarism: What's the BIG DEAL?cswetzel
 
Storage Area Networks Unit 2 Notes
Storage Area Networks Unit 2 NotesStorage Area Networks Unit 2 Notes
Storage Area Networks Unit 2 Notes
Sudarshan Dhondaley
 
Querying Linked Data
Querying Linked DataQuerying Linked Data
Querying Linked Data
EUCLID project
 
Linked Data 4 principles
Linked Data 4 principles Linked Data 4 principles
Linked Data 4 principles
LiST Inc
 
SS2 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)
SS2 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)SS2 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)
SS2 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)
Ejiro Ndifereke
 
The Semantic Web #9 - Web Ontology Language (OWL)
The Semantic Web #9 - Web Ontology Language (OWL)The Semantic Web #9 - Web Ontology Language (OWL)
The Semantic Web #9 - Web Ontology Language (OWL)
Myungjin Lee
 
Guidance 2 for assessment 2
Guidance 2 for assessment 2Guidance 2 for assessment 2
Guidance 2 for assessment 2
Peter R Breach
 
SS3 DATA PROCESSING EXAMINATION (FIRST TERM)
SS3 DATA PROCESSING EXAMINATION (FIRST TERM)SS3 DATA PROCESSING EXAMINATION (FIRST TERM)
SS3 DATA PROCESSING EXAMINATION (FIRST TERM)
Ejiro Ndifereke
 
IMPACT OF COMPUTING ON HUMANITY (IN EVERY ASPECT: DOMESTIC, SOCIAL AND PROFES...
IMPACT OF COMPUTING ON HUMANITY (IN EVERY ASPECT: DOMESTIC, SOCIAL AND PROFES...IMPACT OF COMPUTING ON HUMANITY (IN EVERY ASPECT: DOMESTIC, SOCIAL AND PROFES...
IMPACT OF COMPUTING ON HUMANITY (IN EVERY ASPECT: DOMESTIC, SOCIAL AND PROFES...
Rauf Khalid
 
[오원석 Kswc2010]데이터의 가치를 높이는 linked data
[오원석 Kswc2010]데이터의 가치를 높이는 linked data[오원석 Kswc2010]데이터의 가치를 높이는 linked data
[오원석 Kswc2010]데이터의 가치를 높이는 linked data
LiST Inc
 
School Website Project
School Website ProjectSchool Website Project
School Website Project
Vijay Baidya
 

What's hot (20)

Positive & Negative Sides of Internet
Positive  &  Negative  Sides of  InternetPositive  &  Negative  Sides of  Internet
Positive & Negative Sides of Internet
 
Dbms interview questions s.pdf
Dbms interview questions s.pdfDbms interview questions s.pdf
Dbms interview questions s.pdf
 
Chapter 1 semantic web
Chapter 1 semantic webChapter 1 semantic web
Chapter 1 semantic web
 
OWL and OBO
OWL and OBOOWL and OBO
OWL and OBO
 
CS8080 INFORMATION RETRIEVAL TECHNIQUES - IRT - UNIT - I PPT IN PDF
CS8080 INFORMATION RETRIEVAL TECHNIQUES - IRT - UNIT - I  PPT  IN PDFCS8080 INFORMATION RETRIEVAL TECHNIQUES - IRT - UNIT - I  PPT  IN PDF
CS8080 INFORMATION RETRIEVAL TECHNIQUES - IRT - UNIT - I PPT IN PDF
 
Digital citizenship for Students
Digital citizenship for StudentsDigital citizenship for Students
Digital citizenship for Students
 
Cs6703 grid and cloud computing unit 4
Cs6703 grid and cloud computing unit 4Cs6703 grid and cloud computing unit 4
Cs6703 grid and cloud computing unit 4
 
Understanding Plagiarism
Understanding PlagiarismUnderstanding Plagiarism
Understanding Plagiarism
 
Introduction to linked data
Introduction to linked dataIntroduction to linked data
Introduction to linked data
 
Plagiarism: What's the BIG DEAL?
Plagiarism: What's the BIG DEAL?Plagiarism: What's the BIG DEAL?
Plagiarism: What's the BIG DEAL?
 
Storage Area Networks Unit 2 Notes
Storage Area Networks Unit 2 NotesStorage Area Networks Unit 2 Notes
Storage Area Networks Unit 2 Notes
 
Querying Linked Data
Querying Linked DataQuerying Linked Data
Querying Linked Data
 
Linked Data 4 principles
Linked Data 4 principles Linked Data 4 principles
Linked Data 4 principles
 
SS2 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)
SS2 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)SS2 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)
SS2 DATA PROCESSING PRACTICAL EXAMINATION (FIRST TERM)
 
The Semantic Web #9 - Web Ontology Language (OWL)
The Semantic Web #9 - Web Ontology Language (OWL)The Semantic Web #9 - Web Ontology Language (OWL)
The Semantic Web #9 - Web Ontology Language (OWL)
 
Guidance 2 for assessment 2
Guidance 2 for assessment 2Guidance 2 for assessment 2
Guidance 2 for assessment 2
 
SS3 DATA PROCESSING EXAMINATION (FIRST TERM)
SS3 DATA PROCESSING EXAMINATION (FIRST TERM)SS3 DATA PROCESSING EXAMINATION (FIRST TERM)
SS3 DATA PROCESSING EXAMINATION (FIRST TERM)
 
IMPACT OF COMPUTING ON HUMANITY (IN EVERY ASPECT: DOMESTIC, SOCIAL AND PROFES...
IMPACT OF COMPUTING ON HUMANITY (IN EVERY ASPECT: DOMESTIC, SOCIAL AND PROFES...IMPACT OF COMPUTING ON HUMANITY (IN EVERY ASPECT: DOMESTIC, SOCIAL AND PROFES...
IMPACT OF COMPUTING ON HUMANITY (IN EVERY ASPECT: DOMESTIC, SOCIAL AND PROFES...
 
[오원석 Kswc2010]데이터의 가치를 높이는 linked data
[오원석 Kswc2010]데이터의 가치를 높이는 linked data[오원석 Kswc2010]데이터의 가치를 높이는 linked data
[오원석 Kswc2010]데이터의 가치를 높이는 linked data
 
School Website Project
School Website ProjectSchool Website Project
School Website Project
 

Similar to INT 1010 07-4.pdf

A foundation for breach data analysis
A foundation for breach data analysisA foundation for breach data analysis
A foundation for breach data analysisAlexander Decker
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS Deck
NetIQ
 
New regulations and the evolving cybersecurity technology landscape
New regulations and the evolving cybersecurity technology landscapeNew regulations and the evolving cybersecurity technology landscape
New regulations and the evolving cybersecurity technology landscape
Ulf Mattsson
 
The CISO’s Guide to Being Human
The CISO’s Guide to Being HumanThe CISO’s Guide to Being Human
The CISO’s Guide to Being Human
Clearswift
 
Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...
Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...
Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...
Ted Myerson
 
What I learned at the Infosecurity ISACA North America Conference 2019
What I learned at the Infosecurity ISACA North America Conference 2019What I learned at the Infosecurity ISACA North America Conference 2019
What I learned at the Infosecurity ISACA North America Conference 2019
Ulf Mattsson
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
GFI Software
 
Data loss prevention by using MRSH-v2 algorithm
Data loss prevention by using MRSH-v2 algorithm Data loss prevention by using MRSH-v2 algorithm
Data loss prevention by using MRSH-v2 algorithm
IJECEIAES
 
How to protect the cookies once someone gets into the cookie jar
How to protect the cookies once someone gets into the cookie jarHow to protect the cookies once someone gets into the cookie jar
How to protect the cookies once someone gets into the cookie jar
JudgeEagle
 
Who is the next target proactive approaches to data security
Who is the next target   proactive approaches to data securityWho is the next target   proactive approaches to data security
Who is the next target proactive approaches to data security
Ulf Mattsson
 
Jul 16 isaca london data protection, security and privacy risks - on premis...
Jul 16 isaca london   data protection, security and privacy risks - on premis...Jul 16 isaca london   data protection, security and privacy risks - on premis...
Jul 16 isaca london data protection, security and privacy risks - on premis...
Ulf Mattsson
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
PECB
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 Conference
Jeff Lemmermann
 
UK Cyber Vulnerability Index 2013
UK Cyber Vulnerability Index 2013UK Cyber Vulnerability Index 2013
UK Cyber Vulnerability Index 2013
Martin Jordan
 
Big Data and Information Security
Big Data and Information SecurityBig Data and Information Security
Big Data and Information Security
ijceronline
 
Data security in a big data environment sweden
Data security in a big data environment   swedenData security in a big data environment   sweden
Data security in a big data environment sweden
IBM Sverige
 
Information security
Information securityInformation security
Information security
AlaaMahmoud108
 
Data Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network AnalysisData Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network Analysis
IJERD Editor
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big risk
IBM Sverige
 
Privacy Engineering: Enabling Mobility of Mental Health Services with Data Pr...
Privacy Engineering: Enabling Mobility of Mental Health Services with Data Pr...Privacy Engineering: Enabling Mobility of Mental Health Services with Data Pr...
Privacy Engineering: Enabling Mobility of Mental Health Services with Data Pr...
CREST
 

Similar to INT 1010 07-4.pdf (20)

A foundation for breach data analysis
A foundation for breach data analysisA foundation for breach data analysis
A foundation for breach data analysis
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS Deck
 
New regulations and the evolving cybersecurity technology landscape
New regulations and the evolving cybersecurity technology landscapeNew regulations and the evolving cybersecurity technology landscape
New regulations and the evolving cybersecurity technology landscape
 
The CISO’s Guide to Being Human
The CISO’s Guide to Being HumanThe CISO’s Guide to Being Human
The CISO’s Guide to Being Human
 
Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...
Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...
Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...
 
What I learned at the Infosecurity ISACA North America Conference 2019
What I learned at the Infosecurity ISACA North America Conference 2019What I learned at the Infosecurity ISACA North America Conference 2019
What I learned at the Infosecurity ISACA North America Conference 2019
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
 
Data loss prevention by using MRSH-v2 algorithm
Data loss prevention by using MRSH-v2 algorithm Data loss prevention by using MRSH-v2 algorithm
Data loss prevention by using MRSH-v2 algorithm
 
How to protect the cookies once someone gets into the cookie jar
How to protect the cookies once someone gets into the cookie jarHow to protect the cookies once someone gets into the cookie jar
How to protect the cookies once someone gets into the cookie jar
 
Who is the next target proactive approaches to data security
Who is the next target   proactive approaches to data securityWho is the next target   proactive approaches to data security
Who is the next target proactive approaches to data security
 
Jul 16 isaca london data protection, security and privacy risks - on premis...
Jul 16 isaca london   data protection, security and privacy risks - on premis...Jul 16 isaca london   data protection, security and privacy risks - on premis...
Jul 16 isaca london data protection, security and privacy risks - on premis...
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 Conference
 
UK Cyber Vulnerability Index 2013
UK Cyber Vulnerability Index 2013UK Cyber Vulnerability Index 2013
UK Cyber Vulnerability Index 2013
 
Big Data and Information Security
Big Data and Information SecurityBig Data and Information Security
Big Data and Information Security
 
Data security in a big data environment sweden
Data security in a big data environment   swedenData security in a big data environment   sweden
Data security in a big data environment sweden
 
Information security
Information securityInformation security
Information security
 
Data Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network AnalysisData Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network Analysis
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big risk
 
Privacy Engineering: Enabling Mobility of Mental Health Services with Data Pr...
Privacy Engineering: Enabling Mobility of Mental Health Services with Data Pr...Privacy Engineering: Enabling Mobility of Mental Health Services with Data Pr...
Privacy Engineering: Enabling Mobility of Mental Health Services with Data Pr...
 

More from Luis R Castellanos

INT 1010 08-4.pdf
INT 1010 08-4.pdfINT 1010 08-4.pdf
INT 1010 08-4.pdf
Luis R Castellanos
 
INT 1010 08-3.pdf
INT 1010 08-3.pdfINT 1010 08-3.pdf
INT 1010 08-3.pdf
Luis R Castellanos
 
INT 1010 08-1.pdf
INT 1010 08-1.pdfINT 1010 08-1.pdf
INT 1010 08-1.pdf
Luis R Castellanos
 
INT 1010 04-2.pdf
INT 1010 04-2.pdfINT 1010 04-2.pdf
INT 1010 04-2.pdf
Luis R Castellanos
 
INT 1010 04-3.pdf
INT 1010 04-3.pdfINT 1010 04-3.pdf
INT 1010 04-3.pdf
Luis R Castellanos
 
INT 1010 04-1.pdf
INT 1010 04-1.pdfINT 1010 04-1.pdf
INT 1010 04-1.pdf
Luis R Castellanos
 
INT 1010 04-4.pdf
INT 1010 04-4.pdfINT 1010 04-4.pdf
INT 1010 04-4.pdf
Luis R Castellanos
 
INT 1010 04-5.pdf
INT 1010 04-5.pdfINT 1010 04-5.pdf
INT 1010 04-5.pdf
Luis R Castellanos
 
INT 1010 03.pdf
INT 1010 03.pdfINT 1010 03.pdf
INT 1010 03.pdf
Luis R Castellanos
 
INT 1010 02.pdf
INT 1010 02.pdfINT 1010 02.pdf
INT 1010 02.pdf
Luis R Castellanos
 
INT 1010 01.pdf
INT 1010 01.pdfINT 1010 01.pdf
INT 1010 01.pdf
Luis R Castellanos
 
INT 1010 10-1.pdf
INT 1010 10-1.pdfINT 1010 10-1.pdf
INT 1010 10-1.pdf
Luis R Castellanos
 
INT 1010 10-3.pdf
INT 1010 10-3.pdfINT 1010 10-3.pdf
INT 1010 10-3.pdf
Luis R Castellanos
 
INT 1010 10-2.pdf
INT 1010 10-2.pdfINT 1010 10-2.pdf
INT 1010 10-2.pdf
Luis R Castellanos
 
INT 1010 09-2.pdf
INT 1010 09-2.pdfINT 1010 09-2.pdf
INT 1010 09-2.pdf
Luis R Castellanos
 
INT 1010 08-2.pdf
INT 1010 08-2.pdfINT 1010 08-2.pdf
INT 1010 08-2.pdf
Luis R Castellanos
 
INT 1010 07-3.pdf
INT 1010 07-3.pdfINT 1010 07-3.pdf
INT 1010 07-3.pdf
Luis R Castellanos
 
INT 1010 07-6.pdf
INT 1010 07-6.pdfINT 1010 07-6.pdf
INT 1010 07-6.pdf
Luis R Castellanos
 
INT 1010 07-2.pdf
INT 1010 07-2.pdfINT 1010 07-2.pdf
INT 1010 07-2.pdf
Luis R Castellanos
 
INT 1010 07-5.pdf
INT 1010 07-5.pdfINT 1010 07-5.pdf
INT 1010 07-5.pdf
Luis R Castellanos
 

More from Luis R Castellanos (20)

INT 1010 08-4.pdf
INT 1010 08-4.pdfINT 1010 08-4.pdf
INT 1010 08-4.pdf
 
INT 1010 08-3.pdf
INT 1010 08-3.pdfINT 1010 08-3.pdf
INT 1010 08-3.pdf
 
INT 1010 08-1.pdf
INT 1010 08-1.pdfINT 1010 08-1.pdf
INT 1010 08-1.pdf
 
INT 1010 04-2.pdf
INT 1010 04-2.pdfINT 1010 04-2.pdf
INT 1010 04-2.pdf
 
INT 1010 04-3.pdf
INT 1010 04-3.pdfINT 1010 04-3.pdf
INT 1010 04-3.pdf
 
INT 1010 04-1.pdf
INT 1010 04-1.pdfINT 1010 04-1.pdf
INT 1010 04-1.pdf
 
INT 1010 04-4.pdf
INT 1010 04-4.pdfINT 1010 04-4.pdf
INT 1010 04-4.pdf
 
INT 1010 04-5.pdf
INT 1010 04-5.pdfINT 1010 04-5.pdf
INT 1010 04-5.pdf
 
INT 1010 03.pdf
INT 1010 03.pdfINT 1010 03.pdf
INT 1010 03.pdf
 
INT 1010 02.pdf
INT 1010 02.pdfINT 1010 02.pdf
INT 1010 02.pdf
 
INT 1010 01.pdf
INT 1010 01.pdfINT 1010 01.pdf
INT 1010 01.pdf
 
INT 1010 10-1.pdf
INT 1010 10-1.pdfINT 1010 10-1.pdf
INT 1010 10-1.pdf
 
INT 1010 10-3.pdf
INT 1010 10-3.pdfINT 1010 10-3.pdf
INT 1010 10-3.pdf
 
INT 1010 10-2.pdf
INT 1010 10-2.pdfINT 1010 10-2.pdf
INT 1010 10-2.pdf
 
INT 1010 09-2.pdf
INT 1010 09-2.pdfINT 1010 09-2.pdf
INT 1010 09-2.pdf
 
INT 1010 08-2.pdf
INT 1010 08-2.pdfINT 1010 08-2.pdf
INT 1010 08-2.pdf
 
INT 1010 07-3.pdf
INT 1010 07-3.pdfINT 1010 07-3.pdf
INT 1010 07-3.pdf
 
INT 1010 07-6.pdf
INT 1010 07-6.pdfINT 1010 07-6.pdf
INT 1010 07-6.pdf
 
INT 1010 07-2.pdf
INT 1010 07-2.pdfINT 1010 07-2.pdf
INT 1010 07-2.pdf
 
INT 1010 07-5.pdf
INT 1010 07-5.pdfINT 1010 07-5.pdf
INT 1010 07-5.pdf
 

Recently uploaded

How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
rosedainty
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 

Recently uploaded (20)

How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 

INT 1010 07-4.pdf

  • 1. Introduction to Information Technology 7.4. Databases: Databases and Security Issues Introduction to Information Technology INT-1010 Prof C Luis R Castellanos 1 07.4 Databases: Databases and Security Issues
  • 2. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 2 Data and Databases Before Databases Relational Model Databases and security Database concepts Database design
  • 3. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 3 Data Security Data Breaches Threats Databases and security Vulnerabilities Protect PII
  • 4. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 4 Data Security Databases
  • 5. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 5 It is the confidentiality, integrity, and availability (CIA) of the data in a database that need to be protected. Confidentiality can be lost if an unauthorized person gains entry or access to a database, or if a person who is authorized to view selected records in a database accesses other records he or she should not be able to view. If the data is altered by someone who is unauthorized to do so, the result is a loss of data integrity.
  • 6. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 6 And if those who need to have access to the database and its services are blocked from doing so, there is a resulting loss of availability. Security of any database is significantly impacted by any one or more of these basic components of CIA being violated. There are various reasons for spending money, time, and effort on data protection. The main reason is reducing financial loss, followed by compliance with regulatory requirements, maintaining high levels of productivity, and meeting customer expectations
  • 7. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 7 Both businesses and home computer users should be concerned about data security. The information stored in databases—client information, payment information, personal files, bank account details, and more—can be hard to replace, whether the loss results from • physical threats such as a fire or a significant power outage • human error that results in errors in the processing of information or unintended deletion of data, or from erroneous input • corporate espionage, theft, or malicious activity. Loss of this data is potentially dangerous if it falls into the wrong hands
  • 8. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 8 It is in these three areas that a risk assessment of the database’s security and protection of the data should focus. Is there a backup procedure that would allow access to the data if the primary database is destroyed by a physical threat? That same backup procedure might be important in case the CIA of the database is inadvertently affected by human error. And what safeguards can/should be put in place to prevent incidents of espionage, theft, or other malicious activity?
  • 9. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 9 Data Security Data Breaches Threats Databases and security Vulnerabilities Protect PII
  • 10. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 10 How Common Are Database Breaches? Databases
  • 11. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 11 Just how prevalent are the threats against databases? Is it worth the time, money, and personnel effort to ensure that the database is safeguarded? Remember the Target and Neiman Marcus problems that surfaced in late 2013? And the continuing saga of Edward Snowden and the NSA leaks? These may have been the most widely publicized data breaches of 2013. But they were definitely just two of many such database breaches.
  • 12. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 12 In 2013, Edward Snowden, a former intelligence contractor for the U.S. National Security Agency (NSA), revealed the existence of previously highly classified intelligence- gathering surveillance programs run by the NSA and the U.K.’s equivalent, the GCHQ. While working at the NSA, Snowden began accumulating information on NSA surveillance programs and activities while contracted there from 2009 to 2013. He gave information to “The Guardian”, was charged with espionage and had to leave the US. https://www.whistleblowers.org/whistleblowers/edward-snowden/
  • 13. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 13 In 2021 a ransomware attack was made against Colonial Pipeline. Colonial Pipeline, which operates the biggest gasoline conduit to the East Coast, said it has no estimate on when it could restart the 5,500- mile pipeline that it shut Friday after a cyberattack. The 5,500-mile conduit carries 2.5 million barrels a day to the East Coast, or 45% of its supply of diesel, gasoline and jet fuel. (May 2021).
  • 14. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 14 Wells Fargo accidentally leaks 50,000 clients' records Wells Fargo accidentally leaked thousands of sensitive documents, it just inadvertently sent 1.4 gigabytes of files to a former financial adviser who subpoenaed the company as part of a lawsuit against one of its current employees. While 1.4GB of files doesn't seem that big, the collection includes at least 50,000 customers' names, Social Security numbers and sensitive financial info. Wells Fargo discloses another data breach in 2021 In a replay of similar incidents over the past 3 years, Wells Fargo began to notify people about the potential compromise of their personal information. Letters are going to an undisclosed number of employees whose personal information was contained in a computer and a hard disk stolen from the trunk of a locked vehicle belonging to an employee of an auditing firm. https://www.computerworld.com/article/2547477/ wells-fargo-discloses-another-data-breach.html https://www.engadget.com/2017-07-22-wells- fargo-accidentally-leaks-client-info.html
  • 15. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 15 Database breaches are the exposure of database records containing personally identifiable information (PII) or other sensitive information to unauthorized viewers. Risk-Based Security (RBS), a group of consultants and founders of the Open Security Foundation (OSF), reported that 2013 saw a record number of data records exposed via data breaches. Open Security Foundation (OSF) operated from 2005 to 2016, as a non-profit public organization. Over 822 million such records were made available to persons who had no authority to view these records (Risk Based Security, 2014).
  • 16. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 16 But remember, the number of reported database breaches does not reflect the total number of breaches that occurred. Some companies do not report breaches in order to protect their reputations or to prevent customers from abandoning the company.
  • 17. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 17 The following is a shortlist of what RBS discovered: • The business sector accounted for 53.4% of reported incidents, followed by government (19.3%), medical (11.5%), education (8.2%), and unknown (7.6%). • Hacking was the cause of 59.8% of reported incidents, accounting for 72.0% of exposed records. • Of the reported incidents, 4.8% were the result of web- related attacks, which amounted to 16.9% of exposed records. • Four incidents in 2013 alone secured a place on the Top 10 All-Time Breaches list: • Adobe—152 million records. Customer IDs, encrypted passwords, debit or credit card numbers, and other information relating to customer orders was compromised.
  • 18. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 18 • Unknown organizations—140 million records. North Korean hackers exposed e-mail addresses and identification numbers of South Korean individuals. • Target—110 million records. The information included customer names, addresses, phone numbers, e-mail addresses, credit/debit card numbers, PINs, and security codes. • Pinterest—70 million records. A flaw in the site’s application programming interface (API) exposed users' e-mail addresses.
  • 19. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 19 Even if you were not impacted by any of these data breaches, if you have used a credit card, made an airline reservation, subscribed to a magazine, been a patient in a hospital, or shopped at a chain store (supermarket or department store), or if you are a member of an online social media site, your personally identifiable information (PII) is stored in a database. How vulnerable is your PII?
  • 20. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 20 What Are the Most Common Causes of Database Breaches? As evidenced by the NSA Snowden leaks and the Target breach, no database, and no government agency, company, or business is as secure as the owners of that database think. It is difficult for database administrators and security managers to keep pace with the new threats and vulnerabilities that continually emerge.
  • 21. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 21 And to compound the issues, every company/business/government has different security issues, making it a particularly hard challenge to standardize any one solution that fits all. However, there are some common threats and vulnerabilities that seem to occur repeatedly.
  • 22. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 22 Data Security Data Breaches Threats Databases and security Vulnerabilities Protect PII
  • 23. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 23 Threats Databases
  • 24. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 24 A cyber or cybersecurity threat is a malicious act that seeks to damage data, steal data, or disrupt digital life in general. https://www.upguard.com/blog/cyber -threat
  • 25. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 25 Unauthorized Access by Insiders The malicious insider with approved access to the system is one of the greatest threats to database security. People attack computers because that's where the information is, and in our hyper-competitive, hi-tech business and international environment, information increasingly has great value. Some alienated individuals also gain a sense of power, control, and self-importance through successful penetration of computer systems to steal or destroy the information or disrupt an organization's activities.
  • 26. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 26 Another scenario might involve employees affected by a workforce reduction who take customer account lists, financial data, or strategic plans with them when they leave. Proprietary information could end up in the hands of competitors or be widely disseminated online (Data Loss Prevention). Insiders may also be a threat to database security if they are granted database access privileges that go beyond the requirements of their job function, abuse legitimate database privileges for unauthorized purposes, or convert access privileges from those of an ordinary user to those of an administrator.
  • 27. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 27 Accidental Breaches Resulting from Incorrect—but Not Malicious—Usage The data breach is not always the result of a deliberate attempt to subvert data security; sometimes it is an unintended consequence. For example, employees might export data from the parent database system at work and send it, typically unencrypted, to personal e-mail addresses so they can work from home. The data then might be subsequently compromised on someone’s home computer.
  • 28. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 28 Or a data mining application might contain flaws that allow a user without the correct access credentials to stumble upon database records inadvertently. (If the user deliberately continues to access the data without permission, this situation becomes a malicious insider threat.)
  • 29. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 29
  • 30. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 30 Unprotected Personal Hardware Collection It is becoming increasingly common for data to be transferred to other personal mobile devices—USB flash drives, smartphones, tablets, and the like. It is rare now to find an employee who never uses a mobile device—personal or company-supplied—for business purposes.
  • 31. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 31 However, mobile devices continue to be a significant source of data breaches, stemming from a range of circumstances, including loss or theft of the devices, failure to install antimalware tools on the devices, or failing to password-protect a device being used for business purposes. Data is at risk if an employee stores any proprietary information on such a device or if that device is used to access a company's network and/or database.
  • 32. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 32 Stolen Laptops Forgetful or careless laptop owners whose equipment is taken expose data on that laptop to persons not authorized to have access to the data. This can also happen if a laptop is replaced and the hard drive on the original machine is not properly erased or destroyed.
  • 33. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 33 Weak Authentication A legitimate database user typically is required to submit an ID and password in order to gain access to a protected database. Authentication is the process (internal to the database program itself) by which the credentials of the user are verified and access may be granted. If the process of authentication is weak, an attacker can assume the identity of a legitimate user by stealing or obtaining login credentials.
  • 34. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 34 Credentials may be illegitimately obtained by various means: • Credential theft. The attacker accesses password files or finds a paper on which the legitimate user has written down the ID and password. • Social engineering. The attacker deceives someone into providing the login ID and password by posing as a supervisor, IT maintenance personnel, or other authority. • Brute-force attacks. Have you ever been locked out of an account after attempting to log in more than 3 times with an incorrect password? If so, this is the simplest (and least effective) means of blocking a brute force attack.
  • 35. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 35 However, not all password-protected systems, databases, or files block you from access after 3 attempts. For example, if you have put a lock on a file on your computer, you most likely have not set a limit on the number of attempts on that file. A brute-force attack is a password-guessing approach in which the attacker attempts to discover a password by systematically testing every combination of letters, numbers, and symbols until the correct combination is found. Depending upon the password's length and complexity, this can be a very difficult task to complete. However, there are widely available tools that hackers can use to find the password, and it can be difficult to block all the means by which hacker will try to find the password.
  • 36. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 36 2023
  • 37. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 37
  • 38. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 38 Exploiting Weaknesses in an Operating System or Network Worms, viruses, or Trojan horses could be introduced into an unprotected or poorly protected operating system or computer network that supports the database, leading to potential unauthorized database access (loss of confidentiality), data corruption (loss of integrity), or denial of service (DOS), a loss of access to legitimate users. A DOS may be achieved by causing a server to stop functioning, or “crash,” flooding a network with message traffic or overloading resources on the computer, forcing it to stop handling additional tasks or processing.
  • 39. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 39 Theft of Database Backup Tapes or Hard Drives Database backups typically do not have the same security measures in place that the primary database employs. These backups may not be encrypted, and the media on which backups are stored are also unprotected. Theft of the backup media may allow the attacker full access to the data stored within the backup.
  • 40. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 40 Data Security Data Breaches Threats Databases and security Vulnerabilities Protect PII
  • 41. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 41 Vulnerabilities Databases
  • 42. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 42 A vulnerability is a weakness that can be exploited by cybercriminals to gain unauthorized access to a computer system. https://www.upguard.com/blog/ vulnerability
  • 43. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 43 There are other means by which databases are exposed to security breaches, and these are considered vulnerabilities that may subject a database to a security breach. These are more passive, but they can do as much harm as direct threats: • Data at rest (unencrypted information) that is passively residing in storage within the boundaries of company computers, perhaps waiting to be moved to a secure database. Data at rest typically is not as well protected as data that has been entered into the database and enjoys the database security measures.
  • 44. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 44 • Data in motion is information that is being electronically transmitted outside the company’s protected network via e- mail or other communication mediums. For example, the data might be transferred to a backup facility that is not part of the internal storage media used for daily work. Or if the company uses the cloud for data storage backups, the transfer might take place outside of the company’s protected network. This can lead to a loss of sensitive data if there is a malicious attack via malware during the transfer process or during the execution of a flawed business process that allows unauthorized persons to view or obtain the data. (This is not the same as the accidental breach resulting from incorrect but not malicious usage noted above, where the home computer to which the data has been transferred is attacked or breached. That accidental breach occurred without any intention of harm by the employee.)
  • 45. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 45 • Poor architecture, in which security was not adequately factored into the design and development of the database structure. This vulnerability may not be discovered until there is an attempted or successful data breach. • Vendor bugs, particularly programming flaws that allow actions to take place within the database and with the data that were not intended or planned. Much like poor application architecture, this vulnerability may not be uncovered until there is an attempted or successful data breach. • An unlocked database is one that has no security measures in place to control access or auditing.
  • 46. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 46 This seems counterintuitive, but many home users employing a database for personal needs, or even for working on company data while at home, maybe working with an unlocked database.
  • 47. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 47 Risk Assessments In the business environment, it is critical that a thorough risk assessment takes place and be periodically reviewed.
  • 48. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 48
  • 49. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 49 The assessment should address: • who has access to what data • the circumstances under which access to the database may need to change • who maintains the passwords needed to access the database • who uses the company's computers for access to the internet, e-mail programs, etc., and how employees access those resources • what type of firewalls and anti-malware solutions to put in place • the training of the staff • who has responsibility for enforcement procedures related to data security.
  • 50. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 50 There are identified solutions for each of the threats and vulnerabilities discussed here, including well-defined and enforced access policies, use of strong data encryption, vulnerability assessments, policies related to strong passwords, and installation of firewalls. There are companies that specialize in designing plans, procedures, and software to prevent data loss or data leakage.
  • 51. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 51 With data loss, the data is lost forever, either by deletion, theft, or data corruption. Data leakage allows unauthorized people to get access to the data, either by intentional action or by mistake. So data loss and data leakage can be intentional or unintentional, and both can be malicious or just human errors.
  • 52. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 52 Data Security Data Breaches Threats Databases and security Vulnerabilities Protect PII
  • 53. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 53 Protect Personally Identifiable Information (PII) Databases
  • 54. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 54 Protecting databases and the data contained within can be a costly and all-consuming activity. But what does this mean for you, the individual who uses that credit card, makes airline reservations, files taxes online, subscribes to a magazine, has been a patient in a hospital, shops at a chain store, or is a member of an online social media site?
  • 55. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 55 Your PII is out there, stored in multiple databases. Obviously, you cannot implement security measures for the company, business, or government agency that holds your PII. But are there many measures you can take to better protect yourself? Let’s see some few rules of thumb that you can implement…
  • 56. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 56 Keep your passwords to yourself Do not leave a slip with a list of passwords under your computer, or anywhere where it can be viewed or taken by someone. Just giving your password to a friend is not a good idea, either. Use strong passwords Many of your user IDs must have strong passwords to gain entry into one or more systems. In those instances when you can choose any password configuration, pick a strong password to protect your information.
  • 57. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 57 Use different passwords for different accounts Remembering multiple passwords can be a challenge, and it’s often convenient to use the same password for multiple accounts, ranging from Facebook and your bank account to your X (formerly Twitter) page. The danger here is that a compromise of any one of these accounts could also result in the compromise of others if the same password is used for multiple accounts.
  • 58. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 58 Check your credit reports annually Sometimes people don’t learn that they’re victims of identity theft until their credit rating and identity are destroyed. It’s proactive to get copies of your credit reports from the credit bureaus and carefully review them for any errors. Be sure to follow-up with the credit bureaus to make any corrections to your reports, if needed. By law, you can get one free credit report from each of the three credit bureaus every year.
  • 59. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 59 The three nationwide consumer reporting companies are: ✓ Equifax, ✓ Experian, and ✓ TransUnion
  • 60. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 60 Google yourself Enter your own name in Google, Yahoo or other search engine and see what data comes up. Investigate any postings about yourself in the information that you find. Look for any suggestions that your PII may be compromised. Remember that people can be a very weak link in security No matter how secure you make your passwords and how careful you are with your technology, there is always a human element to protecting your information.
  • 61. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 61 Control physical access to your devices It’s important not leave laptops and other mobile devices unattended in public locations, like a coffee shop or other location with free WiFi. An unattended machine is at risk, for both theft and other security threats. When you aren't controlling physical access to your machine, you shouldn’t let it out of your sight.
  • 62. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 62 Remember to logout of a website when you are finished using it Whether it’s your email, bank account, retail store shopping account or library account, always remember to logout when you leave the website. Remember to lock your computer with a password when you are finished using it By requiring a password to access your computer (or other electronic device) you are protecting your information. You are also making your computer useless to a thief who cannot break password locks.
  • 63. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 63
  • 64. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 64 What does CIA stands for? (No, it’s not Central Intelligence Agency) C I A Consistency Confidentiality Coherence Adherence Availability Abstraction Independence Integrity Importance
  • 65. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 65 True or False? Some companies do not report breaches in order to protect their reputations or to prevent customers from abandoning the company. True False
  • 66. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 66 What is a brute-force attack? 1. password-guessing approach in which the attacker attempts to discover a password by testing every combination of letters, numbers, and symbols until the correct combination is found 2. attacker accesses password files or finds a paper on which the legitimate user has written down the ID and password 3. attacker deceives someone into providing the login ID and password by posing as a supervisor, IT maintenance personnel, or other authority 4. attacker steals backup media and has access to the data stored within the backup
  • 67. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 67 What is a vulnerability? 1. a malicious act that seeks to damage data, steal data, or disrupt digital life in general 2. The probability of exposure, loss of critical assets and sensitive information, or reputational harm as a result of a cyber attack or breach within an organization’s network 3. flooding a network with message traffic or overloading resources on the computer, forcing it to stop handling additional tasks or processing 4. a weakness that can be exploited by cybercriminals to gain unauthorized access to a computer system
  • 68. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 68 Remember some measures you can take to better protect yourself: • Keep your passwords to yourself • Use strong passwords • Use different passwords for different accounts • Check your credit reports annually • Google yourself • Remember that people can be a very weak link in security • Control physical access to your devices • Remember to logout of a website when you are finished using it • Remember to lock your computer with a password when you are finished using it
  • 69. Introduction to Information Technology 7.4. Databases: Databases and Security Issues 69
  • 70. Introduction to Information Technology 7.4. Databases: Databases and Security Issues
  • 71. Introduction to Information Technology 7.4. Databases: Databases and Security Issues Textbook 71 https://eng.libretexts.org/Courses/Prince_ Georges_Community_College/INT_1010% 3A_Concepts_in_Computing Purchase of a book is not required.
  • 72. Introduction to Information Technology 7.4. Databases: Databases and Security Issues Professor C 72 castellr@pgcc.edu eLearning Expert BS & MS in Systems Engineering BS & MS in Military Arts and Science HC Dr in Education IT Professor | Spanish Instructor LCINT1010.wordpress.com Presentation created in 01/2022. Slides last updated on 10/2023
  • 73. Introduction to Information Technology 7.4. Databases: Databases and Security Issues Introduction to Information Technology INT-1010 Prof C Luis R Castellanos 73 07.4 Databases: Databases and Security Issues