SlideShare a Scribd company logo
SECURING DATA
BACKUP
PHYSICAL SECURITY
USERNAMES
ENCRYPTION/DECRYPTION
RESTRICTING ACCESSING USING DBMS VIEWS
RECORD LOCKS IN DBMS
BACK UP
A backup is another copy of the data that can be used to rebuild the
system. If a computer fails or the storage media/database is
damaged, the costs of interrupted operations and replacing any lost
data can be enormous. A DBMS contains backup and recovery
capabilities to guard against data loss. Backups are usually stored offsite and may be in fireproof safe. There are two types of backups:
• A full backup includes all files
• A partial backup includes only those files that have been created or altered.
PHYSICAL SECURITY
Data can be stolen, destroyed or maliciously modified. Data security
involves a series of safeguards to protect data. This includes use of
usernames and passwords, biometric devices, personal objects, and
firewalls. Data can also be encrypted. Restricting access using DBMS
views and record locks in DBMS are also security measures.
Additionally, there are also physical security measures where the
physical location where servers are stored is locked and access is
gained using keys, pass cards or pin numbers.
USERNAMES AND PASSWORDS
•

Passwords can be used to secure individual files, directories or even
entire storage devices

•

Combination of user names and passwords are used by operation
systems, network software and multi-user application to confirm the
identity of users

• Users can set passwords for individual files from within the file’s
related software application
ENCRYPTION/DECRYPTION
•

encryption and decryption. Encryption is the process of encoding data.
Decryption is the process of changing it back (decoding). It is the most
effective of securing data during transmission. Data is encoded, transmitted
and then converted back to its original form. One problem with encryption is
to find a method that is difficult to decode but practical to use. There are two
main types of encryption:

•
•

Asymmetric encryption requires a key for encryption and a key for decryption. It
involves a public key that is widely available (to encrypt) and a private key that is
kept secret (to decrypt).
Symmetric encryption requires the same key for both encryption and decryption. A
common symmetric encryption system is the Data Encryption Standard (DES).
RESTRICTING ACCESSING USING DBMS
VIEWS
• Views – the restricted portion of a database made available to a user
• access within databases commonly involves restricting access to
particular views of the data based on usernames and the client
application being executed by these users

• The restricted portion of a database made available to a user. Views
select particular data but have no effect on the underlying organization
of the database
RECORD LOCKS IN DBMS
•

DBMS software retrieves records rather than files, editing can also be
controlled based on records rather than complete files.

• This prevents the unnecessary or inaccurate changes happening to
the database without the authorization of administrators

• Two types of locking - pessimistic: first user to edit, locks it
• optimistic each change produces two options the old or new, either of
which can be stored or discarded

More Related Content

What's hot

Chapter 12
Chapter 12Chapter 12
Chapter 12
Kristin Harrison
 
Database security
Database securityDatabase security
Database security
Software Engineering
 
Database security and security in networks
Database security and security in networksDatabase security and security in networks
Database security and security in networks
G Prachi
 
Ch11 records management
Ch11 records managementCh11 records management
Ch11 records management
xtin101
 
01 database security ent-db
01  database security ent-db01  database security ent-db
01 database security ent-db
uncleRhyme
 
Allison Stanfield
Allison StanfieldAllison Stanfield
Allison Stanfield
Ark Group Australia Pty Ltd
 
Database security
Database securityDatabase security
Database security
Arpana shree
 
Database security
Database securityDatabase security
Database security
keerthusandeepreddy
 
Security of the database
Security of the databaseSecurity of the database
Security of the database
Pratik Tamgadge
 
Database security
Database securityDatabase security
Database security
Murchana Borah
 
Database security
Database securityDatabase security
Database security
CAS
 
StoreGrid : Introduction & Features
StoreGrid : Introduction & FeaturesStoreGrid : Introduction & Features
StoreGrid : Introduction & Features
Revolucion
 
Wk7 Presentation
Wk7 PresentationWk7 Presentation
Wk7 Presentation
Douglas Pippen
 
Database security issues
Database security issuesDatabase security issues
Database security issues
n|u - The Open Security Community
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
Kristin Harrison
 
Document digitization infographic
Document digitization infographicDocument digitization infographic
Document digitization infographic
Heena Tandon
 
Database Systems Security
Database Systems SecurityDatabase Systems Security
Database Systems Security
amiable_indian
 
DBMS SECURITY
DBMS SECURITYDBMS SECURITY
DBMS SECURITY
Wasim Raza
 
Data base security
Data base securityData base security
Data base security
Sara Nazir
 
Cloud docu ppt
Cloud docu pptCloud docu ppt

What's hot (20)

Chapter 12
Chapter 12Chapter 12
Chapter 12
 
Database security
Database securityDatabase security
Database security
 
Database security and security in networks
Database security and security in networksDatabase security and security in networks
Database security and security in networks
 
Ch11 records management
Ch11 records managementCh11 records management
Ch11 records management
 
01 database security ent-db
01  database security ent-db01  database security ent-db
01 database security ent-db
 
Allison Stanfield
Allison StanfieldAllison Stanfield
Allison Stanfield
 
Database security
Database securityDatabase security
Database security
 
Database security
Database securityDatabase security
Database security
 
Security of the database
Security of the databaseSecurity of the database
Security of the database
 
Database security
Database securityDatabase security
Database security
 
Database security
Database securityDatabase security
Database security
 
StoreGrid : Introduction & Features
StoreGrid : Introduction & FeaturesStoreGrid : Introduction & Features
StoreGrid : Introduction & Features
 
Wk7 Presentation
Wk7 PresentationWk7 Presentation
Wk7 Presentation
 
Database security issues
Database security issuesDatabase security issues
Database security issues
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
Document digitization infographic
Document digitization infographicDocument digitization infographic
Document digitization infographic
 
Database Systems Security
Database Systems SecurityDatabase Systems Security
Database Systems Security
 
DBMS SECURITY
DBMS SECURITYDBMS SECURITY
DBMS SECURITY
 
Data base security
Data base securityData base security
Data base security
 
Cloud docu ppt
Cloud docu pptCloud docu ppt
Cloud docu ppt
 

Similar to Securing data

Encryption technology
Encryption technologyEncryption technology
Encryption technology
Sivakumarraju Gangaraju
 
Creating a Multi-Layered Secured Postgres Database
Creating a Multi-Layered Secured Postgres DatabaseCreating a Multi-Layered Secured Postgres Database
Creating a Multi-Layered Secured Postgres Database
EDB
 
Difference between File system and DBMS.pptx
Difference between File system and DBMS.pptxDifference between File system and DBMS.pptx
Difference between File system and DBMS.pptx
MuhammadHamzaKhan58
 
Data Security Consideration and data secure.pptx
Data Security Consideration and data secure.pptxData Security Consideration and data secure.pptx
Data Security Consideration and data secure.pptx
nikitasoam7781
 
Database security technique with database cache
Database security technique with database cacheDatabase security technique with database cache
Database security technique with database cache
IJARIIT
 
Encrypting and Protecting Your Data in Neo4j(Jeff_Tallman).pptx
Encrypting and Protecting Your Data in Neo4j(Jeff_Tallman).pptxEncrypting and Protecting Your Data in Neo4j(Jeff_Tallman).pptx
Encrypting and Protecting Your Data in Neo4j(Jeff_Tallman).pptx
Neo4j
 
Database Security Presentation Why database Security is important
Database Security Presentation Why database Security is importantDatabase Security Presentation Why database Security is important
Database Security Presentation Why database Security is important
Kamruzzamansohel2
 
File system vs DBMS
File system vs DBMSFile system vs DBMS
File system vs DBMS
BHARATH KUMAR
 
Hsc ipt securing data
Hsc ipt securing dataHsc ipt securing data
Hsc ipt securing data
Vincent Vicencio
 
Data security and Integrity
Data security and IntegrityData security and Integrity
Data security and Integrity
Zaid Shabbir
 
Database Management System.docx
Database Management System.docxDatabase Management System.docx
Database Management System.docx
antonymwangi31
 
Intro to dbms
Intro to dbmsIntro to dbms
Intro to dbms
Surkhab Shelly
 
MobileDBSecurity.pptx
MobileDBSecurity.pptxMobileDBSecurity.pptx
MobileDBSecurity.pptx
missionsk81
 
Data encryption in database management system
Data encryption in database management systemData encryption in database management system
Data encryption in database management system
Rabin BK
 
Database Management System.pptx
Database Management System.pptxDatabase Management System.pptx
Database Management System.pptx
AaravSharma743156
 
Security in oracle
Security in oracleSecurity in oracle
Security in oracle
ssuser40bb47
 
Unit-I mech for studendts for btech .ppt
Unit-I mech for studendts for btech .pptUnit-I mech for studendts for btech .ppt
Unit-I mech for studendts for btech .ppt
DeepakShakya39
 
Introduction to DBMS_VP.pptx
Introduction to DBMS_VP.pptxIntroduction to DBMS_VP.pptx
Introduction to DBMS_VP.pptx
vishnupriyapm4
 
Study of Security functionality in Distributed Database.pptx
Study of Security functionality in Distributed Database.pptxStudy of Security functionality in Distributed Database.pptx
Study of Security functionality in Distributed Database.pptx
HasibAhmadKhaliqi1
 
Chapter 1
Chapter 1Chapter 1

Similar to Securing data (20)

Encryption technology
Encryption technologyEncryption technology
Encryption technology
 
Creating a Multi-Layered Secured Postgres Database
Creating a Multi-Layered Secured Postgres DatabaseCreating a Multi-Layered Secured Postgres Database
Creating a Multi-Layered Secured Postgres Database
 
Difference between File system and DBMS.pptx
Difference between File system and DBMS.pptxDifference between File system and DBMS.pptx
Difference between File system and DBMS.pptx
 
Data Security Consideration and data secure.pptx
Data Security Consideration and data secure.pptxData Security Consideration and data secure.pptx
Data Security Consideration and data secure.pptx
 
Database security technique with database cache
Database security technique with database cacheDatabase security technique with database cache
Database security technique with database cache
 
Encrypting and Protecting Your Data in Neo4j(Jeff_Tallman).pptx
Encrypting and Protecting Your Data in Neo4j(Jeff_Tallman).pptxEncrypting and Protecting Your Data in Neo4j(Jeff_Tallman).pptx
Encrypting and Protecting Your Data in Neo4j(Jeff_Tallman).pptx
 
Database Security Presentation Why database Security is important
Database Security Presentation Why database Security is importantDatabase Security Presentation Why database Security is important
Database Security Presentation Why database Security is important
 
File system vs DBMS
File system vs DBMSFile system vs DBMS
File system vs DBMS
 
Hsc ipt securing data
Hsc ipt securing dataHsc ipt securing data
Hsc ipt securing data
 
Data security and Integrity
Data security and IntegrityData security and Integrity
Data security and Integrity
 
Database Management System.docx
Database Management System.docxDatabase Management System.docx
Database Management System.docx
 
Intro to dbms
Intro to dbmsIntro to dbms
Intro to dbms
 
MobileDBSecurity.pptx
MobileDBSecurity.pptxMobileDBSecurity.pptx
MobileDBSecurity.pptx
 
Data encryption in database management system
Data encryption in database management systemData encryption in database management system
Data encryption in database management system
 
Database Management System.pptx
Database Management System.pptxDatabase Management System.pptx
Database Management System.pptx
 
Security in oracle
Security in oracleSecurity in oracle
Security in oracle
 
Unit-I mech for studendts for btech .ppt
Unit-I mech for studendts for btech .pptUnit-I mech for studendts for btech .ppt
Unit-I mech for studendts for btech .ppt
 
Introduction to DBMS_VP.pptx
Introduction to DBMS_VP.pptxIntroduction to DBMS_VP.pptx
Introduction to DBMS_VP.pptx
 
Study of Security functionality in Distributed Database.pptx
Study of Security functionality in Distributed Database.pptxStudy of Security functionality in Distributed Database.pptx
Study of Security functionality in Distributed Database.pptx
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 

Securing data

  • 2. BACK UP A backup is another copy of the data that can be used to rebuild the system. If a computer fails or the storage media/database is damaged, the costs of interrupted operations and replacing any lost data can be enormous. A DBMS contains backup and recovery capabilities to guard against data loss. Backups are usually stored offsite and may be in fireproof safe. There are two types of backups: • A full backup includes all files • A partial backup includes only those files that have been created or altered.
  • 3. PHYSICAL SECURITY Data can be stolen, destroyed or maliciously modified. Data security involves a series of safeguards to protect data. This includes use of usernames and passwords, biometric devices, personal objects, and firewalls. Data can also be encrypted. Restricting access using DBMS views and record locks in DBMS are also security measures. Additionally, there are also physical security measures where the physical location where servers are stored is locked and access is gained using keys, pass cards or pin numbers.
  • 4. USERNAMES AND PASSWORDS • Passwords can be used to secure individual files, directories or even entire storage devices • Combination of user names and passwords are used by operation systems, network software and multi-user application to confirm the identity of users • Users can set passwords for individual files from within the file’s related software application
  • 5. ENCRYPTION/DECRYPTION • encryption and decryption. Encryption is the process of encoding data. Decryption is the process of changing it back (decoding). It is the most effective of securing data during transmission. Data is encoded, transmitted and then converted back to its original form. One problem with encryption is to find a method that is difficult to decode but practical to use. There are two main types of encryption: • • Asymmetric encryption requires a key for encryption and a key for decryption. It involves a public key that is widely available (to encrypt) and a private key that is kept secret (to decrypt). Symmetric encryption requires the same key for both encryption and decryption. A common symmetric encryption system is the Data Encryption Standard (DES).
  • 6. RESTRICTING ACCESSING USING DBMS VIEWS • Views – the restricted portion of a database made available to a user • access within databases commonly involves restricting access to particular views of the data based on usernames and the client application being executed by these users • The restricted portion of a database made available to a user. Views select particular data but have no effect on the underlying organization of the database
  • 7. RECORD LOCKS IN DBMS • DBMS software retrieves records rather than files, editing can also be controlled based on records rather than complete files. • This prevents the unnecessary or inaccurate changes happening to the database without the authorization of administrators • Two types of locking - pessimistic: first user to edit, locks it • optimistic each change produces two options the old or new, either of which can be stored or discarded