SlideShare a Scribd company logo
Database Security Solution

Developed By
Protech Infosystems Pvt. Ltd.
(PIPL)

An ISO 9001:2008 Certified Company
Why Data Security apart from that offered by DATABASE
Governments and industry groups are mandating security measures over
privacy, healthcare and financial data,
Companies create, modify, store, and move vast amount of data every day.
Loss of data integrity by unauthorized manipulation of crucial data has
emerged as one of the biggest hurdles inside the enterprises today. Usually
such incidents are detected much later.
According to IDC, several of the top issues faced by IT organizations involve
threats to sensitive data:
• Outsiders penetrating the network and gaining access to protected
information and modify the data creating loss of database integrity
• Intentional misuse by disgruntled or malicious insiders / outsourcing
partner
• Inadvertent mistakes by under-informed insiders
• Employees following flawed policies and/or procedures
Today’s Data Security problem
Operating
System
Administrators
or
Database
Administrators or external hackers or outsourcing
maintenance team can do anything they want to the
database almost without any track.

Each year, approximately 15 million Americans are
identity theft victims with financial losses to the
country totaling close to $50 billion.
Source:
http://www.identitytheft.info/financial.aspx

Recent Headlines:

 Criminal gangs with malicious plan get into identity
theft and modification of critical data sets.
ShieldDB – A Unique Data Security product
Why ShieldDB (Problem Statement)

Business areas affected by Unauthorized access
• Bank / Demat Account / Credit Card / Insurance / Health Care
• Salary, Income Tax Related Information
• University Admission, Marks Data
• Land and License Records
• Business Secrets of Government & other organizations
• Resident Information

Trend
Through 2016, the financial impact of cybercrime will grow 10
% per year due to the continuing discovery of new
vulnerabilities. Gartner Top Predictions for 2012: Control Slips Away, Gartner, December 2011
Present Security Scenario
Background of ShieldDB
 Data manipulations, mostly by internal users, without keeping any track are
considered as unauthorized access and are biggest threat – our ShieldDB
is designed to identify such events and report to owners.
 Our solution is based on Statistical methods. Once the solution is
implemented, such thefts will be brought to notice for taking corrective
measures.
 Performance of Application will not be degraded while our solution is
implemented.

 Our solution maps large dataset into a small digital fingerprint (cryptic
image of the database) and will be under up gradation with every change in
main database by registered applications.
 Desired fingerprints will be matched with Actual at preset intervals for
identifying the changed location in database, date
and time of
unauthorized changes, even made through privileged authority.
ShieldDB Environment
How ShieldDB protects…
 Any unauthorized modification can be identified
and original data can be restored back.

 Source of unauthorized access & Time of such
transactions can also to be tracked.
 The key to access the shieldDB database will be
divided among multiple users.
 Reporting of incidences of security breaches
and related identity through e-mail / SMS.
ShieldDB Architecture
Application Service Delivery
Using J2EE

Security Service Delivery Using
J2EE

Application Service
Orchestration & Integration
Using J2EE

Security Service Orchestration
& Integration Using J2EE

Application Layer
Core & Common Business
Service using C++ and J2EE

ShieldDB Security
Layer using C++ and
J2EE

Security
Server

Database Layer (ORACLE/ Sybase/DB2/MSSQL/MYSQL etc.)
OS Layer (UNIX / Linux/Solaris/ Windows/ IBM z/OS etc.)
User – ShieldDB Interface
Core processes in ShieldDB
Fingerprint
Generation
Security
Server

Fingerprint
Updated
Fingerprint

Fingerprint
Updation

Fingerprint
Verification

Fingerprint
Generation

Fingerprint

Mail
Client
Database
Server

Fingerprint
Comparison

Verification
Error

SMS
Configuration of ShieldDB Security Server
Hardware:
• Standard mid-range Server
• Server configuration depending upon transactions &
Data volume

System Software:
• Server- Windows 2008 /Red Hat Linux/ Solaris
• Client - Windows XP/ Vista/ Windows 7
• Java Runtime Environment (JRE) 1.5
• Apache Tomcat Server 5.5 / 6.0
• IE 9 / Mozilla Firefox 16.0 / Google Chrome 22.0
• Database as in Production environment
Support requirement - Implementation
• Access permission of Production database is
essential for formation of Digital finger print of
database and Updation required for matching. p
• Separate ShieldDB Server
• Identification of crucial Tables / Columns
• List
of
authorized
applications
and
corresponding tables in database.
• Database
• JAVA 1.7 (JRE and JDK)
• Apache Tomcat 6.0
Administrative Multi authentication Log-In Screen – ShieldDB
ShieldDB Error Reporting As on Fri Sep 20, 2013- 16:59:14

Error Description

Table Name

Value
before
Updation

Value
after
Updation

Unauthorized change made in Col = 3 of Row No = 2

DEPT

DALllllll

DALl

Unauthorized change made in Col = 2 of Row No = 3

DEPT

SALE

SAL

Unauthorized change made in Col = 3 of Row No = 7

BONUS

7512

7

Unauthorized change made in Col = 9 of Row No = 3687

BIG_DATA

7000

70

Unauthorized change made in Col = 7 of Row No = 5116

BIG_DATA

9000

90
ShieldDB Features
Serial
No.

PRODUCT
FEATURES

Version – 1

Version – 2

1

Restricted Access to Sensitive Data



2

Customized Policy Administration



3

Security Audit(Point of Access &
Logging Details Detection)





4

Unauthorized Access Detection





5

Session Management and Access
Control Mechanism

6

Alert generation and Built in Report

7

Data Management Tools



8

Integration with other Application







Product Highlights/Benefits to client
 At present similar innovative product with indicated
functionalities and effective alert system is not
available
 Incorporation of user-specific reporting tools.
 Robust algorithm based on Statistical Techniques.
 No serious effect on optimum performance of
Production Server
 Works without interacting AUDIT TRAIL
 Assist management to monitor integrity of database
 Support multiple Database Platforms.
 Intellectual Consultancy for ShieldDB provided by
academicians of Indian Statistical Institute, Kolkata.
Intellectual Support & Consultancy
Protech Infosystems Pvt. Ltd. – A Snapshot
 Incorporated in 2007 in INDIA.
 ISO 9001:2008 Certified Company
 Experienced team of Management & Professionals
 Maturity in IT, ITES and GIS Projects
 Experience in Multiple Domains & Technologies
 Business Associates from different Industries
Protech Infosystems Pvt. Ltd. – Goals










Create impact in Information Technology
Early Return on Investment
Grow at a manageable pace
Fulfill Social Responsibility
Meeting Financial Target
Generate Large client base
Diversification in R&D
Focus in identified Niche Area
IT’S THE BEGINNING OF THE JOURNEY

THANK YOU
Office: AQ-13/1, 4th Floor, Salt Lake,
Sector-V, Kolkata-700091
Contacts: +91 (33) 6541 1317 / +91 98300 10867(M)
E-mail:
corporate@ptinfosys.com
Website: www.ptinfosys.com

More Related Content

What's hot

PCI DSS v3.0: How to Adapt Your Compliance Strategy
PCI DSS v3.0: How to Adapt Your Compliance StrategyPCI DSS v3.0: How to Adapt Your Compliance Strategy
PCI DSS v3.0: How to Adapt Your Compliance Strategy
AlienVault
 
PCI DSS Compliance Checklist
PCI DSS Compliance ChecklistPCI DSS Compliance Checklist
PCI DSS Compliance Checklist
ControlCase
 
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
Matthew Rosenquist
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
Adrian Dumitrescu
 
The Role of Government in Identity Management
The Role of Government in Identity ManagementThe Role of Government in Identity Management
The Role of Government in Identity Management
Don Lovett
 
WISekey IoT Technologies Presentation
WISekey IoT Technologies PresentationWISekey IoT Technologies Presentation
WISekey IoT Technologies Presentation
Creus Moreira Carlos
 
PCI DSS and PA DSS Compliance
PCI DSS and PA DSS CompliancePCI DSS and PA DSS Compliance
PCI DSS and PA DSS Compliance
ControlCase
 
IT Service & Asset Management Better Together
IT Service & Asset Management Better TogetherIT Service & Asset Management Better Together
IT Service & Asset Management Better Together
Ivanti
 
Whitepaper IBM Guardium Data Activity Monitor
Whitepaper IBM Guardium Data Activity MonitorWhitepaper IBM Guardium Data Activity Monitor
Whitepaper IBM Guardium Data Activity Monitor
Camilo Fandiño Gómez
 
Introduction to Token Service Provider (TSP) Certification
Introduction to Token Service Provider (TSP) CertificationIntroduction to Token Service Provider (TSP) Certification
Introduction to Token Service Provider (TSP) Certification
ControlCase
 
Is Government Data as Safe as it Could Be?
Is Government Data as Safe as it Could Be?Is Government Data as Safe as it Could Be?
Is Government Data as Safe as it Could Be?
Samsung SDS America
 
Continual Compliance Monitoring
Continual Compliance MonitoringContinual Compliance Monitoring
Continual Compliance Monitoring
Kimberly Simon MBA
 
PCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATION
PCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATIONPCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATION
PCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATION
himalya sharma
 
Vulnerability Testing Services Case Study
Vulnerability Testing Services Case StudyVulnerability Testing Services Case Study
Vulnerability Testing Services Case Study
Nandita Nityanandam
 
Qradar Business Case
Qradar Business CaseQradar Business Case
The Trick to Passing Your Next Compliance Audit
The Trick to Passing Your Next Compliance AuditThe Trick to Passing Your Next Compliance Audit
The Trick to Passing Your Next Compliance Audit
SBWebinars
 
Frost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-finalFrost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-final
Wendy Murphy
 
OmniNet MDS HIPPA Compliance Info
OmniNet MDS HIPPA Compliance InfoOmniNet MDS HIPPA Compliance Info
OmniNet MDS HIPPA Compliance Info
Jonathan Eubanks
 

What's hot (19)

PCI DSS v3.0: How to Adapt Your Compliance Strategy
PCI DSS v3.0: How to Adapt Your Compliance StrategyPCI DSS v3.0: How to Adapt Your Compliance Strategy
PCI DSS v3.0: How to Adapt Your Compliance Strategy
 
AL_PCI-Cheatsheet_web
AL_PCI-Cheatsheet_webAL_PCI-Cheatsheet_web
AL_PCI-Cheatsheet_web
 
PCI DSS Compliance Checklist
PCI DSS Compliance ChecklistPCI DSS Compliance Checklist
PCI DSS Compliance Checklist
 
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 
The Role of Government in Identity Management
The Role of Government in Identity ManagementThe Role of Government in Identity Management
The Role of Government in Identity Management
 
WISekey IoT Technologies Presentation
WISekey IoT Technologies PresentationWISekey IoT Technologies Presentation
WISekey IoT Technologies Presentation
 
PCI DSS and PA DSS Compliance
PCI DSS and PA DSS CompliancePCI DSS and PA DSS Compliance
PCI DSS and PA DSS Compliance
 
IT Service & Asset Management Better Together
IT Service & Asset Management Better TogetherIT Service & Asset Management Better Together
IT Service & Asset Management Better Together
 
Whitepaper IBM Guardium Data Activity Monitor
Whitepaper IBM Guardium Data Activity MonitorWhitepaper IBM Guardium Data Activity Monitor
Whitepaper IBM Guardium Data Activity Monitor
 
Introduction to Token Service Provider (TSP) Certification
Introduction to Token Service Provider (TSP) CertificationIntroduction to Token Service Provider (TSP) Certification
Introduction to Token Service Provider (TSP) Certification
 
Is Government Data as Safe as it Could Be?
Is Government Data as Safe as it Could Be?Is Government Data as Safe as it Could Be?
Is Government Data as Safe as it Could Be?
 
Continual Compliance Monitoring
Continual Compliance MonitoringContinual Compliance Monitoring
Continual Compliance Monitoring
 
PCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATION
PCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATIONPCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATION
PCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATION
 
Vulnerability Testing Services Case Study
Vulnerability Testing Services Case StudyVulnerability Testing Services Case Study
Vulnerability Testing Services Case Study
 
Qradar Business Case
Qradar Business CaseQradar Business Case
Qradar Business Case
 
The Trick to Passing Your Next Compliance Audit
The Trick to Passing Your Next Compliance AuditThe Trick to Passing Your Next Compliance Audit
The Trick to Passing Your Next Compliance Audit
 
Frost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-finalFrost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-final
 
OmniNet MDS HIPPA Compliance Info
OmniNet MDS HIPPA Compliance InfoOmniNet MDS HIPPA Compliance Info
OmniNet MDS HIPPA Compliance Info
 

Viewers also liked

Wowkigu Animal Onesies
Wowkigu Animal OnesiesWowkigu Animal Onesies
Wowkigu Animal Onesies
wowkigu
 
Современные организации и корпоративные культуры
Современные организации и корпоративные культурыСовременные организации и корпоративные культуры
Современные организации и корпоративные культуры
Ekaterina Trubilo
 
Psi umum makalah
Psi umum makalahPsi umum makalah
Psi umum makalahTriWahyuO
 
Kerstgroet 2013
Kerstgroet  2013Kerstgroet  2013
Kerstgroet 2013
Michael Kubbenga
 
Manajemen kompensasi
Manajemen kompensasiManajemen kompensasi
Manajemen kompensasiTriWahyuO
 
CPU Scheduling algorithms
CPU Scheduling algorithmsCPU Scheduling algorithms
CPU Scheduling algorithms
Shanu Kumar
 

Viewers also liked (8)

Wowkigu Animal Onesies
Wowkigu Animal OnesiesWowkigu Animal Onesies
Wowkigu Animal Onesies
 
Hse digest release_v2
Hse digest release_v2Hse digest release_v2
Hse digest release_v2
 
Современные организации и корпоративные культуры
Современные организации и корпоративные культурыСовременные организации и корпоративные культуры
Современные организации и корпоративные культуры
 
Psi umum makalah
Psi umum makalahPsi umum makalah
Psi umum makalah
 
It news
It newsIt news
It news
 
Kerstgroet 2013
Kerstgroet  2013Kerstgroet  2013
Kerstgroet 2013
 
Manajemen kompensasi
Manajemen kompensasiManajemen kompensasi
Manajemen kompensasi
 
CPU Scheduling algorithms
CPU Scheduling algorithmsCPU Scheduling algorithms
CPU Scheduling algorithms
 

Similar to Shield db data security

Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"
IBM Security
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical Data
IBM Security
 
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level Executives
Camilo Fandiño Gómez
 
Kripta Key Product Key Management System.pdf
Kripta Key Product Key Management System.pdfKripta Key Product Key Management System.pdf
Kripta Key Product Key Management System.pdf
langkahgontay88
 
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
SolarWinds
 
Three Dimensions of Data as a Service
Three Dimensions of Data as a ServiceThree Dimensions of Data as a Service
Three Dimensions of Data as a Service
Denodo
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
dawnrk
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
dawnrk
 
A Key to Real-time Insights in a Post-COVID World (ASEAN)
A Key to Real-time Insights in a Post-COVID World (ASEAN)A Key to Real-time Insights in a Post-COVID World (ASEAN)
A Key to Real-time Insights in a Post-COVID World (ASEAN)
Denodo
 
Cloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 StepsCloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 Steps
Omar Khawaja
 
Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control	Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control
DBmaestro - Database DevOps
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptx
TranVu383073
 
Greenplum User Case
Greenplum User Case Greenplum User Case
Greenplum User Case
VMware Tanzu Korea
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
IBM
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and Compliance
David J Rosenthal
 
Improve IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkImprove IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in Splunk
Precisely
 
Oil and gas big data edition
Oil and gas  big data editionOil and gas  big data edition
Oil and gas big data edition
Mark Kerzner
 
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?
IBM Security
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big risk
IBM Sverige
 

Similar to Shield db data security (20)

BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical Data
 
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level Executives
 
Kripta Key Product Key Management System.pdf
Kripta Key Product Key Management System.pdfKripta Key Product Key Management System.pdf
Kripta Key Product Key Management System.pdf
 
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
 
Three Dimensions of Data as a Service
Three Dimensions of Data as a ServiceThree Dimensions of Data as a Service
Three Dimensions of Data as a Service
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
 
A Key to Real-time Insights in a Post-COVID World (ASEAN)
A Key to Real-time Insights in a Post-COVID World (ASEAN)A Key to Real-time Insights in a Post-COVID World (ASEAN)
A Key to Real-time Insights in a Post-COVID World (ASEAN)
 
Cloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 StepsCloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 Steps
 
Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control	Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptx
 
Greenplum User Case
Greenplum User Case Greenplum User Case
Greenplum User Case
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and Compliance
 
Improve IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkImprove IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in Splunk
 
Oil and gas big data edition
Oil and gas  big data editionOil and gas  big data edition
Oil and gas big data edition
 
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big risk
 

Recently uploaded

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 

Recently uploaded (20)

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 

Shield db data security

  • 1. Database Security Solution Developed By Protech Infosystems Pvt. Ltd. (PIPL) An ISO 9001:2008 Certified Company
  • 2. Why Data Security apart from that offered by DATABASE Governments and industry groups are mandating security measures over privacy, healthcare and financial data, Companies create, modify, store, and move vast amount of data every day. Loss of data integrity by unauthorized manipulation of crucial data has emerged as one of the biggest hurdles inside the enterprises today. Usually such incidents are detected much later. According to IDC, several of the top issues faced by IT organizations involve threats to sensitive data: • Outsiders penetrating the network and gaining access to protected information and modify the data creating loss of database integrity • Intentional misuse by disgruntled or malicious insiders / outsourcing partner • Inadvertent mistakes by under-informed insiders • Employees following flawed policies and/or procedures
  • 3. Today’s Data Security problem Operating System Administrators or Database Administrators or external hackers or outsourcing maintenance team can do anything they want to the database almost without any track. Each year, approximately 15 million Americans are identity theft victims with financial losses to the country totaling close to $50 billion. Source: http://www.identitytheft.info/financial.aspx Recent Headlines:  Criminal gangs with malicious plan get into identity theft and modification of critical data sets. ShieldDB – A Unique Data Security product
  • 4. Why ShieldDB (Problem Statement) Business areas affected by Unauthorized access • Bank / Demat Account / Credit Card / Insurance / Health Care • Salary, Income Tax Related Information • University Admission, Marks Data • Land and License Records • Business Secrets of Government & other organizations • Resident Information Trend Through 2016, the financial impact of cybercrime will grow 10 % per year due to the continuing discovery of new vulnerabilities. Gartner Top Predictions for 2012: Control Slips Away, Gartner, December 2011
  • 6. Background of ShieldDB  Data manipulations, mostly by internal users, without keeping any track are considered as unauthorized access and are biggest threat – our ShieldDB is designed to identify such events and report to owners.  Our solution is based on Statistical methods. Once the solution is implemented, such thefts will be brought to notice for taking corrective measures.  Performance of Application will not be degraded while our solution is implemented.  Our solution maps large dataset into a small digital fingerprint (cryptic image of the database) and will be under up gradation with every change in main database by registered applications.  Desired fingerprints will be matched with Actual at preset intervals for identifying the changed location in database, date and time of unauthorized changes, even made through privileged authority.
  • 8. How ShieldDB protects…  Any unauthorized modification can be identified and original data can be restored back.  Source of unauthorized access & Time of such transactions can also to be tracked.  The key to access the shieldDB database will be divided among multiple users.  Reporting of incidences of security breaches and related identity through e-mail / SMS.
  • 9. ShieldDB Architecture Application Service Delivery Using J2EE Security Service Delivery Using J2EE Application Service Orchestration & Integration Using J2EE Security Service Orchestration & Integration Using J2EE Application Layer Core & Common Business Service using C++ and J2EE ShieldDB Security Layer using C++ and J2EE Security Server Database Layer (ORACLE/ Sybase/DB2/MSSQL/MYSQL etc.) OS Layer (UNIX / Linux/Solaris/ Windows/ IBM z/OS etc.)
  • 10. User – ShieldDB Interface
  • 11. Core processes in ShieldDB Fingerprint Generation Security Server Fingerprint Updated Fingerprint Fingerprint Updation Fingerprint Verification Fingerprint Generation Fingerprint Mail Client Database Server Fingerprint Comparison Verification Error SMS
  • 12. Configuration of ShieldDB Security Server Hardware: • Standard mid-range Server • Server configuration depending upon transactions & Data volume System Software: • Server- Windows 2008 /Red Hat Linux/ Solaris • Client - Windows XP/ Vista/ Windows 7 • Java Runtime Environment (JRE) 1.5 • Apache Tomcat Server 5.5 / 6.0 • IE 9 / Mozilla Firefox 16.0 / Google Chrome 22.0 • Database as in Production environment
  • 13. Support requirement - Implementation • Access permission of Production database is essential for formation of Digital finger print of database and Updation required for matching. p • Separate ShieldDB Server • Identification of crucial Tables / Columns • List of authorized applications and corresponding tables in database. • Database • JAVA 1.7 (JRE and JDK) • Apache Tomcat 6.0
  • 14. Administrative Multi authentication Log-In Screen – ShieldDB
  • 15. ShieldDB Error Reporting As on Fri Sep 20, 2013- 16:59:14 Error Description Table Name Value before Updation Value after Updation Unauthorized change made in Col = 3 of Row No = 2 DEPT DALllllll DALl Unauthorized change made in Col = 2 of Row No = 3 DEPT SALE SAL Unauthorized change made in Col = 3 of Row No = 7 BONUS 7512 7 Unauthorized change made in Col = 9 of Row No = 3687 BIG_DATA 7000 70 Unauthorized change made in Col = 7 of Row No = 5116 BIG_DATA 9000 90
  • 16. ShieldDB Features Serial No. PRODUCT FEATURES Version – 1 Version – 2 1 Restricted Access to Sensitive Data  2 Customized Policy Administration  3 Security Audit(Point of Access & Logging Details Detection)   4 Unauthorized Access Detection   5 Session Management and Access Control Mechanism 6 Alert generation and Built in Report 7 Data Management Tools  8 Integration with other Application    
  • 17. Product Highlights/Benefits to client  At present similar innovative product with indicated functionalities and effective alert system is not available  Incorporation of user-specific reporting tools.  Robust algorithm based on Statistical Techniques.  No serious effect on optimum performance of Production Server  Works without interacting AUDIT TRAIL  Assist management to monitor integrity of database  Support multiple Database Platforms.  Intellectual Consultancy for ShieldDB provided by academicians of Indian Statistical Institute, Kolkata.
  • 18. Intellectual Support & Consultancy
  • 19. Protech Infosystems Pvt. Ltd. – A Snapshot  Incorporated in 2007 in INDIA.  ISO 9001:2008 Certified Company  Experienced team of Management & Professionals  Maturity in IT, ITES and GIS Projects  Experience in Multiple Domains & Technologies  Business Associates from different Industries
  • 20. Protech Infosystems Pvt. Ltd. – Goals         Create impact in Information Technology Early Return on Investment Grow at a manageable pace Fulfill Social Responsibility Meeting Financial Target Generate Large client base Diversification in R&D Focus in identified Niche Area
  • 21. IT’S THE BEGINNING OF THE JOURNEY THANK YOU Office: AQ-13/1, 4th Floor, Salt Lake, Sector-V, Kolkata-700091 Contacts: +91 (33) 6541 1317 / +91 98300 10867(M) E-mail: corporate@ptinfosys.com Website: www.ptinfosys.com