SlideShare a Scribd company logo
1 of 26
B.Sc. Information Technology
Security In Computing
Unit 2 – Chapter 7
Database Security
By Mehdi Rezaei
Introduction
• Most modern organizations rely heavily on the information stored in
their database systems.
• From sales transactions to human resources records, mission-critical,
sensitive data is tracked within these systems.
• From the standpoint of security, it is very important that business and
systems administrators take the proper precautions to ensure that
these systems and applications are as secure as possible.
• You wouldn’t want a junior-level database administrator to be able to
access information that only the executive team should see; but you
also wouldn’t want to prevent your staff from doing their jobs.
• As with all security implementations, the key is to find a balance
between security and usability.
General Database Security Concepts
Multi Tier Systems
• Databases can be used in various capacities, including:
• Application support Ranging from simple employee lists to
enterprise-level tracking software, relational databases are the most
commonly used method for storing data. Through the use of modern
databases, users and developers can rely on security, scalability, and
recoverability features.
• Secure storage of sensitive information Relational databases offer
one of the most secure methods of centrally storing important data.
These methods can be used to meet legislative requirements in
regulated industries (for example, the HIPAA standard for storing and
transferring healthcare-related information) and generally for storing
important data.
• Online transaction processing (OLTP) OLTP services are often the
most common functions of databases in many organizations. These
systems are responsible for receiving and storing information that is
accessed by client applications and other servers.
• OLTP databases are characterized by having a high level of data
modification (inserting, updating, and deleting rows). Therefore, they
are optimized to support dynamically changing data. Generally, they
store large volumes of information that can balloon very quickly if not
managed properly.
OLTP Example
Online analytical processing (OLAP)
• Data warehousing Many organizations go to great lengths to collect and
store as much information as possible.
But what good is this information if it can’t easily be analyzed?
The primary business reason for storing many types of information is to use
this data eventually to help make business decisions.
Although reports can be generated against OLTP databases, there are several
potential problems: Reports might take a long time to run, and thus tax
system resources.
• If reports are run against a production OLTP server, overall system
performance can be significantly decreased.
• OLTP servers are not optimized for the types of queries used in
reporting, thus making the problem worse.
Understanding Database Security Layers
• Each layer of security is designed for a specific purpose and can be
used to provide authorization rules.
• In order to get access to your most trusted information, users must
have appropriate permissions at one or more of these layers.
• As a database or systems administrator, your job is to ensure that the
hurdles are of the proper height—that is, your security model takes
into account both security and usability.
Server-Level Security
• A database application is only as secure as the server it is running on.
• Therefore, it’s important to start considering security settings at the level of
the physical server or servers on which your databases will be hosted. In
smaller, simple configurations, you might need to secure only a single
machine.
• Larger organizations will likely have to make accommodations for many
servers. These servers may be geographically distributed and even
arranged in complex clustered configurations.
Network-Level Security
• Some standard “best practices” for securing databases include
limiting the networks and/or network addresses that have direct
access to the computer.
• For example, you might implement routing rules and packet
filtering to ensure that only specific users on your internal
network will even be able to communicate with a server.
Data Encryption
• Another method for ensuring the safety of database information
is to use encryption.
• Most modern databases support encrypted connections
between the client and the server.
• Although these protocols can sometimes add significant
processing and data transfer overhead (especially for large
result sets or very busy servers), the added security may be
required in some situations.
Operating System Security
• Network configuration settings, file system permissions,
authentication mechanisms, and operating system encryption
features can all play a role in ensuring that databases remain
secure.
• For example, on Windows-based operating systems, only the
NTFS file system offers any level of file system security (FAT
and FAT32 partitions do not provide any file system security at
all).
• Managing Database Logins
• For example, many relational database products that operate on
Microsoft’s Windows operating system platform can utilize the security
features of a domain-based security model.
• Based on an individual’s user account and group membership, he or she
can perform a seamless “pass-through authentication” that does not
require rekeying a username or password.
Understanding Database-Level
Security
• Databases are commonly used to host many different databases and
applications, and users should have different types of permissions based
on their job functions.
• Once a user has been allowed to connect to a server (through the use of a
server login), the user will be given only the permissions that are granted
to that login.
• This process of determining permissions is generally known as
authorization. Let’s take a look at some standard types of database-level
permissions.
• The first type of database-level security is generally used to
determine to which database(s) a user has access
• Once a user has been granted permissions to access a
database, further permissions must be assigned to determine
which actions he or she can take within the database. Let’s look
at those permissions next.

More Related Content

Similar to Unit 2 - Chapter 7 (Database Security).pptx

Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System AdministrationDuressa Teshome
 
Characteristics and Advantages of Database Management System
Characteristics and Advantages of Database Management SystemCharacteristics and Advantages of Database Management System
Characteristics and Advantages of Database Management SystemCharthaGaglani
 
Database management system lecture notes
Database management system lecture notesDatabase management system lecture notes
Database management system lecture notesUTSAHSINGH2
 
Final Study of Security functionality in Distributed Database.pptx
Final Study of Security functionality in Distributed Database.pptxFinal Study of Security functionality in Distributed Database.pptx
Final Study of Security functionality in Distributed Database.pptxHasibAhmadKhaliqi1
 
An Overview of Security in Distributed Database Management System
An Overview of Security in Distributed Database Management SystemAn Overview of Security in Distributed Database Management System
An Overview of Security in Distributed Database Management SystemIJSRD
 
Maintenance of Hospital Information System
Maintenance of Hospital Information SystemMaintenance of Hospital Information System
Maintenance of Hospital Information SystemDr Jasbeer Singh
 
access-control-week-3
access-control-week-3access-control-week-3
access-control-week-3jemtallon
 
Locking Down Your Data: Best Practices for Database Security
Locking Down Your Data: Best Practices for Database SecurityLocking Down Your Data: Best Practices for Database Security
Locking Down Your Data: Best Practices for Database SecurityFredReynolds2
 
Cp 121 lecture 01
Cp 121 lecture 01Cp 121 lecture 01
Cp 121 lecture 01ITNet
 
Unit 1: Introduction to DBMS Unit 1 Complete
Unit 1: Introduction to DBMS Unit 1 CompleteUnit 1: Introduction to DBMS Unit 1 Complete
Unit 1: Introduction to DBMS Unit 1 CompleteRaj vardhan
 
Application Of A New Database Management System
Application Of A New Database Management SystemApplication Of A New Database Management System
Application Of A New Database Management SystemPamela Wright
 

Similar to Unit 2 - Chapter 7 (Database Security).pptx (20)

Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
 
Characteristics and Advantages of Database Management System
Characteristics and Advantages of Database Management SystemCharacteristics and Advantages of Database Management System
Characteristics and Advantages of Database Management System
 
Database management system lecture notes
Database management system lecture notesDatabase management system lecture notes
Database management system lecture notes
 
Conducting_a_Business_and_Systems_Analysis
Conducting_a_Business_and_Systems_AnalysisConducting_a_Business_and_Systems_Analysis
Conducting_a_Business_and_Systems_Analysis
 
Final Study of Security functionality in Distributed Database.pptx
Final Study of Security functionality in Distributed Database.pptxFinal Study of Security functionality in Distributed Database.pptx
Final Study of Security functionality in Distributed Database.pptx
 
An Overview of Security in Distributed Database Management System
An Overview of Security in Distributed Database Management SystemAn Overview of Security in Distributed Database Management System
An Overview of Security in Distributed Database Management System
 
Database & Database Users
Database & Database UsersDatabase & Database Users
Database & Database Users
 
Maintenance of Hospital Information System
Maintenance of Hospital Information SystemMaintenance of Hospital Information System
Maintenance of Hospital Information System
 
access-control-week-3
access-control-week-3access-control-week-3
access-control-week-3
 
Locking Down Your Data: Best Practices for Database Security
Locking Down Your Data: Best Practices for Database SecurityLocking Down Your Data: Best Practices for Database Security
Locking Down Your Data: Best Practices for Database Security
 
1. Introduction to OS.ppt
1. Introduction to OS.ppt1. Introduction to OS.ppt
1. Introduction to OS.ppt
 
PHP/MySQL First Session Material
PHP/MySQL First Session MaterialPHP/MySQL First Session Material
PHP/MySQL First Session Material
 
Operating System-adi.pdf
Operating System-adi.pdfOperating System-adi.pdf
Operating System-adi.pdf
 
Unit1 dbms
Unit1 dbmsUnit1 dbms
Unit1 dbms
 
Cp 121 lecture 01
Cp 121 lecture 01Cp 121 lecture 01
Cp 121 lecture 01
 
Distributed dbms (ddbms)
Distributed dbms (ddbms)Distributed dbms (ddbms)
Distributed dbms (ddbms)
 
Unit 1: Introduction to DBMS Unit 1 Complete
Unit 1: Introduction to DBMS Unit 1 CompleteUnit 1: Introduction to DBMS Unit 1 Complete
Unit 1: Introduction to DBMS Unit 1 Complete
 
Application Of A New Database Management System
Application Of A New Database Management SystemApplication Of A New Database Management System
Application Of A New Database Management System
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Ch01
Ch01Ch01
Ch01
 

Recently uploaded

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 

Recently uploaded (20)

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 

Unit 2 - Chapter 7 (Database Security).pptx

  • 1. B.Sc. Information Technology Security In Computing Unit 2 – Chapter 7 Database Security By Mehdi Rezaei
  • 2. Introduction • Most modern organizations rely heavily on the information stored in their database systems. • From sales transactions to human resources records, mission-critical, sensitive data is tracked within these systems. • From the standpoint of security, it is very important that business and systems administrators take the proper precautions to ensure that these systems and applications are as secure as possible.
  • 3.
  • 4. • You wouldn’t want a junior-level database administrator to be able to access information that only the executive team should see; but you also wouldn’t want to prevent your staff from doing their jobs. • As with all security implementations, the key is to find a balance between security and usability.
  • 6.
  • 7.
  • 9. • Databases can be used in various capacities, including: • Application support Ranging from simple employee lists to enterprise-level tracking software, relational databases are the most commonly used method for storing data. Through the use of modern databases, users and developers can rely on security, scalability, and recoverability features.
  • 10. • Secure storage of sensitive information Relational databases offer one of the most secure methods of centrally storing important data. These methods can be used to meet legislative requirements in regulated industries (for example, the HIPAA standard for storing and transferring healthcare-related information) and generally for storing important data.
  • 11. • Online transaction processing (OLTP) OLTP services are often the most common functions of databases in many organizations. These systems are responsible for receiving and storing information that is accessed by client applications and other servers. • OLTP databases are characterized by having a high level of data modification (inserting, updating, and deleting rows). Therefore, they are optimized to support dynamically changing data. Generally, they store large volumes of information that can balloon very quickly if not managed properly.
  • 12.
  • 15. • Data warehousing Many organizations go to great lengths to collect and store as much information as possible. But what good is this information if it can’t easily be analyzed? The primary business reason for storing many types of information is to use this data eventually to help make business decisions. Although reports can be generated against OLTP databases, there are several potential problems: Reports might take a long time to run, and thus tax system resources.
  • 16. • If reports are run against a production OLTP server, overall system performance can be significantly decreased. • OLTP servers are not optimized for the types of queries used in reporting, thus making the problem worse.
  • 17. Understanding Database Security Layers • Each layer of security is designed for a specific purpose and can be used to provide authorization rules. • In order to get access to your most trusted information, users must have appropriate permissions at one or more of these layers. • As a database or systems administrator, your job is to ensure that the hurdles are of the proper height—that is, your security model takes into account both security and usability.
  • 18. Server-Level Security • A database application is only as secure as the server it is running on. • Therefore, it’s important to start considering security settings at the level of the physical server or servers on which your databases will be hosted. In smaller, simple configurations, you might need to secure only a single machine. • Larger organizations will likely have to make accommodations for many servers. These servers may be geographically distributed and even arranged in complex clustered configurations.
  • 19. Network-Level Security • Some standard “best practices” for securing databases include limiting the networks and/or network addresses that have direct access to the computer. • For example, you might implement routing rules and packet filtering to ensure that only specific users on your internal network will even be able to communicate with a server.
  • 20. Data Encryption • Another method for ensuring the safety of database information is to use encryption. • Most modern databases support encrypted connections between the client and the server. • Although these protocols can sometimes add significant processing and data transfer overhead (especially for large result sets or very busy servers), the added security may be required in some situations.
  • 21.
  • 22.
  • 23. Operating System Security • Network configuration settings, file system permissions, authentication mechanisms, and operating system encryption features can all play a role in ensuring that databases remain secure. • For example, on Windows-based operating systems, only the NTFS file system offers any level of file system security (FAT and FAT32 partitions do not provide any file system security at all).
  • 24. • Managing Database Logins • For example, many relational database products that operate on Microsoft’s Windows operating system platform can utilize the security features of a domain-based security model. • Based on an individual’s user account and group membership, he or she can perform a seamless “pass-through authentication” that does not require rekeying a username or password.
  • 25. Understanding Database-Level Security • Databases are commonly used to host many different databases and applications, and users should have different types of permissions based on their job functions. • Once a user has been allowed to connect to a server (through the use of a server login), the user will be given only the permissions that are granted to that login. • This process of determining permissions is generally known as authorization. Let’s take a look at some standard types of database-level permissions.
  • 26. • The first type of database-level security is generally used to determine to which database(s) a user has access • Once a user has been granted permissions to access a database, further permissions must be assigned to determine which actions he or she can take within the database. Let’s look at those permissions next.