SlideShare a Scribd company logo
1 of 20
Database Security And
Authentication
Submitted To:
Dr. Mohammad Arifuzzaman
PRESENTED BY:-
• Md. Shakhawat Hossain
– 2012-2-55-067
• Jisan Ahmed Limon
– 2014-3-55-010
• Sudeb Das
– 2014-2-55-023
3
Database Security
• Database Security - protection from
malicious attempts to steal (view) or
modify data.
What is Security And Authentication
Security definition: Data security refers to
protective digital privacy measures that are
applied to prevent unauthorized access to
computers, databases and websites.
Authentication Definition: Authentication is
the process of recognizing a user's identity. It is
the mechanism of associating an incoming
request with a set of identifying credentials
4 Keys of Authentication
Data security is also known as information
security (IS) or computer security.
Introduction to User Authentication: A
basic security requirement is that you must
know your users. You must identify them
before you can determine their privileges
and access rights, and so that you can audit
their actions upon the data.
Passwords for Authentication
Passwords are one
of the basic forms of
authentication.
A user must provide
the correct
password when
establishing a
connection to
prevent
unauthorized use of
the database.
Strong Authentication
Strong authentication has important
advantages:
More choices of authentication mechanism
are available, such as smart cards,
Kerberos, or the operating system.
Many network authentication services, such
as Kerberos and DCE, support single sign-
on.
Proxy Authentication and Authorization
It enables the database administrator to regulate
which users are allowed to access the database
server through a given application.
It enables the administrator to audit actions of the
application acting on behalf of a given user.
DATA PRIVACY
The security of the location
where the database is stored
 Even if you know that the
contents of a database file
are safe, if the file is stored
in a location that is not fully
secure.
 Someone might introduce
unsafe content into the
database.
 You should be careful when
deciding to trust database
files that are stored in
locations that might not be
secure.
WHY NEED DATABASE SECURITY
Level of data security
 Human level
 Corrupt/careless user
 Network/user interface
 Database application program
 Database system
 operating system
 Physical level
14
Physical/OS Security
• Physical level
– Traditional lock-and-key security
– Protection from floods, fire, etc.
• E.g. WTC (9/11), fires in IITM, WWW conf website, etc.
– Protection from administrator error
• E.g. delete critical files
– Solution
• Remote backup for disaster recovery
• Plus archival backup (e.g. DVDs/tapes)
• Operating system level
– Protection from virus/worm attacks critic
Database and Application Security, Nov 2006
15
Security at the Database
• Authentication and
authorization
mechanisms to allow
specific users access
only to required data
• Authentication: who
are you? Prove it!
• Authorization: what
you are allowed to do
SECURITY Policies
Database security officer secures the
system and data
 Work with the database administrator.
Security policy
 Collection of standards, policies, procedures to guarantee security.
 Ensures auditing and compliance
 Security audit process identifies security vulnerabilities.
Security Pearls
Back up key files
Use encryption on sensitive data
Use good passwords
Network security requires expertise
 authentication
 encryption
 firewalls
18
User Authentication
• Password
– Most users abuse passwords. For e.g.
• Easy to guess password
• Share passwords with others
• Smartcards
– Need smartcard
– + a PIN or password
Bill Gates
Conclusion
 The goal of database security is to protect your critical
and confidential data from unauthorized access.
 Each organization should have a data security policy,
which is a set of high level guidelines determined by
 User requirements.
 Environmental aspects.
 Internal regulations
 Governmental law
Any Question???

More Related Content

What's hot

Database security
Database securityDatabase security
Database securityBirju Tank
 
Cost estimation for Query Optimization
Cost estimation for Query OptimizationCost estimation for Query Optimization
Cost estimation for Query OptimizationRavinder Kamboj
 
Distributed database management system
Distributed database management  systemDistributed database management  system
Distributed database management systemPooja Dixit
 
11. Storage and File Structure in DBMS
11. Storage and File Structure in DBMS11. Storage and File Structure in DBMS
11. Storage and File Structure in DBMSkoolkampus
 
database recovery techniques
database recovery techniques database recovery techniques
database recovery techniques Kalhan Liyanage
 
Database security
Database securityDatabase security
Database securityCAS
 
Multiversion Concurrency Control Techniques
Multiversion Concurrency Control TechniquesMultiversion Concurrency Control Techniques
Multiversion Concurrency Control TechniquesRaj vardhan
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementationajeet singh
 
Ddb 1.6-design issues
Ddb 1.6-design issuesDdb 1.6-design issues
Ddb 1.6-design issuesEsar Qasmi
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)Haris Ahmed
 
Distributed Database Management System
Distributed Database Management SystemDistributed Database Management System
Distributed Database Management SystemAAKANKSHA JAIN
 
Database Administration
Database AdministrationDatabase Administration
Database AdministrationBilal Arshad
 
Query optimization
Query optimizationQuery optimization
Query optimizationPooja Dixit
 
Query processing and optimization (updated)
Query processing and optimization (updated)Query processing and optimization (updated)
Query processing and optimization (updated)Ravinder Kamboj
 
Major issues in data mining
Major issues in data miningMajor issues in data mining
Major issues in data miningSlideshare
 

What's hot (20)

DDBMS Paper with Solution
DDBMS Paper with SolutionDDBMS Paper with Solution
DDBMS Paper with Solution
 
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
 
Database security
Database securityDatabase security
Database security
 
DBMS Bascis
DBMS BascisDBMS Bascis
DBMS Bascis
 
Cost estimation for Query Optimization
Cost estimation for Query OptimizationCost estimation for Query Optimization
Cost estimation for Query Optimization
 
Database security
Database securityDatabase security
Database security
 
Distributed database management system
Distributed database management  systemDistributed database management  system
Distributed database management system
 
11. Storage and File Structure in DBMS
11. Storage and File Structure in DBMS11. Storage and File Structure in DBMS
11. Storage and File Structure in DBMS
 
database recovery techniques
database recovery techniques database recovery techniques
database recovery techniques
 
Database security
Database securityDatabase security
Database security
 
Multiversion Concurrency Control Techniques
Multiversion Concurrency Control TechniquesMultiversion Concurrency Control Techniques
Multiversion Concurrency Control Techniques
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
Ddb 1.6-design issues
Ddb 1.6-design issuesDdb 1.6-design issues
Ddb 1.6-design issues
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 
Distributed Database Management System
Distributed Database Management SystemDistributed Database Management System
Distributed Database Management System
 
Database Administration
Database AdministrationDatabase Administration
Database Administration
 
Query optimization
Query optimizationQuery optimization
Query optimization
 
Query processing and optimization (updated)
Query processing and optimization (updated)Query processing and optimization (updated)
Query processing and optimization (updated)
 
Advanced DBMS presentation
Advanced DBMS presentationAdvanced DBMS presentation
Advanced DBMS presentation
 
Major issues in data mining
Major issues in data miningMajor issues in data mining
Major issues in data mining
 

Similar to Database Security And Authentication

Computer security concepts
Computer security conceptsComputer security concepts
Computer security conceptsG Prachi
 
Threats of E-Commerce in Database
Threats of E-Commerce in DatabaseThreats of E-Commerce in Database
Threats of E-Commerce in DatabaseMentalist Akram
 
MobileDBSecurity.pptx
MobileDBSecurity.pptxMobileDBSecurity.pptx
MobileDBSecurity.pptxmissionsk81
 
Database security in database management.pptx
Database security in database management.pptxDatabase security in database management.pptx
Database security in database management.pptxFarhanaMariyam1
 
Mis presentation by suraj vaidya
Mis presentation by suraj vaidyaMis presentation by suraj vaidya
Mis presentation by suraj vaidyaSuraj Vaidya
 
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...MongoDB
 
Lecture 01- What is Information Security.ppt
Lecture 01- What is Information Security.pptLecture 01- What is Information Security.ppt
Lecture 01- What is Information Security.pptshahadd2021
 
SECURITY AND CONTROL
SECURITY AND CONTROLSECURITY AND CONTROL
SECURITY AND CONTROLshinydey
 
Database Security Presentation Why database Security is important
Database Security Presentation Why database Security is importantDatabase Security Presentation Why database Security is important
Database Security Presentation Why database Security is importantKamruzzamansohel2
 
Information Security
Information SecurityInformation Security
Information Securitysonykhan3
 
Week-09-10-11-12 Fundamentals of Cybersecurity.pptx
Week-09-10-11-12 Fundamentals of Cybersecurity.pptxWeek-09-10-11-12 Fundamentals of Cybersecurity.pptx
Week-09-10-11-12 Fundamentals of Cybersecurity.pptxyasirkhokhar7
 
Presentation topic Software Security.pptx
Presentation topic Software Security.pptxPresentation topic Software Security.pptx
Presentation topic Software Security.pptxrehanmughal18
 

Similar to Database Security And Authentication (20)

security in is.pptx
security in is.pptxsecurity in is.pptx
security in is.pptx
 
Data security
Data securityData security
Data security
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Threats of E-Commerce in Database
Threats of E-Commerce in DatabaseThreats of E-Commerce in Database
Threats of E-Commerce in Database
 
System security
System securitySystem security
System security
 
MobileDBSecurity.pptx
MobileDBSecurity.pptxMobileDBSecurity.pptx
MobileDBSecurity.pptx
 
203135 Muhammad Usama.pptx
203135 Muhammad Usama.pptx203135 Muhammad Usama.pptx
203135 Muhammad Usama.pptx
 
ISM-CS5750-01.pptx
ISM-CS5750-01.pptxISM-CS5750-01.pptx
ISM-CS5750-01.pptx
 
Database security in database management.pptx
Database security in database management.pptxDatabase security in database management.pptx
Database security in database management.pptx
 
Mis presentation by suraj vaidya
Mis presentation by suraj vaidyaMis presentation by suraj vaidya
Mis presentation by suraj vaidya
 
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...
 
Lecture 01- What is Information Security.ppt
Lecture 01- What is Information Security.pptLecture 01- What is Information Security.ppt
Lecture 01- What is Information Security.ppt
 
SECURITY AND CONTROL
SECURITY AND CONTROLSECURITY AND CONTROL
SECURITY AND CONTROL
 
Database Security Presentation Why database Security is important
Database Security Presentation Why database Security is importantDatabase Security Presentation Why database Security is important
Database Security Presentation Why database Security is important
 
ISBB_Chapter6.pptx
ISBB_Chapter6.pptxISBB_Chapter6.pptx
ISBB_Chapter6.pptx
 
Information Security
Information SecurityInformation Security
Information Security
 
Dstca
DstcaDstca
Dstca
 
Week-09-10-11-12 Fundamentals of Cybersecurity.pptx
Week-09-10-11-12 Fundamentals of Cybersecurity.pptxWeek-09-10-11-12 Fundamentals of Cybersecurity.pptx
Week-09-10-11-12 Fundamentals of Cybersecurity.pptx
 
Database security
Database securityDatabase security
Database security
 
Presentation topic Software Security.pptx
Presentation topic Software Security.pptxPresentation topic Software Security.pptx
Presentation topic Software Security.pptx
 

More from Sudeb Das

radio-frequency identification (RFID)
radio-frequency identification (RFID)radio-frequency identification (RFID)
radio-frequency identification (RFID)Sudeb Das
 
Significant of the Language Movement Bangladesh
Significant of the Language Movement BangladeshSignificant of the Language Movement Bangladesh
Significant of the Language Movement BangladeshSudeb Das
 
Significant of the Language Movement Bangladesh
Significant of the Language Movement BangladeshSignificant of the Language Movement Bangladesh
Significant of the Language Movement BangladeshSudeb Das
 
home networking
home networkinghome networking
home networkingSudeb Das
 
Water level controller using plc
Water level controller using plcWater level controller using plc
Water level controller using plcSudeb Das
 
Analysis of-6-hat-thinking-for-problem-solving
Analysis of-6-hat-thinking-for-problem-solvingAnalysis of-6-hat-thinking-for-problem-solving
Analysis of-6-hat-thinking-for-problem-solvingSudeb Das
 
De Broglie hypothesis
De Broglie hypothesisDe Broglie hypothesis
De Broglie hypothesisSudeb Das
 

More from Sudeb Das (7)

radio-frequency identification (RFID)
radio-frequency identification (RFID)radio-frequency identification (RFID)
radio-frequency identification (RFID)
 
Significant of the Language Movement Bangladesh
Significant of the Language Movement BangladeshSignificant of the Language Movement Bangladesh
Significant of the Language Movement Bangladesh
 
Significant of the Language Movement Bangladesh
Significant of the Language Movement BangladeshSignificant of the Language Movement Bangladesh
Significant of the Language Movement Bangladesh
 
home networking
home networkinghome networking
home networking
 
Water level controller using plc
Water level controller using plcWater level controller using plc
Water level controller using plc
 
Analysis of-6-hat-thinking-for-problem-solving
Analysis of-6-hat-thinking-for-problem-solvingAnalysis of-6-hat-thinking-for-problem-solving
Analysis of-6-hat-thinking-for-problem-solving
 
De Broglie hypothesis
De Broglie hypothesisDe Broglie hypothesis
De Broglie hypothesis
 

Recently uploaded

Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixingviprabot1
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage examplePragyanshuParadkar1
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 

Recently uploaded (20)

Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixing
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 

Database Security And Authentication

  • 2. PRESENTED BY:- • Md. Shakhawat Hossain – 2012-2-55-067 • Jisan Ahmed Limon – 2014-3-55-010 • Sudeb Das – 2014-2-55-023
  • 3. 3 Database Security • Database Security - protection from malicious attempts to steal (view) or modify data.
  • 4. What is Security And Authentication Security definition: Data security refers to protective digital privacy measures that are applied to prevent unauthorized access to computers, databases and websites. Authentication Definition: Authentication is the process of recognizing a user's identity. It is the mechanism of associating an incoming request with a set of identifying credentials
  • 5. 4 Keys of Authentication Data security is also known as information security (IS) or computer security. Introduction to User Authentication: A basic security requirement is that you must know your users. You must identify them before you can determine their privileges and access rights, and so that you can audit their actions upon the data.
  • 6. Passwords for Authentication Passwords are one of the basic forms of authentication. A user must provide the correct password when establishing a connection to prevent unauthorized use of the database.
  • 7. Strong Authentication Strong authentication has important advantages: More choices of authentication mechanism are available, such as smart cards, Kerberos, or the operating system. Many network authentication services, such as Kerberos and DCE, support single sign- on.
  • 8. Proxy Authentication and Authorization It enables the database administrator to regulate which users are allowed to access the database server through a given application. It enables the administrator to audit actions of the application acting on behalf of a given user.
  • 10.
  • 11. The security of the location where the database is stored  Even if you know that the contents of a database file are safe, if the file is stored in a location that is not fully secure.  Someone might introduce unsafe content into the database.  You should be careful when deciding to trust database files that are stored in locations that might not be secure.
  • 12. WHY NEED DATABASE SECURITY
  • 13. Level of data security  Human level  Corrupt/careless user  Network/user interface  Database application program  Database system  operating system  Physical level
  • 14. 14 Physical/OS Security • Physical level – Traditional lock-and-key security – Protection from floods, fire, etc. • E.g. WTC (9/11), fires in IITM, WWW conf website, etc. – Protection from administrator error • E.g. delete critical files – Solution • Remote backup for disaster recovery • Plus archival backup (e.g. DVDs/tapes) • Operating system level – Protection from virus/worm attacks critic
  • 15. Database and Application Security, Nov 2006 15 Security at the Database • Authentication and authorization mechanisms to allow specific users access only to required data • Authentication: who are you? Prove it! • Authorization: what you are allowed to do
  • 16. SECURITY Policies Database security officer secures the system and data  Work with the database administrator. Security policy  Collection of standards, policies, procedures to guarantee security.  Ensures auditing and compliance  Security audit process identifies security vulnerabilities.
  • 17. Security Pearls Back up key files Use encryption on sensitive data Use good passwords Network security requires expertise  authentication  encryption  firewalls
  • 18. 18 User Authentication • Password – Most users abuse passwords. For e.g. • Easy to guess password • Share passwords with others • Smartcards – Need smartcard – + a PIN or password Bill Gates
  • 19. Conclusion  The goal of database security is to protect your critical and confidential data from unauthorized access.  Each organization should have a data security policy, which is a set of high level guidelines determined by  User requirements.  Environmental aspects.  Internal regulations  Governmental law