Download Databases and data security

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Big data wikipedia , lookup

Clusterpoint wikipedia , lookup

Functional Database Model wikipedia , lookup

Database model wikipedia , lookup

Transcript
It’s your data – are you sure it’s safe?
Team Mag 5
Valerie Buitron
Jaime Calahorrano
Derek Chow
Julia Marsh
Mark Zogbaum
 Every
company needs places to store
institutional knowledge and data.
 Frequently
that data contains proprietary
information



Personally Identifiable Data
Employee HR Data
Financial Data
 The
security and confidentiality of this data
is of critical importance.
 There
are four key issues in the security of
databases just as with all security systems




Availability
Authenticity
Integrity
Confidentiality
 Data
needs to be available at all necessary
times
 Data needs to be available to only the
appropriate users
 Need to be able to track who has access to
and who has accessed what data
 Need
to ensure that the data has been edited
by an authorized source
 Need to confirm that users accessing the
system are who they say they are
 Need to verify that all report requests are
from authorized users
 Need to verify that any outbound data is
going to the expected receiver
 Need
to verify that any external data has the
correct formatting and other metadata
 Need to verify that all input data is accurate
and verifiable
 Need to ensure that data is following the
correct work flow rules for your
institution/corporation
 Need to be able to report on all data changes
and who authored them to ensure
compliance with corporate rules and privacy
laws.
 Need
to ensure that confidential data is only
available to correct people
 Need to ensure that entire database is
security from external and internal system
breaches
 Need to provide for reporting on who has
accessed what data and what they have done
with it
 Mission critical and Legal sensitive data must
be highly security at the potential risk of lost
business and litigation
 Although
the 4 pillars are of equal
importance we are focusing on
Confidentiality due to the prevalence of data
loss in financial and personal areas
 We are going to review solutions for




Internal data loss
External hacking
Securing data if hardware stolen
Unapproved Administrator Access
 Another
set of security issues come from
middleware that sits between the user and
the data
 Single sign on authentication

Allows users to just have one password to access
all systems but also means that the theft of one
password endangers all systems
 Most
companies have several types of
databases so to ensure total security across
databases they hire 3rd party Database
Security Vendors such as Guardium,Inc. and
Imperva, Inc.
 Those companies have solutions for Database
Activity Monitoring (DAM)
 Prices range from $20K to $1 Million
 Another option is data masking – buying a
fake data set for development and testing.
Solution Description
Pros
Cons
Data Obfuscation
(Masking, Scrambling)
Fake or Scrambled data
set for use by design
and implementation
teams
Can be very expensive –
good fake data can
range in cost from
$200,000 to $1 Million
Encryption of Data
Allows personally
identifiable data to be
scrambled if intrusion
takes place.
Adds overhead and
possible performance
issues.
Database
Intrusion/Extrusion
Prevention
Looks for SQL
Injections, Bad access
commands and odd
outbound data
Can eat into over head
and cause performance
issues – also expensive.
Needs very specific
criteria to set up.
Data Leak Prevention
Catches any data that is
being sent out of the
system
Does not protect data in
the actual data
warehouse.
 Vendors
such as Oracle, Microsoft and IBM
know that security is a big concern for data
systems.
 They create built in solutions such as:





Password Controls
Data access based on roles and profiles
IP restrictions for off site access
Auditing capabilities of who has run what reports
Security logging
Solution Description
Pros
Cons
Complex Passwords
(require numbers and
symbols) as well as
frequent password
changes
Makes passwords harder
to guess and harder to
crack
Users write them down
and keep them next to
computer or forget and
need multiple resets
Keep Internal and
External facing
databases separate
Makes it very hard to
hack one and then get
through to the other
Reduces functionality of
databases and restricts
flow of internal data
Restrict Downloading
Keeps data in the
database and not loose
in excel, etc
Restricts reporting
capabilities and off line
functionality
Restrict Unwanted
Connections
Again makes it harder
to worm from one
system to another
Makes integration more
difficult and can reduce
user acceptance
SAML (Security Assertion SAML is the standard
Markup Language)
that is used for Single
Sign On functionality
If not in use blocks the
usage of single sign on
 Will
we be able to keep the data secure
while keeping the users happy?
 Tune in Week 10 to find out!


Same Bat Time
Same Bat Channel