Download Database Security

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Data analysis wikipedia , lookup

Microsoft Access wikipedia , lookup

Data model wikipedia , lookup

Entity–attribute–value model wikipedia , lookup

Expense and cost recovery system (ECRS) wikipedia , lookup

Serializability wikipedia , lookup

Information privacy law wikipedia , lookup

Data vault modeling wikipedia , lookup

Computer security wikipedia , lookup

SAP IQ wikipedia , lookup

Open data in the United Kingdom wikipedia , lookup

Business intelligence wikipedia , lookup

Versant Object Database wikipedia , lookup

Relational model wikipedia , lookup

Database wikipedia , lookup

Concurrency control wikipedia , lookup

Database model wikipedia , lookup

Clusterpoint wikipedia , lookup

Transcript
Database Security Threats
• Database
• An essential corporate resource
• Data
•
•
•
•
is a valuable resource
Must be strictly controlled, managed and secured
May have strategic importance
Should be kept secure and confidential
Threat
• A threat may be caused by a situation or event involving a person,
action, or circumstance that is likely to bring harm to an organization.
The harm may be tangible, such as loss of HW, SW or data, or
intangible harm, such as loss of credibility or client confidence.
• Any threat must be viewed as a potential breach of security which, if
successful, will have a certain impact.
• We consider database security in relation to the following situations,
that broadly represent areas which the organization should seek to
reduce risk.
Threat
• Theft and fraud
• Effect the database environment and also the organization
• Loss of confidentiality
• Compromises the secrecy of critical organizational data
• Loss of privacy
• Lead to legal action being taken against the organization
• Loss of integrity
• Results in invalid or corrupt data, which may seriously affect the operation of an
organization
• Loss of availability
• The data, system, or both cannot be accessed, which can seriously affect an
organizations financial performance.
Threat
• The extent that an organization suffers as a result of a threat’s
succeeding depends upon a number of factors, such as:
• The existence of countermeasures
• Contingency plans.
• For example
• When the last backups were taken
• The time needed to restore the system
Countermeasures
• Computer based security controls
• The security of a DBMS is only as good as that of the operating system.
• Authorization
• Authentication, Privileges
• Ownership and privileges
• Each prilege has a binary value associated with it for example
SELECT
UPDATE
0001
0010
• Access Control Matrix
INSERT
DELETE
ALL
0100
1000
1111
User/attr.
property
type
price
ownerNo
staffNo
Branch
Row limit
Sales
SG37
SG5
0001
0101
1111
0001
0101
1111
0001
0111
1111
0000
0101
1111
0000
0111
1111
0000
0000
1111
15
200
none
Countermeasures
• Views
• Backup and recovery
• A DBMS should provide backup facilities to assist with the recovery of a
database following failure. The backup copy and the details captured in the
log file are used to restore the database to the latest possible consistent
state.
• Journaling
• Integrity
• Preventing data from becoming invalid
• Encryption
Countermeasures
• RAID technology
• Provides fault-tolerance
• Disk drives are the most vulnerable components
• Solution?
• Use RAID
• Data striping
• Increases performance by segmenting data into equal-size partitions, which are
transparently distributed across multiple disks.
• Improves overall I/O performance by allowing multiple I/Os to be serviced in parallel.
• Provides Reliability
• Parity scheme
• error-correcting scheme
Countermeasures
• RAID levels
• RAID 0
• Nonredundant
• RAID 1
• Mirrored
• RAID 0+1
• Nonredundant and Mirrored
• RAID 5
• Uses parity data for redundancy
DBMS Functions and Services
• Authorization:
• DBMS must ensure that only authorized users can access the database
• Secure the database against unauthorized access (intentional or accidental)
• Database security:
• The mechanisms that protect the database against intentional or accidental
threats
• Security considerations apply not only to the data, considerations apply to
other parts as well, which may in turn affect the database. E.g.
• Hardware
• Software
• People
DBMS Function and Services
Three closely related functions of the DBMS that ensure reliability and
consistency.
The reliability and consistency must be maintained in the presence of failure
of both hardware and software components and when multiple users are
accessing the database.
• Transaction support
• A logical unit of work on the database
• Concurrency control services
• Controls simultaneous operations on the database
• Recovery services
• The process of restoring the database to a correct state