Pertemuan Ke 7 Agung BP.

Slides:



Advertisements
Similar presentations
Relational Database and Data Modeling
Advertisements

Chapter 23 Database Security and Authorization Copyright © 2004 Pearson Education, Inc.
Relational Databases Chapter 4.
Database Management System
Information Security Principles & Applications
Chapter Information Systems Database Management.
Database Management: Getting Data Together Chapter 14.
1 Pertemuan 01 Pengantar tentang database Matakuliah: >/ > Tahun: > Versi: >
Security in Databases. 2 Srini & Nandita (CSE2500)DB Security Outline review of databases reliability & integrity protection of sensitive data protection.
Security in Databases. 2 Outline review of databases reliability & integrity protection of sensitive data protection against inference multi-level security.
Chapter 4 Relational Databases Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 4-1.
Mgt 20600: IT Management & Applications Databases Tuesday April 4, 2006.
Chapter 4 Relational Databases Copyright © 2012 Pearson Education 4-1.
SE571 Security in Computing
Management Information Systems
PHASE 3: SYSTEMS DESIGN Chapter 7 Data Design.
IT 221: Introduction to Information Security Principles Lecture 11: Database Security For Educational Purposes Only Revised: November 13, 2002.
Chapter 6 – Database Security  Integrity for databases: record integrity, data correctness, update integrity  Security for databases: access control,
PHP Programming with MySQL Slide 8-1 CHAPTER 8 Working with Databases and MySQL.
© Paradigm Publishing Inc. 9-1 Chapter 9 Database and Information Management.
Objectives Overview Define the term, database, and explain how a database interacts with data and information Define the term, data integrity, and describe.
CHAPTER 6 Users and Basic Security. Progression of Steps for Creating a Database Environment 1. Install Oracle database binaries (Chapter 1) 2. Create.
Database Security And Audit. Databasics Data is stored in form of files Record : is a one related group of data (in a row) Schema : logical structure.
9 Copyright © 2005, Oracle. All rights reserved. Administering User Security.
Chapter 6 – Database Security  Integrity for databases: record integrity, data correctness, update integrity  Security for databases: access control,
Organizing Data and Information AD660 – Databases, Security, and Web Technologies Marcus Goncalves Spring 2013.
Chapter 7: Database Systems Succeeding with Technology: Second Edition.
© Paradigm Publishing Inc. 9-1 Chapter 9 Database and Information Management.
The protection of the DB against intentional or unintentional threats using computer-based or non- computer-based controls. Database Security – Part 2.
7 Copyright © 2004, Oracle. All rights reserved. Administering Users.
INFORMATION MANAGEMENT Unit 2 SO 4 Explain the advantages of using a database approach compared to using traditional file processing; Advantages including.
CHAPTER 5 Database Security 1. Objectives  Explain briefly the concept of databases  Identify the security requirement of the databases  List and explain.
Database Security Outline.. Introduction Security requirement Reliability and Integrity Sensitive data Inference Multilevel databases Multilevel security.
Prepared By Prepared By : VINAY ALEXANDER ( विनय अलेक्सजेंड़र ) PGT(CS),KV JHAGRAKHAND.
Pertemuan Ke 7 Agung BP. Pembahasan Integrity for databases: record integrity, data correctness, update integrity Security for databases: access control,
IT Auditing & Assurance, 2e, Hall & Singleton Chapter 3: Data Management Systems.
Programming Logic and Design Fourth Edition, Comprehensive Chapter 16 Using Relational Databases.
Database Security. Multi-user database systems like Oracle include security to control how the database is accessed and used for example security Mechanisms:
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
IST 318 Database Administration Lecture 9 Database Security.
Database Security. Multi-user database systems like Oracle include security to control how the database is accessed and used for example security Mechanisms:
Network Security Philadelphia UniversitylAhmad Al-Ghoul Module 7 Module 7 Data Base Security  MModified by :Ahmad Al Ghoul  PPhiladelphia.
1 Management Information Systems M Agung Ali Fikri, SE. MM.
15 Copyright © Oracle Corporation, All rights reserved. Managing Users.
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner.
Geographic Information Systems GIS Data Databases.
19 Copyright © 2008, Oracle. All rights reserved. Security.
DATABASE SECURITY.
James A. Senn’s Information Technology, 3rd Edition
Managing Privileges.
Database Security.
By Oscar Suciadi CS 157B Prof. Sin-Min Lee
Introduction To Database Systems
Chapter 12 Information Systems.
Information Systems Database Management
Chapter 4 Relational Databases
Database Database is a large collection of related data that can be stored, generally describes activities of an organization. An organised collection.
Database Security.
By Oscar Suciadi CS 157B Prof. Sin-Min Lee
Chapter 3: Data Management Systems
What is a Database and Why Use One?
Chapter 8 Working with Databases and MySQL
Chapter 8 Data Base Security
Chapter 9 Database and Information Management.
Database Security (Chapter 8, Sections 4-7)
Database Environment Transparencies
By Oscar Suciadi CS 157B Prof. Sin-Min Lee
Geographic Information Systems
Security in Computing, Fifth Edition
Presentation transcript:

Pertemuan Ke 7 Agung BP

Integrity for databases: record integrity, data correctness, update integrity Security for databases: access control, inference, and aggregation Multilevel secure databases: partitioned, cryptographically sealed,filtd filtered Security in data mining applications Pembahasan

Charles P. Pfleeger & Shari Lawrence Pfleeger, Security in Computing, 4th Ed., Pearson Education, 2007 Chapter 6 PUSTAKA

Database adalah kumpulan data dan seperangkat aturan yang mengatur tentang data dengan menetapkan hubungan tertentu antara data. User/pengguna menggambarkannya data berupa logical format. Physical Format tidak selalu mendapatkan perhatian secara serius oleh pengguna/user. Konsep Database

Logical Format Database

Physical Format

DBA (Database Administrator) adalah seseorang yang memberikan aturan kepada pengguna untuk mengelola, mengatur dan memantau data di database. Contoh Sintak memberi Grant User di Oracle: create user alfredo identified by alfredos_secret; create user alfredo identified externally; create user alfredo identified globally as 'external_name';

create user alfredo identified by alfredos_secret default tablespace ts_users temporary tablespace ts_temp; Atau create user alfredo identified by passw0rd account lock; grant connect to alfredo; Lanjt.

grant system_privilege to username; grant system_privilege_1, system_privileges_2, ..,system_privileges_n to username; grant system_privilege_1 to username with admin option; grant object_privilege to username; grant object_privilege to username with grant option; grant object_privilege to username with hierarchy option;

The user interacts with the database through a program called a database manager or a database management system (DBMS), informally known as a front end

Komponen Record – contain one related group of data Each record contains fields or elements. The logical structure of a database is called a schema A particular user may have access to only part of the database, ini disebut dengan Subschema Komponen

The name of each column is called an attribute of the database A relation is a set of columns.

Users interact with database managers through commands to the DBMS that retrieve, modify, add, or delete fields and records of the database. Command is called query.

Other, more complex, selection criteria are possible, with logical operators such as and (∧) and or (∨), and comparisons such as less (<)

Advantage of Using Databases vs file

A database is a single collection of data, stored and maintained at one central location, to which many people may have access as needed. The users are unaware of the physical arrangements; the unified logical arrangement is all they see.

With a database we can....

Shared access – users use one common, centralized set of data Minimal redundancy. users do not have to collect and maintain their own sets of data Data consistency. change to a data value affects all users of the data value. Data integrity. data values are protected against accidental or malicious undesirable changes Controlled access. only authorized users are allowed to view or to modify data values

Security Requirements Physical database integrity. Logical database integrity. Element integrity. Auditability. Access control. User authentication. Availability. Security Requirements

Integrity of the Database Two situations can affect the integrity of a database: when the whole database is damaged or corrupt. when individual data items are unreadable. Integrity of the Database

Integrity of the database as a whole is the responsibility of : The DBMS The operating system The (human) computing system manager.

Proposals for Multilevel Security Separation Partitioning Encryption Integrity Lock Proposals for Multilevel Security

A user identifies himself or herself to the front end; the front end authenticates the user's identity. The user issues a query to the front end. The front end verifies the user's authorization to data The front end issues a query to the database manager Trusted Front End

The database manager performs I/O access, interacting with low level access control to achieve access to actual data. The database manager returns the result of the query to the trusted front end. The front end analyzes the sensitivity levels of the data items in the result and selects those items consistent with the user's security level.

The front end transmits selected data to the untrusted front end formatting. The untrusted front end transmits formatted data to the user.

Summary of Database Securityy

Address three aspects of security for database management systems: Masalah keutuhan dan kerahasiaan database secara spesifik Kerahasiaan tanggung jawab dari user. Keutuhan seluruh database dan table tanggung jawab dari DBMS dan DBA.

Permasalahan Data di database. Permasalahan bisa terletak pada user dan tingkat sensitivitas data pada tiap-tiap database atau bahkan tiap-tiap table.