Database Security Jagdish S. Gangolly School of Business

Slides:



Advertisements
Similar presentations
Statistical database security Special purpose: used only for statistical computations. General purpose: used with normal queries (and updates) as well.
Advertisements

Information Security Principles & Applications
10/25/2001Database Management -- R. Larson Data Administration and Database Administration University of California, Berkeley School of Information Management.
Transaction Processing Lecture ACID 2 phase commit.
Database Integrity, Security and Recovery Database integrity Database integrity Database security Database security Database recovery Database recovery.
Security in Databases. 2 Srini & Nandita (CSE2500)DB Security Outline review of databases reliability & integrity protection of sensitive data protection.
Pertemuan 7-8 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
AUDITING INFORMATION TECHNOLOGY USING COMPUTER ASSISTED AUDIT TOOLS AND TECHNIQUES.
Chapter 8 Security Transparencies © Pearson Education Limited 1995, 2005.
Security in Databases. 2 Outline review of databases reliability & integrity protection of sensitive data protection against inference multi-level security.
Managing Information Systems Information Systems Security and Control Part 2 Dr. Stephania Loizidou Himona ACSC 345.
Functions of a Database Management System. Functions of a DBMS C.J. Date n Indexing n Views n Security n Integrity n Concurrency n Backup/Recovery n Design.
Last time Finish OTR Database Security Introduction to Databases
DBMS1 Database Management System (DBMS) Introductory Concepts Week-1.
Security Architecture Dr. Gabriel. Security Database security: –degree to which data is fully protected from tampering or unauthorized acts –Full understanding.
SE571 Security in Computing
10/5/1999Database Management -- R. Larson Data Administration and Database Administration University of California, Berkeley School of Information Management.
IT 221: Introduction to Information Security Principles Lecture 11: Database Security For Educational Purposes Only Revised: November 13, 2002.
Database Integrity and Security HAP 709 – Healthcare Databases George Mason University Janusz Wojtusiak, PhD Fall, 2010.
Chapter 6 – Database Security  Integrity for databases: record integrity, data correctness, update integrity  Security for databases: access control,
Week 9 - Wednesday.  What did we talk about last time?  Government evaluation standards  Database basics.
Database Security And Audit. Databasics Data is stored in form of files Record : is a one related group of data (in a row) Schema : logical structure.
Switch off your Mobiles Phones or Change Profile to Silent Mode.
Chapter 6 – Database Security  Integrity for databases: record integrity, data correctness, update integrity  Security for databases: access control,
Database Security DBMS Features Statistical Database Security.
Sensitive Data  Data that should not be made public  What if some but not all of the elements of a DB are sensitive Inherently sensitiveInherently sensitive.
Week 9 - Friday.  What did we talk about last time?  Database security requirements  Database reliability and integrity  Sensitive data.
Security Architecture
IT Service Delivery And Support Week Eleven – Auditing Application Control IT Auditing and Cyber Security Spring 2014 Instructor: Liang Yao (MBA MS CIA.
Introduction to: 1.  Goal[DEN83]:  Provide frequency, average, other statistics of persons  Challenge:  Preserving privacy[DEN83]  Interaction between.
Databases Collections of data. Set of rules to organize data. Types ◦ Relational: use (rows) & columns to organize. ◦ Object oriented: complex data (audio,
1 Copyright © 2004, Oracle. All rights reserved. Introduction.
Chapter 1 Introduction to Databases. 1-2 Chapter Outline   Common uses of database systems   Meaning of basic terms   Database Applications  
INFORMATION MANAGEMENT Unit 2 SO 4 Explain the advantages of using a database approach compared to using traditional file processing; Advantages including.
CHAPTER 5 Database Security 1. Objectives  Explain briefly the concept of databases  Identify the security requirement of the databases  List and explain.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Database Security Outline.. Introduction Security requirement Reliability and Integrity Sensitive data Inference Multilevel databases Multilevel security.
Pertemuan Ke 7 Agung BP. Pembahasan Integrity for databases: record integrity, data correctness, update integrity Security for databases: access control,
Database Security.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 21 November 2, 2004.
TM 13-1 Copyright © 1999 Addison Wesley Longman, Inc. Data and Database Administration.
Academic Year 2014 Spring Academic Year 2014 Spring.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
1 Intro stored procedures Declaring parameters Using in a sproc Intro to transactions Concurrency control & recovery States of transactions Desirable.
Network Security Philadelphia UniversitylAhmad Al-Ghoul Module 7 Module 7 Data Base Security  MModified by :Ahmad Al Ghoul  PPhiladelphia.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Feature Overview Oracle Explorer – browse and alter schema Wizards and Designers Automatic code generation PL/SQL Editor with IntelliSense Oracle Data.
Chapter 7 Database Security. SCSR 3413 Computer Security Protecting data is a primary concern to secure systems, user count on the DataBase Management.
Database Security Carl J. Hoppe 20 November 2013.
Functions of a Database Management System
Pertemuan Ke 7 Agung BP.
Overview of Unix Jagdish S. Gangolly School of Business
Overview of Networking & Operating System Security
Operating Systems Security
Chapter 3: Data Management Systems
LM 8 Data Administration & Database Administration
Chapter 8 Data Base Security
Database management concepts
Program Security Jagdish S. Gangolly School of Business
Cryptography II Jagdish S. Gangolly School of Business
Systems Design Chapter 6.
Advanced SQL: Views & Triggers
Database Security (Chapter 8, Sections 4-7)
Solving Two-Step Equations
Brute force attacks, DDOS, Botnet, Exploit, SQL injection
Threats in Networks Jagdish S. Gangolly School of Business
Security Modeling Jagdish S. Gangolly School of Business
Database management concepts
Security in Computing, Fifth Edition
Presentation transcript:

Database Security Jagdish S. Gangolly School of Business State University of New York at Albany NOTE: These notes are based on the book Security in Computing, by Charles & Shari Pfleeger, and are prepared solely for the students in the course Acc 661 at SUNY Albany. They are not to be used by others without the permission of the instructor. 12/6/2018 Acc 661 Auditing of Adv Acctg Info Systems

Acc 661 Auditing of Adv Acctg Info Systems Database Security Security requirements Physical database integrity Logical database integrity Element integrity Auditability Access control User authentication Availability 12/6/2018 Acc 661 Auditing of Adv Acctg Info Systems

Example of Oracle DBMS Architecture Source: http://www.wilsonmar.com/1oraarch.htm 12/6/2018 Acc 661 Auditing of Adv Acctg Info Systems

Database Integrity & Auditability Field Checks (Domain) Access control Maintenance of change log Granularity problem Pass-through problem Direct access of data vs. Inference problem 12/6/2018 Acc 661 Auditing of Adv Acctg Info Systems

Database reliability & Integrity Two-phase update: intent phase and commit phase Redundancy/internal consistency Error correction codes Shadow fields Backup and recovery procedures Concurrency/Consistency/Deadlock management Monitors and range comparisons State constraints (eg., commit flag) and Transition constraints (eg., referential integrity) 12/6/2018 Acc 661 Auditing of Adv Acctg Info Systems

Acc 661 Auditing of Adv Acctg Info Systems Inference Problem Direct vs. Indirect attacks Tracker attacks: count((SEX=F)  (RACE=C)  (DORM=Holmes)) = count(SEX=F) – count((SEX=F)  ((RACE  C) (DORM  Holmes))) Linear system vulnerability (inference by solving equations) 12/6/2018 Acc 661 Auditing of Adv Acctg Info Systems

Controls against Inference Attacks Controls applied against queries Controls applied against individual items in the database Suppression: sensitive data values are not provided (query is rejected) Concealment: answer provided is close, but not the actual value Limited response suppression: Low frequency elements are not displayed 12/6/2018 Acc 661 Auditing of Adv Acctg Info Systems

Approaches to the Inference Problem Suppress obviously sensitive information Track what the user knows Disguise data (random perturbation, rounding, …) 12/6/2018 Acc 661 Auditing of Adv Acctg Info Systems

Acc 661 Auditing of Adv Acctg Info Systems 12/6/2018 Acc 661 Auditing of Adv Acctg Info Systems