Database Administration and Security Transparencies 1.

Slides:



Advertisements
Similar presentations
Database Planning, Design, and Administration
Advertisements

Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Chapter 23 Database Security and Authorization Copyright © 2004 Pearson Education, Inc.
Auditing Computer-Based Information Systems
Security Dale-Marie Wilson, Ph.D.. Why Database Security? Data Valuable resource Must be strictly controlled and managed Corporate resource Have strategic.
1 Pertemuan 17 Seleksi DBMS Matakuliah: >/ > Tahun: > Versi: >
1 Minggu 7, Pertemuan 13 Security Matakuliah: T0206-Sistem Basisdata Tahun: 2005 Versi: 1.0/0.0.
Chapter 8 Security Transparencies © Pearson Education Limited 1995, 2005.
IS 4420 Database Fundamentals Chapter 12: Data and Database Administration Leon Chen.
Chapter 16 Security. 2 Chapter 16 - Objectives u The scope of database security. u Why database security is a serious concern for an organization. u The.
Lecture Nine Database Planning, Design, and Administration
Chapter 19 Security.
Chapter 19 Security Transparencies © Pearson Education Limited 1995, 2005.
Chapter 1 Introduction to Databases
Servers Redundant Array of Inexpensive Disks (RAID) –A group of hard disks is called a disk array FIGURE Server with redundant NICs.
Maintaining Windows Server 2008 File Services
DATABASE SECURITY By Oscar Suciadi CS 157B Prof. Sin-Min Lee.
Business Intelligence: Data and Text Management Instructor: Bajuna Salehe Web:
DATABASE ADMINISTRATION AND SECURITY
CSC271 Database Systems Lecture # 20.
Chapter 19 Security Transparencies. 2 Chapter 19 - Objectives Scope of database security. Why database security is a serious concern for an organization.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
II.I Selected Database Issues: 1 - SecuritySlide 1/24 II. Selected Database Issues Part 1: Security Lecture 1 Lecturer: Chris Clack 3C13/D6.
© Pearson Education Limited, Chapter 5 Database Administration and Security Transparencies.
D ATABASE A DMINISTRATION L ECTURE N O 4 Muhammad Abrar.
Data and Database Administration
© 2013 Pearson Education, Inc. Publishing as Prentice Hall 1 CHAPTER 11: DATA AND DATABASE ADMINISTRATION Modern Database Management 11 th Edition Jeffrey.
ISOM MIS3150 Data and Info Mgmt Database Security Arijit Sengupta.
Managing Multi-User Databases AIMS 3710 R. Nakatsu.
Database System Development Lifecycle © Pearson Education Limited 1995, 2005.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Guide to Linux Installation and Administration, 2e 1 Chapter 9 Preparing for Emergencies.
Security and Transaction Nhi Tran CS 157B - Dr. Lee Fall, 2003.
The protection of the DB against intentional or unintentional threats using computer-based or non- computer-based controls. Database Security – Part 2.
CS 3630 Database Design and Implementation Dr. Qi Yang 213 Ullrich My Home Page: The Class Page:
D ATABASE A DMINISTRATION L ECTURE N O 3 Muhammad Abrar.
Section 3 Database Security. 3-2 CA306 Introduction Section Content 3.1 Security Overview 3.2 Security Controls 3.3 Views 3.4 Security in Oracle 3.5 Web.
Lecture # 3 & 4 Chapter # 2 Database System Concepts and Architecture Muhammad Emran Database Systems 1.
Chapter 1 Introduction to Databases. 1-2 Chapter Outline   Common uses of database systems   Meaning of basic terms   Database Applications  
CSCI 3140 Module 6 – Database Security Theodore Chiasson Dalhousie University.
11/4/2012ISC239 Isabelle Bichindaritz1 Database Security.
Database Security Tampere University of Technology, Introduction to Databases. Oleg Esin.
Chapter 2 Securing Network Server and User Workstations.
CSC271 Database Systems Lecture # 31. Summary: Previous Lecture  Remaining steps/activities in  Physical database design methodology  Monitoring and.
MBA 664 Database Management Dave Salisbury ( )
TM 13-1 Copyright © 1999 Addison Wesley Longman, Inc. Data and Database Administration.
Install, configure and test ICT Networks
1 Chapter 7 Data Protection Data Recovery As with almost all complex forms of computer hardware and software, there is always the possibility.
Hands-On Microsoft Windows Server 2008 Chapter 7 Configuring and Managing Data Storage.
Web Database Security Session 12 & 13 Matakuliah: Web Database Tahun: 2008.
Chapter 9 Database Planning, Design, and Administration Transparencies © Pearson Education Limited 1995, 2005.
Database Security Threats. Database An essential corporate resource Data is a valuable resource Must be strictly controlled, managed and secured May have.
SYSTEMS IMPLEMENTATION TECHNIQUES TRANSACTION PROCESSING DATABASE RECOVERY DATABASE SECURITY CONCURRENCY CONTROL.
Copyright © 2016 Pearson Education, Inc. CHAPTER 12: DATA AND DATABASE ADMINISTRATION Modern Database Management 12 th Edition Jeff Hoffer, Ramesh Venkataraman,
TM 13-1 Copyright © 1999 Addison Wesley Longman, Inc. Data and Database Administration.
Chapter Name September 98 Security by Adrienne Watt.
Configuring File Services
Data and database administration
Security and Administration Transparencies
By Oscar Suciadi CS 157B Prof. Sin-Min Lee
GROUP MEMBERS:  USMAN AFZAL F  NAEEM SHAHZAD F  BASIT MUNIR F  H.M.TAYYAB MUSHTAQ F  AROOJA HAMID QURESHI F
By Oscar Suciadi CS 157B Prof. Sin-Min Lee
Introduction to Databases Transparencies
Database Security &Threats
DATABASE SECURITY For CSCL (BIM).
By Oscar Suciadi CS 157B Prof. Sin-Min Lee
Implementation of security elements in database
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

Database Administration and Security Transparencies 1

©Pearson Education 2009 Objectives The distinction between data administration and database administration. The purpose and tasks associated with data administration and database administration. The scope of database security. Why database security is a serious concern for an organization. The type of threats that can affect a database system. How to protect a computer system using computer- based controls. 2

©Pearson Education 2009 Data administration and database administration Data Administrator (DA) and Database Administrator (DBA) are responsible for managing and controlling activities associated with corporate data and corporate database, respectively. DA is more concerned with early stages of lifecycle and DBA is more concerned with later stages. 3

©Pearson Education 2009 Data administration Management and control of corporate data, including: database planning; development and maintenance of standards, policies, and procedures; conceptual and logical database design. 4

©Pearson Education 2009 Data administration tasks 5

©Pearson Education 2009 Database administration Management and control of physical realization of a database system, including: physical database design and implementation; setting security and integrity controls; monitoring system performance; reorganizing the database. 6

©Pearson Education 2009 Database administration tasks 7

©Pearson Education 2009 Comparison of data and database administration 8

©Pearson Education 2009 Database security 9 Mechanisms that protect the database against intentional or accidental threats. Not only apply to the data held in a database. Breaches of security may affect other parts of the system, which may in turn affect the database. Includes hardware, software, people, and data. Growing importance of security is the increasing amounts of crucial corporate data being stored on computer.

©Pearson Education 2009 Examples of threats and possible outcomes 10

©Pearson Education 2009 Summary of threats to computer systems 11

©Pearson Education 2009 Database security Threat is any situation or event, whether intentional or unintentional, that may adversely affect a system and consequently the organization. Outcomes to avoid: theft and fraud, loss of confidentiality (secrecy), loss of privacy, loss of integrity, loss of availability. 12

©Pearson Education 2009 Typical multi-user computer environment 13

©Pearson Education 2009 Database security Computer-based countermeasures include: authorization, views, backup and recovery, integrity, encryption, redundant array of independent disks (RAID). 14

©Pearson Education 2009 Countermeasures - computer-based controls Authorization The granting of a right or privilege that enables a subject to have legitimate access to a database system or a database system’s object. Authentication A mechanism that determines whether a user is, who he or she claims to be. failure. Privilege A right granted by one user to allow another user or group of users access to a database system or an object in the database system. 15

©Pearson Education 2009 Countermeasures - computer-based controls Views A view is a virtual table that does not necessarily exist in the database but can be produced upon request by a particular user, at the time of request. Backup and recovery Process of periodically taking a copy of the database and log file (and possibly programs) onto offline storage media. 16

©Pearson Education 2009 Countermeasures - computer-based controls Journaling Process of keeping and maintaining a log file (or journal) of all changes made to database to enable recovery to be undertaken effectively in the event of failure. Backup window The time period during which the database can be backed up. 17

©Pearson Education 2009 Countermeasures - computer-based controls Integrity Prevents data from becoming invalid, and hence giving misleading or incorrect results. Encryption Encoding the data by a special algorithm that renders the data unreadable by any program without the decryption key. 18

©Pearson Education 2009 Countermeasures - computer-based controls RAID A set or array of physical disk drives that appear to the database user (and programs) as if they form one large physical storage. Striping: Spreading data blocks across multiple disks Parity: Additional data used to re-create missing data Hardware that the DBMS runs on must be fault- tolerant, meaning that the DBMS should continue to operate even if one of the hardware components fails. RAID Levels Level 0: Striping only. No redundancy Level 1: Mirroring. Multiple copies of data Level 3: Single disk parity Level 5: Distributed Parity 19

©Pearson Education 2009 Network security architecture three tier database system architecture 20

©Pearson Education 2009 Countermeasures - network security Network security is the protect of servers from intruders. Firewall is a server or router with two or more network interfaces and special software that filters or selectively blocks messages traveling between networks. De-Militarized Zone (DMZ) is a special, restricted network that is established between two firewalls. 21