Security Architecture Dr. Gabriel. Security Database security: –degree to which data is fully protected from tampering or unauthorized acts –Full understanding.

Slides:



Advertisements
Similar presentations
Database Security Policies and Procedures and Implementation for the Disaster Management Communication System Presented By: Radostina Georgieva Master.
Advertisements

Data Modeling and Database Design Chapter 1: Database Systems: Architecture and Components.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Auditing Computer-Based Information Systems
Chapter 1 Security Architecture
Auditing Computer Systems
Security Controls – What Works
Data - Information - Knowledge
Monday, 08 June 2015Dr. Mohamed Osman1 What is Database Administration A high level function (technical Function) that is responsible for ► physical DB.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 5 Database Application Security Models.
Systems Analysis and Design in a Changing World, 6th Edition
1 Chapter 2 Database Environment Transparencies © Pearson Education Limited 1995, 2005.
Database Integrity, Security and Recovery Database integrity Database integrity Database security Database security Database recovery Database recovery.
Data Management I DBMS Relational Systems. Overview u Introduction u DBMS –components –types u Relational Model –characteristics –implementation u Physical.
Chapter 8 Security Transparencies © Pearson Education Limited 1995, 2005.
Security in Databases. 2 Outline review of databases reliability & integrity protection of sensitive data protection against inference multi-level security.
Managing Information Systems Information Systems Security and Control Part 2 Dr. Stephania Loizidou Himona ACSC 345.
Chapter 5 Database Application Security Models
Chapter 2 Database Environment Pearson Education © 2014.
Computer Security: Principles and Practice
Chapter 1 Introduction to Databases
Introduction to Databases Transparencies 1. ©Pearson Education 2009 Objectives Common uses of database systems. Meaning of the term database. Meaning.
Chapter 1 Database Systems. Good decisions require good information derived from raw facts Data is managed most efficiently when stored in a database.
SEC835 Database and Web application security Information Security Architecture.
Database System Concepts and Architecture Lecture # 3 22 June 2012 National University of Computer and Emerging Sciences.
Chapter 15 Database Administration and Security
CS370 Spring 2007 CS 370 Database Systems Lecture 2 Overview of Database Systems.
Cryptography and Network Security
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
CSC271 Database Systems Lecture # 4.
Database Technical Session By: Prof. Adarsh Patel.
Security Architecture
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
Mobile Banking By: Chenyu Gong, Jalal Hafidi, Harika Malineni.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Instructor: Dema Alorini Database Fundamentals IS 422 Section: 7|1.
Intro – Part 2 Introduction to Database Management: Ch 1 & 2.
Lecture # 3 & 4 Chapter # 2 Database System Concepts and Architecture Muhammad Emran Database Systems 1.
Chapter 1 Introduction to Databases. 1-2 Chapter Outline   Common uses of database systems   Meaning of basic terms   Database Applications  
Information Security What is Information Security?
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Bayu Adhi Tama, M.T.I 1 © Pearson Education Limited 1995, 2005.
Database Environment Session 2 Course Name: Database System Year : 2013.
INTRODUCTION TO DBS Database: a collection of data describing the activities of one or more related organizations DBMS: software designed to assist in.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Programming Logic and Design Fourth Edition, Comprehensive Chapter 16 Using Relational Databases.
Features Governmental organization Critically important ICT objects Distributed infrastructure Three levels of confidentiality Dozens of subsidiary organizations.
MBA 664 Database Management Dave Salisbury ( )
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 15 Database Administration and Security.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Introduction to Databases Dr. Osama AL Rababah. Objectives In this capture you will learn: Some common uses of database systems. The characteristics of.
Chapter 2 Database Environment.
1 Database Environment. 2 Objectives of Three-Level Architecture u All users should be able to access same data. u A user’s view is immune to changes.
Control and Security Frameworks Chapter Three Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 1 Database Systems.
INFORMATION SECURITY AND CONTROL. SECURITY: l Deter l Detect l Minimize l Investigate l Recover.
Database Security. Introduction to Database Security Issues (1) Threats to databases Loss of integrity Loss of availability Loss of confidentiality To.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Database Security Threats. Database An essential corporate resource Data is a valuable resource Must be strictly controlled, managed and secured May have.
Information Systems Security
Chapter 16 Database Administration and Security
Managing the IT Function
Chapter 2 Database Environment Pearson Education © 2009.
Systems Design Chapter 6.
Database Environment Transparencies
Chapter 2 Database Environment Pearson Education © 2014.
Presentation transcript:

Security Architecture Dr. Gabriel

Security Database security: –degree to which data is fully protected from tampering or unauthorized acts –Full understanding requires viewing it within information systems/information security environment

Information Systems Success of companies –By wise decisions of management Accurate and timely information Information integrity Information system: –comprised of components working together to produce and generate accurate information –Categorized based on usage

Information Systems (continued)

Information Systems Components

Information Systems (continued) Client/server architecture: –Based on the business model –Can be implemented as one-tier; two-tier; n-tier –Composed of three layers Tier: physical or logical platform Database management system (DBMS): collection of programs that manage database

Information Systems (continued)

Database Management Essential to success of information system DBMS functionalities: –Organize data –Store and retrieve data efficiently –Manipulate data (update and delete) –Enforce referential integrity and consistency –Enforce and implement data security policies and procedures –Back up, recover, and restore data

Database Management (continued) DBMS components include: –Data –Hardware –Software –Networks –Procedures –Database servers

Database Management (continued)

Information Security Information is one of an organization’s most valuable assets Information security: –consists of procedures and measures taken to protect information systems components –Based on C.I.A. triangle: confidentiality, integrity, availability Cannot achieve 100% security while leaving systems operational Security policies must be balanced according to the C.I.A. triangle

Information Security (continued)

Confidentiality Addresses two aspects of security: –Prevention of unauthorized access –Information disclosure based on classification Classify company information into levels: –Each level has its own security measures –Usually based on degree of confidentiality necessary to protect information

Confidentiality (continued)

Integrity Consistent and valid data, processed correctly, yields accurate information Information has integrity if: –It is accurate –It has not been tampered with Read consistency: each user sees only his changes and those committed by other users

Integrity (continued)

Availability A system must be always available to authorized users based on the system’s uptime requirements Systems determines what a user can do with the information b

Availability (continued) Reasons for a system to become unavailable: –External attacks and lack of system protection –System failure with no/poor disaster recovery strategy –Overly stringent and obscure security policies –Bad implementation of authentication processes

Information Security Architecture Protects data and information produced from the data Model for protecting logical and physical assets Is the overall design of a company’s implementation of C.I.A. triangle

Information Security Architecture (continued)

Components include: –Policies and procedures –Security personnel and administrators –Detection equipments –Security programs –Monitoring equipment –Monitoring applications –Auditing procedures and tools

Database Security Enforce security at all database levels Security access point: place where database security must be protected and applied Data requires highest level of protection; data access point must be small

Database Security (continued)

Reducing access point size reduces security risks Security gaps: points at which security is missing Vulnerabilities: kinks in the system that can become threats Threat: security risk that can become a system breach

Database Security (continued)

Database Security Levels Relational database: collection of related data files Data file: collection of related tables Table: collection of related rows (records) Row: collection of related columns (fields)

Database Security Levels (continued)

Menaces to Databases Security vulnerability: a weakness in any information system component

Menaces to Databases (continued)

Security threat: a security violation or attack that can happen any time because of a security vulnerability

Menaces to Databases (continued)

Security risk: a known security gap intentionally left open

Menaces to Databases (continued)

Factors for Rating Vulnerabilities, Threats, and Risks

Asset Types and Their Value Security measures are based on the value of each asset Types of assets include: –Physical –Logical –Intangible –Human

Security Methods

Security Methods (continued)

Database Security Methodology

DB security definition Collection of security policies and procedures, data constraints, security methods, and security tools blended together to implement all necessary measures to secure the integrity, accessibility, and confidentiality of every component of the database environment

Questions ?