DATABASE ADMINISTRATION AND SECURITY

Slides:



Advertisements
Similar presentations
Database Administration
Advertisements

Chapter 23 Database Security and Authorization Copyright © 2004 Pearson Education, Inc.
Database Administration and Security Transparencies 1.
Database Management System
Database Systems Chapter 1
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 15 Database Administration and Security.
Security Dale-Marie Wilson, Ph.D.. Why Database Security? Data Valuable resource Must be strictly controlled and managed Corporate resource Have strategic.
1 Minggu 7, Pertemuan 13 Security Matakuliah: T0206-Sistem Basisdata Tahun: 2005 Versi: 1.0/0.0.
Database Administration
Manajemen Basis Data Pertemuan 1 Matakuliah: M0264/Manajemen Basis Data Tahun: 2008.
Chapter 9 Database Design
Chapter 8 Security Transparencies © Pearson Education Limited 1995, 2005.
Chapter 16 Security. 2 Chapter 16 - Objectives u The scope of database security. u Why database security is a serious concern for an organization. u The.
15 1 Chapter 15 Database Administration Database Systems: Design, Implementation, and Management, Seventh Edition, Rob and Coronel.
Concepts of Database Management Seventh Edition
Chapter 19 Security.
Chapter 19 Security Transparencies © Pearson Education Limited 1995, 2005.
Chapter 1 Introduction to Databases
CSC 351 FUNDAMENTALS OF DATABASE SYSTEMS
Database Administration Chapter 16. Need for Databases  Data is used by different people, in different departments, for different reasons  Interpretation.
DATABASE SECURITY By Oscar Suciadi CS 157B Prof. Sin-Min Lee.
Introduction to Databases and Database Languages
Chapter 19 Security Transparencies. 2 Chapter 19 - Objectives Scope of database security. Why database security is a serious concern for an organization.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Database Systems: Design, Implementation, and Management Ninth Edition
Chapter 1 Database Systems. Good decisions require good information derived from raw facts Data is managed most efficiently when stored in a database.
Database Systems: Design, Implementation, and Management Tenth Edition
II.I Selected Database Issues: 1 - SecuritySlide 1/24 II. Selected Database Issues Part 1: Security Lecture 1 Lecturer: Chris Clack 3C13/D6.
© Pearson Education Limited, Chapter 5 Database Administration and Security Transparencies.
D ATABASE A DMINISTRATION L ECTURE N O 4 Muhammad Abrar.
ISOM MIS3150 Data and Info Mgmt Database Security Arijit Sengupta.
Chapter 15 Database Administration and Security
DBS201: DBA/DBMS Lecture 13.
Concepts of Database Management Sixth Edition
15 1 Chapter 15 Database Administration Database Systems: Design, Implementation, and Management, Seventh Edition, Rob and Coronel.
AL-MAAREFA COLLEGE FOR SCIENCE AND TECHNOLOGY INFO 232: DATABASE SYSTEMS CHAPTER 1 DATABASE SYSTEMS (Cont’d) Instructor Ms. Arwa Binsaleh.
Switch off your Mobiles Phones or Change Profile to Silent Mode.
Chapter 1 In-lab Quiz Next week
© Pearson Education Limited, Chapter 16 Physical Database Design – Step 7 (Monitor and Tune the Operational System) Transparencies.
Security and Transaction Nhi Tran CS 157B - Dr. Lee Fall, 2003.
The protection of the DB against intentional or unintentional threats using computer-based or non- computer-based controls. Database Security – Part 2.
Database Administration
Database Systems: Design, Implementation, and Management Ninth Edition Chapter 15 Database Administration and Security.
D ATABASE A DMINISTRATION L ECTURE N O 3 Muhammad Abrar.
15 1 Chapter 15 Database Administration Database Systems: Design, Implementation, & Management, 6 th Edition, Rob & Coronel Learning Objectives.
CSCI 3140 Module 6 – Database Security Theodore Chiasson Dalhousie University.
11/4/2012ISC239 Isabelle Bichindaritz1 Database Security.
Database Security Tampere University of Technology, Introduction to Databases. Oleg Esin.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 15 Database Administration and Security.
CSC271 Database Systems Lecture # 31. Summary: Previous Lecture  Remaining steps/activities in  Physical database design methodology  Monitoring and.
Chapter 12 Database Administration and Security Database Principles: Fundamentals of Design, Implementation, and Management Tenth Edition.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 15 Database Administration and Security.
Week 7 Lecture Part 2 Introduction to Database Administration Samuel S. ConnSamuel S. Conn, Asst Professor.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 1 Database Systems.
1 Chapter 7 Data Protection Data Recovery As with almost all complex forms of computer hardware and software, there is always the possibility.
Database Administration Advanced Database Dr. AlaaEddin Almabhouh.
Database Security Threats. Database An essential corporate resource Data is a valuable resource Must be strictly controlled, managed and secured May have.
SYSTEMS IMPLEMENTATION TECHNIQUES TRANSACTION PROCESSING DATABASE RECOVERY DATABASE SECURITY CONCURRENCY CONTROL.
Database Architecture, Administration and Security.
Database Security and Authorization
Security and Administration Transparencies
Chapter 16 Database Administration and Security
By Oscar Suciadi CS 157B Prof. Sin-Min Lee
By Oscar Suciadi CS 157B Prof. Sin-Min Lee
Database Systems Chapter 1
Database Security &Threats
By Oscar Suciadi CS 157B Prof. Sin-Min Lee
Database Administration
Implementation of security elements in database
Presentation transcript:

DATABASE ADMINISTRATION AND SECURITY CHAPTER 8

CONTENTS Data as a corporate assets Roles of database administrator The roles of a database in an organizations Backup and recovery

Data as a Corporate Asset Data are accepted as a valuable asset requiring careful management Data are now well understood as a valuable resource to be translated into information If information is accurate and timely, its use is likely to enhance company’s competitive position and generate wealth

Fig 15.1 The Data-Information-Decision-Making Cycle Database Systems: Design, Implementation, & Management, 6th Edition, Rob & Coronel

The Need for and Role of Databases in an Organization Database’s predominant role is to support managerial decision making at all levels in the organization DBMS must provide tools that give each level of management a different view of the data and support required level of decision making Database Systems: Design, Implementation, & Management, 6th Edition, Rob & Coronel

Introduction of a Database: Special Considerations Having a computerized database management system does not guarantee that the data will be properly used to provide best solutions required by managers Database Systems: Design, Implementation, & Management, 6th Edition, Rob & Coronel

Introduction of a Database: Special Considerations (continued) Introduction of a DBMS is likely to have a profound impact, which might be positive or negative, depending on how it is administered Three important aspects Technological: DBMS software and hardware Managerial: Administrative functions Cultural: Corporate resistance to change Database Systems: Design, Implementation, & Management, 6th Edition, Rob & Coronel

The Evolution of the Database Administration Function Data administration has its roots in the old, decentralized world of the file system Advent of the DBMS and its shared view of data produced a new level of data management sophistication and led the DP department to evolve into an information systems (IS) department Data management became an increasingly complex job, thus leading to development of the database administration function Database Systems: Design, Implementation, & Management, 6th Edition, Rob & Coronel

The IS Department Internal Organization Database Systems: Design, Implementation, & Management, 6th Edition, Rob & Coronel

The Placement of the DBA Function Database Systems: Design, Implementation, & Management, 6th Edition, Rob & Coronel

A DBA Functional Organization Database Systems: Design, Implementation, & Management, 6th Edition, Rob & Coronel

Multiple Database Administrators in an Organization Database Systems: Design, Implementation, & Management, 6th Edition, Rob & Coronel

The Database Environment’s Human Component Even the most carefully crafted database system cannot operate without a human component Effective data administration requires both technical and managerial skills DA must set data administration goals DBA is the focal point for data/user interaction Need for diverse mix of skills Database Systems: Design, Implementation, & Management, 6th Edition, Rob & Coronel

Contrasting DA and DBA Activities and Characteristics Database Systems: Design, Implementation, & Management, 6th Edition, Rob & Coronel

A Summary of DBA Activities Database Systems: Design, Implementation, & Management, 6th Edition, Rob & Coronel

Desired DBA Skills Database Systems: Design, Implementation, & Management, 6th Edition, Rob & Coronel

DBA Activities and Services Database Systems: Design, Implementation, & Management, 6th Edition, Rob & Coronel

Database Security Data is a valuable resource that must be strictly controlled and managed, as with any corporate resource. Part or all of the corporate data may have strategic importance and therefore needs to be kept secure and confidential. © Pearson Education Limited 1995, 2005

Database Security Mechanisms that protect the database against intentional or accidental threats. Security considerations do not only apply to the data held in a database. Breaches of security may affect other parts of the system, which may in turn affect the database. © Pearson Education Limited 1995, 2005

Database Security Involves measures to avoid: Theft and fraud Loss of confidentiality (secrecy) Loss of privacy Loss of integrity Loss of availability © Pearson Education Limited 1995, 2005

Database Security Threat Any situation or event, whether intentional or unintentional, that will adversely affect a system and consequently an organization. © Pearson Education Limited 1995, 2005

Summary of Threats to Computer Systems © Pearson Education Limited 1995, 2005

Typical Multi-user Computer Environment © Pearson Education Limited 1995, 2005

Countermeasures – Computer-Based Controls Concerned with physical controls to administrative procedures and includes: Authorization Access controls Views Backup and recovery Integrity Encryption RAID technology © Pearson Education Limited 1995, 2005

Countermeasures – Computer-Based Controls Authorization The granting of a right or privilege, which enables a subject to legitimately have access to a system or a system’s object. Authorization is a mechanism that determines whether a user is, who he or she claims to be. © Pearson Education Limited 1995, 2005

Countermeasures – Computer-Based Controls Access control Based on the granting and revoking of privileges. A privilege allows a user to create or access (that is read, write, or modify) some database object (such as a relation, view, and index) or to run certain DBMS utilities. Privileges are granted to users to accomplish the tasks required for their jobs. © Pearson Education Limited 1995, 2005

Countermeasures – Computer-Based Controls Most DBMS provide an approach called Discretionary Access Control (DAC). SQL standard supports DAC through the GRANT and REVOKE commands. The GRANT command gives privileges to users, and the REVOKE command takes away privileges. © Pearson Education Limited 1995, 2005

Countermeasures – Computer-Based Controls DAC while effective has certain weaknesses. In particular an unauthorized user can trick an authorized user into disclosing sensitive data. An additional approach is required called Mandatory Access Control (MAC). © Pearson Education Limited 1995, 2005

Countermeasures – Computer-Based Controls DAC based on system-wide policies that cannot be changed by individual users. Each database object is assigned a security class and each user is assigned a clearance for a security class, and rules are imposed on reading and writing of database objects by users. © Pearson Education Limited 1995, 2005

Countermeasures – Computer-Based Controls DAC determines whether a user can read or write an object based on rules that involve the security level of the object and the clearance of the user. These rules ensure that sensitive data can never be ‘passed on’ to another user without the necessary clearance. The SQL standard does not include support for MAC. © Pearson Education Limited 1995, 2005

Popular Model for MAC called Bell-LaPudula Insert Figure 19.3(a) © Pearson Education Limited 1995, 2005

Popular Model for MAC called Bell-LaPudula © Pearson Education Limited 1995, 2005

Countermeasures – Computer-Based Controls View Is the dynamic result of one or more relational operations operating on the base relations to produce another relation. A view is a virtual relation that does not actually exist in the database, but is produced upon request by a particular user, at the time of request. © Pearson Education Limited 1995, 2005

Countermeasures – Computer-Based Controls Backup Process of periodically taking a copy of the database and log file (and possibly programs) to offline storage media. Journaling Process of keeping and maintaining a log file (or journal) of all changes made to database to enable effective recovery in event of failure. © Pearson Education Limited 1995, 2005

Countermeasures – Computer-Based Controls Integrity Prevents data from becoming invalid, and hence giving misleading or incorrect results. Encryption The encoding of the data by a special algorithm that renders the data unreadable by any program without the decryption key. © Pearson Education Limited 1995, 2005

RAID (Redundant Array of Independent Disks) Technology Hardware that the DBMS is running on must be fault-tolerant, meaning that the DBMS should continue to operate even if one of the hardware components fails. Suggests having redundant components that can be seamlessly integrated into the working system whenever there is one or more component failures. © Pearson Education Limited 1995, 2005

RAID (Redundant Array of Independent Disks) Technology The main hardware components that should be fault-tolerant include disk drives, disk controllers, CPU, power supplies, and cooling fans. Disk drives are the most vulnerable components with the shortest times between failure of any of the hardware components. © Pearson Education Limited 1995, 2005

RAID (Redundant Array of Independent Disks) Technology One solution is to provide a large disk array comprising an arrangement of several independent disks that are organized to improve reliability and at the same time increase performance. © Pearson Education Limited 1995, 2005

RAID (Redundant Array of Independent Disks) Technology Performance is increased through data striping: the data is segmented into equal-size partitions (the striping unit), which are transparently distributed across multiple disks. Reliability is improved through storing redundant information across the disks using a parity scheme or an error-correcting scheme. © Pearson Education Limited 1995, 2005

RAID (Redundant Array of Independent Disks) Technology There are a number of different disk configurations called RAID levels. RAID 0 Nonredundant RAID 1 Mirrored RAID 0+1 Nonredundant and Mirrored RAID 2 Memory-Style Error-Correcting Codes RAID 3 Bit-Interleaved Parity RAID 4 Block-Interleaved Parity RAID 5 Block-Interleaved Distributed Parity RAID 6 P+Q Redundancy © Pearson Education Limited 1995, 2005

RAID 0 and RAID 1 © Pearson Education Limited 1995, 2005

RAID 2 and RAID 3 © Pearson Education Limited 1995, 2005

RAID 4 and RAID 5 © Pearson Education Limited 1995, 2005