School of Computer & Communication of LNPU 辽宁石油化工大学计算机与通信工程学院 刘旸 1 数据库管理系统 Database Management Systems Chapter 9 Database Administration 第九章 数据库管理和安全.

Slides:



Advertisements
Similar presentations
1 Chapter 13 Securing an Access Application. 13 Chapter Objectives Learn about the elements of security Explore application-level security Use user-level.
Advertisements

Chapter 23 Database Security and Authorization Copyright © 2004 Pearson Education, Inc.
The Database Environment
Prentice Hall, Database Systems Week 1 Introduction By Zekrullah Popal.
Database Management System
Database Administration Chapter FOSTER School of Business Acctg. 420.
Monday, 08 June 2015Dr. Mohamed Osman1 What is Database Administration A high level function (technical Function) that is responsible for ► physical DB.
10/25/2001Database Management -- R. Larson Data Administration and Database Administration University of California, Berkeley School of Information Management.
Database Management: Getting Data Together Chapter 14.
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
Jerry Post McGraw-Hill/Irwin Copyright © 2005 by The McGraw-Hill Companies, Inc. All rights reserved. Database Management Systems Chapter 9 Database Administration.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
DBSYSTEMS 1 of 13 Chapter 10 DB System Administration (Part II) 1 Based on G. Post, DBMS: Designing & Building Business Applications University of Manitoba.
Chapter 8 Security Transparencies © Pearson Education Limited 1995, 2005.
IS 4420 Database Fundamentals Chapter 12: Data and Database Administration Leon Chen.
Chapter 10 DB System Administration Based on G. Post, DBMS: Designing & Building Business Applications University of Manitoba Asper School of Business.
Concepts of Database Management Seventh Edition
Database Features Lecture 2. Desirable features in an information system Integrity Referential integrity Data independence Controlled redundancy Security.
Chapter 19 Security.
Jerry Post Copyright © 2013 DATABASE Database Management Systems Chapter 10 Database Administration 1.
Chapter 1 Introduction to Databases
Chapter 1: The Database Environment
Database Management Systems (DBMS)
Database Administration Chapter 16. Need for Databases  Data is used by different people, in different departments, for different reasons  Interpretation.
10/5/1999Database Management -- R. Larson Data Administration and Database Administration University of California, Berkeley School of Information Management.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 3 Administration of Users.
Data and Database Administration CISB514 Advanced Database  At the end of this chapter, you should be able to:  Define terms related to data & dbase.
Chapter 1 Database Systems. Good decisions require good information derived from raw facts Data is managed most efficiently when stored in a database.
Data and Database Administration
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 3 Administration of Users.
Data Administration & Database Administration
Concepts of Database Management Sixth Edition
Module Title? DBMS Introduction to Database Management System.
The University of Akron Dept of Business Technology Computer Information Systems DBMS Functions 2440: 180 Database Concepts Instructor: Enoch E. Damson.
Concepts of Database Management, Fifth Edition Chapter 8: Database Administration.
Switch off your Mobiles Phones or Change Profile to Silent Mode.
Concepts of Database Management Eighth Edition
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Chapter 7: Database Systems Succeeding with Technology: Second Edition.
SEC835 Practical aspects of security implementation Part 1.
DATABASE 1 Data Administration  Data and information are valuable assets.  Data is used at many business levels  Operations and transactions.  Tactical.
The protection of the DB against intentional or unintentional threats using computer-based or non- computer-based controls. Database Security – Part 2.
Jerry Post Copyright © Database Management Systems Chapter 10 Database Administration.
I.Information Building & Retrieval Learning Objectives: the process of Information building the responsibilities and interaction of each data managing.
Discovering Computers Fundamentals Fifth Edition Chapter 9 Database Management.
Metadata, Security, and the DBA Chapter 8.1 V3.0 Napier University Dr Gordon Russell.
Database Design and Management CPTG /23/2015Chapter 12 of 38 Functions of a Database Store data Store data School: student records, class schedules,
8 8 Chapter 8 The University Lab: Conceptual Design Verification, Logical Design, and Implementation Database Systems: Design, Implementation, and Management.
Database Management System (DBMS) an Introduction DeSiaMore 1.
Information Security Training for People who Supervise Computer Users.
Chapter No 4 Query optimization and Data Integrity & Security.
INFO1408 Database Design Concepts Week 16: Introduction to Database Management Systems Continued.
IT Auditing & Assurance, 2e, Hall & Singleton Chapter 3: Data Management Systems.
Database Administration
Programming Logic and Design Fourth Edition, Comprehensive Chapter 16 Using Relational Databases.
Database Security. Multi-user database systems like Oracle include security to control how the database is accessed and used for example security Mechanisms:
MBA 664 Database Management Dave Salisbury ( )
University of Sunderland COM 220 Lecture Seven Slide 1 Database Users & Administration.
Academic Year 2014 Spring Academic Year 2014 Spring.
Database Administration Basics. Basic Concepts and Definitions  Data Facts that can be recorded and stored  Metadata Data that describes properties.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 1 Database Systems.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
ANS File Security Chapter # 29 ( Prepared by : Mazhar Javed ) 1 Data Security “Protection against loss, corruption of, or unauthorized access of data”
Review of IT General Controls
Managing Multi-User Databases
Database Security and Authorization
Controlling Computer-Based Information Systems, Part I
PLANNING A SECURE BASELINE INSTALLATION
The Database Environment
Presentation transcript:

School of Computer & Communication of LNPU 辽宁石油化工大学计算机与通信工程学院 刘旸 1 数据库管理系统 Database Management Systems Chapter 9 Database Administration 第九章 数据库管理和安全

DATABASE 辽宁石油化工大学计算机与通信工程学院 刘旸 2 Data Administration  Data and information are valuable assets.  There are many databases and applications in an organization.  Someone has to be responsible for organizing, controlling, and sharing data.  Data Administrator (DA)

DATABASE 辽宁石油化工大学计算机与通信工程学院 刘旸 3 Data Administrator (DA)  Provide centralized control over the data.  Data definition. Format Naming convention  Data integration.  Selection of DBMS.  Act as data and database advocate.  Application ideas.  Decision support.  Strategic uses.  Coordinate data integrity, security, privacy, and control.

DATABASE 辽宁石油化工大学计算机与通信工程学院 刘旸 4 Database Administrator (DBA)  Install and upgrade DBMS.  Create user accounts and monitor security.  In charge of backup and recovery of the database.  Monitor and tune the database performance.  Coordinate with DBMS vendor and plan for changes.  Maintain DBMS-specific information for developers.

DATABASE 辽宁石油化工大学计算机与通信工程学院 刘旸 5 Database Database Structure  The schema is a namespace often assigned to users so that table names do not have to be unique across the entire database.  The catalog is a container with the goal of making it easier to find schema, but is probably not supported by any DBMS yet. Catalog: (very rare) Schema Table Columns Data types Constraints Views Triggers Routines and Modules … Users and Permissions

DATABASE 辽宁石油化工大学计算机与通信工程学院 刘旸 6 Metadata  Data about data  Example: a system table that contains a list of user tables.  SQL standard uses the information_schema views that retrieve data from the definition_schema SELECT Table_Name, Table_Type FROM Information_Schema.Tables WHERE table_name LIKE ‘Emp%’ Information_Schema Examples (61 total views) Schemata Tables Domains Views Table_Privileges Referential_Constraints Check_Constraints Triggers Trigger_Table_Usage Parameters Routines

DATABASE 辽宁石油化工大学计算机与通信工程学院 刘旸 7 Database Administration  Planning  Determine hardware and software needs.  Design  Estimate space requirements, estimate performance.  Implementation  Install software, create databases, transfer data.  Operation  Monitor performance, backup and recovery.  Growth and Change  Monitor and forecast storage needs.  Security  Create user accounts, monitor changes.

DATABASE 辽宁石油化工大学计算机与通信工程学院 刘旸 8 Database Planning  Estimation  Data storage requirements  Time to develop  Cost to develop  Operations costs

DATABASE 辽宁石油化工大学计算机与通信工程学院 刘旸 9 Managing Database Design  Teamwork  Data standards  Data repository  Reusable objects  CASE tools  Networks / communication  Subdividing projects  Delivering in stages User needs / priorities Version upgrades  Normalization by user views Distribute individual sections Combine sections  Assign forms and reports

DATABASE 辽宁石油化工大学计算机与通信工程学院 刘旸 10 Database Implementation  Standards for application programming.  User interface.  Programming standards. Layout and techniques. Variable & object definition.  Test procedures.  Data access and ownership.  Loading databases.  Backup and recovery plans.  User and operator training.

DATABASE 辽宁石油化工大学计算机与通信工程学院 刘旸 11 Database Operation and Maintenance  Monitoring usage  Size and growth  Performance / delays  Security logs  User problems  Backup and recovery  User support  Help desk  Training classes

DATABASE 辽宁石油化工大学计算机与通信工程学院 刘旸 12 Database Growth and Change  Detect need for change  Size and speed  Structures / design Requests for additional data. Difficulties with queries.  Usage patterns  Forecasts  Delays in implementing changes  Time to recognize needs.  Time to get agreement and approval.  Time to install new hardware.  Time to create / modify software.

DATABASE 辽宁石油化工大学计算机与通信工程学院 刘旸 13 Backup and Recovery  Backups are crucial!  Offsite storage!  Scheduled backup.  Regular intervals.  Record time.  Track backups.  Journals / logs  Checkpoint  Rollback / Roll forward OrdIDOdateAmount /2/ … 1932/2/ … OrdIDOdateAmount /2/ … 1932/2/ … 1942/2/ OrdIDOdateAmount /2/ … 1932/2/ … 1942/2/ … 1952/2/ … Snapshot Changes Journal/Log

DATABASE 辽宁石油化工大学计算机与通信工程学院 刘旸 14 Database Security and Privacy  Physical security  Protecting hardware  Protecting software and data.  Logical security  Unauthorized disclosure  Unauthorized modification  Unauthorized withholding  Security Threats  Employees / Insiders Disgruntled employees “Terminated” employees Dial-up / home access  Programmers Time bombs Trap doors  Visitors  Consultants  Business partnerships Strategic sharing EDI  Hackers--Internet

DATABASE 辽宁石油化工大学计算机与通信工程学院 刘旸 15 Data Privacy Who owns data? Customer rights. International complications. Do not release data to others. Do not read data unnecessarily. Report all infractions and problems. Privacy tradeoffs Marketing needs Government requests Employee management

DATABASE 辽宁石油化工大学计算机与通信工程学院 刘旸 16 Physical Security  Hardware  Preventing problems Fire prevention Site considerations Building design  Hardware backup facilities Continuous backup (mirror sites) Hot sites Shell sites “Sister” agreements  Telecommunication systems  Personal computers  Data and software  Backups  Off-site backups  Personal computers Policies and procedures Network backup  Disaster planning  Write it down  Train all new employees  Test it once a year  Telecommunications  Allowable time between disaster and business survival limits.

DATABASE 辽宁石油化工大学计算机与通信工程学院 刘旸 17 Physical Security Provisions  Backup data.  Backup hardware.  Disaster planning and testing.  Prevention.  Location.  Fire monitoring and control.  Control physical access.

DATABASE 辽宁石油化工大学计算机与通信工程学院 刘旸 18 Managerial Controls  “Insiders”  Hiring  Termination  Monitoring  Job segmentation  Physical access limitations Locks Guards and video monitoring Badges and tracking  Consultants and Business alliances  Limited data access  Limited physical access  Paired with employees

DATABASE 辽宁石油化工大学计算机与通信工程学院 刘旸 19 Logical Security  Unauthorized disclosure.  Unauthorized modification.  Unauthorized withholding.  Disclosure example  Letting a competitor see the strategic marketing plans.  Modification example  Letting employees change their salary numbers.  Withholding example  Preventing a finance officer from retrieving data needed to get a bank loan.

DATABASE 辽宁石油化工大学计算机与通信工程学院 刘旸 20 User Identification  User identification  Accounts  Individual  Groups  Passwords  Do not use “real” words.  Do not use personal (or pet) names.  Include non-alphabetic characters.  Use at least 6 (8) characters.  Change it often.  Too many passwords!  Alternative identification  Finger / hand print readers  Voice  Retina (blood vessel) scans  DNA typing  Hardware passwords  The one-minute password.  Card matched to computer.  Best method for open networks / Internet.

DATABASE 辽宁石油化工大学计算机与通信工程学院 刘旸 21 Basic Security Ideas  Limit access to hardware  Physical locks.  Video monitoring.  Fire and environment monitors.  Employee logs / cards.  Dial-back modems  Monitor usage  Hardware logs.  Access from network nodes.  Software and data usage.  Background checks  Employees  Consultants phone company phone company Jones 1111 Smith 2222 Olsen 3333 Araha 4444  Dialback modem  User calls modem  Modem gets name, password  Modem hangs up phone  Modem calls back user  Machine gets final password

DATABASE 辽宁石油化工大学计算机与通信工程学院 刘旸 22 Access Controls  Operating system  Access to directories Read View / File scan Write Create Delete  Access to files Read Write Edit Delete  DBMS usually needs most of these  Assign by user or group.  DBMS access controls  Read Data  Update Data  Insert Data  Delete Data  Open / Run  Read Design  Modify Design  Administer  Owners and administrator  Need separate user identification / login to DBMS.

DATABASE 辽宁石油化工大学计算机与通信工程学院 刘旸 23 SQL Security Commands  GRANT privileges  REVOKE privileges  Privileges include  SELECT  DELETE  INSERT  UPDATE  Objects include  Table  Table columns (SQL 92+)  Query  Users include  Name/Group  PUBLIC GRANT INSERT ON Bicycle TO OrderClerks REVOKE DELETE ON Customer FROM Assemblers

DATABASE 辽宁石油化工大学计算机与通信工程学院 刘旸 24 WITH GRANT OPTION GRANT SELECT ON Bicycle TO MarketingChair WITH GRANT OPTION Enables the recipient to also grant the specified privilege to other users. It passes on part of your authority.

DATABASE 辽宁石油化工大学计算机与通信工程学院 刘旸 25 Roles ItemIDDescriptionPriceQOH 111Dog Food Cat Food Bird Food CustomerIDLastNameFirstNamePhone 1111WilsonPeta PollockJackson LockeJennifer4444 SalesIDSaleDateCustomerID May May May-1113 Assign permissions to the role. New hire: Add role to person Items: SELECT Customers: SELECT, UPDATE Sales: SELECT, UPDATE, INSERT Role: SalesClerk

DATABASE 辽宁石油化工大学计算机与通信工程学院 刘旸 26 Using Queries for Control  Permissions apply to entire table or query.  Use query to grant access to part of a table.  Example  Employee table  Give all employees read access to name and phone (phonebook).  Give managers read access to salary.  SQL  Grant  Revoke Employee(ID, Name, Phone, Salary) Query: Phonebook SELECT Name, Phone FROM Employee Security Grant Read access to Phonebook for group of Employees. Grant Read access to Employee for group of Managers. Revoke all access to Employee for everyone else (except Admin).

DATABASE 辽宁石油化工大学计算机与通信工程学院 刘旸 27 Separation of Duties SupplierIDName… 673Acme Supply 772Basic Tools 983Common X Supplier OrderIDSupplierID PurchaseOrder Referential integrity Clerk must use SupplierID from the Supplier table, and cannot add a new supplier. Purchasing manager can add new suppliers, but cannot add new orders.

DATABASE 辽宁石油化工大学计算机与通信工程学院 刘旸 28 Securing an Access Database Set up a secure workgroup  Create a new Admin user.  Enable security by setting a password  Remove the original Admin user.  Run the Security Wizard in the database to be secured.  Assign user and group access privileges in the new database. Encrypt the new database.  Save it as an MDE file.

DATABASE 辽宁石油化工大学计算机与通信工程学院 刘旸 29 Encryption  Protection for open transmissions  Networks  The Internet  Weak operating systems  Single key (AES)  Dual key  Protection  Authentication  Trap doors / escrow keys  U.S. export limits  64 bit key limit  Breakable by brute force Typical hardware:2 weeks Special hardware: minutes Plain text message Encrypted text Key: AES Encrypted text Plain text message AES Single key: e.g., AES

DATABASE 辽宁石油化工大学计算机与通信工程学院 刘旸 30 Dual Key Encryption  Using Bob’s private key ensures it came from him.  Using Alice’s public key means only she can read it. Alice Bob Public Keys Alice 29 Bob 17 Private Key 13 Private Key 37 Use Bob’s Public key Use Bob’s Private key Message Encrypt+T Encrypt+T+M Encrypt+M Use Alice’s Public key Use Alice’s Private key Transmission

DATABASE 辽宁石油化工大学计算机与通信工程学院 刘旸 31 Sally’s Pet Store: Security Management Sally/CEO Sales Staff Store manager Sales people Business Alliances Accountant Attorney Suppliers Customers Products Sales Purchases Receive products Animals Sales Purchases Animal Healthcare Employees Hiring/Release Hours Pay checks Accounts Payments Receipts Management Reports Users Operations

DATABASE 辽宁石油化工大学计算机与通信工程学院 刘旸 32 Sally’s Pet Store: Purchases *Basic Supplier data: ID, Name, Address, Phone, ZipCode, CityID R:Read W:Write A:Add