Chapter 19 Security Integrity Security Control –computer-based –non-computer-based PC security DBMS and Web security Risk Analysis Data protection and privacy laws
Integrity Definition –Consistent with constraints Types –Entity –Referential or existence –Domain –Enterprise
Security Threats –Theft & fraud –Loss of confidentiality –Loss of privacy –Loss of integrity –Loss of availability
Countermeasures Computer-based controls Non-computer-based controls
Computer-based Controls - 1 Authorization & authentication –Password –Account number –Relations, users & right (CRUD) table Subschema –Create views
Computer-based Controls - 2 Logs –Transaction logs –Violation logs (time, terminal, violation) Check points Backup (redundant array of independent disks - RAID) & recovery Audit
Computer-based Controls - 3 Encryption or cryptosystem –Encryption key –Encryption algorithm –Decryption key –Decryption algorithm –Symmetric encryption (Data Encryption Standard (DES) –Asymmetric encryption (RSA)
Example of Encryption - I Divide text into groups of 8 characters. Pad with blank at end as necessary Select an 8-characters key Rearrange text by interchanging adjacent characters Translate each character into an ordinal number with blank as 0, A as 1, B as 2… Add the ordinal number of the key to the results Divide the total by 27 and retain the remainder Translate the remainder back into a character to yield the cipher text
Example of Encryption - II Message: DATA COM Key: PROTOCOL A D A T C M O (adatc mo) (protocol) (sum) remainder Q V P M R C A SPACE
Example of Decryption - I Divide cipher text into groups of eight characters. Pad with blanks at end as necessary Translate each cipher text alphabetic character and the encryption key into an ordinal number For each group, subtract the ordinal number of the key value from the ordinal number of the cipher text Add 27 to any negative number Translate the number back to alphabetic equivalents Rearrange the text by interchanging adjacent characters
Example of Decryption - II Q V P M R C A SPACE (qvpmrca ) (protocol) (substract) plus A D A T C M O D A T A C O M
Non-Computer-based Controls Security policy Contingency plan –Person, phone no., procedures –Site (cold, warm, or hot) Personnel control –Reference –Termination –Training –Balance of duty Escrow & maintenance agreements Physical
PC Security Policy & procedure Physical Logical Virus
DBMS and Web Security Proxy server: performance & filtering Firewall: packet filter, application gateway, circuit level gateway, & proxy server Digital signatures & Certificate Authority (CA) Message digest algorithms and digital signature Kerberos: centralized security server (certificate server Secure Sockets Layer (SSL) for data & Secure HTTP for individual message Secure Electronic Transaction (SET) for credit card & Secure Transaction Technology (STT ) for bank payment
Risk Analysis Assets Threats and risks Countermeasures Cost/benefit analysis Testing
Data Protection & Privacy Law
Assignment Review chapters 5-6, 11-13, and 18 Read chapter 19 Exam 3 –Date: 12/9/04 Project –Normalization and Corrected EER diagram due date: 12/2/04 –SQL, corrected normalization, and EER diagram due date: 12/15/04 (MIS Department Office)