1 Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.

Slides:



Advertisements
Similar presentations
Chapter 23 Database Security and Authorization Copyright © 2004 Pearson Education, Inc.
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Lecture 1: Overview modified from slides of Lawrie Brown.
Security and Integrity
Database Management System
6/2/2015B.Ramamurthy1 Security B.Ramamurthy. 6/2/2015B.Ramamurthy2 Computer Security Collection of tools designed to thwart hackers Became necessary with.
CSA 223 network and web security Chapter one
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 5 Database Application Security Models.
Evidor: The Evidence Collector Software using for: Software for lawyers, law firms, corporate law and IT security departments, licensed investigators,
1 Minggu 7, Pertemuan 13 Security Matakuliah: T0206-Sistem Basisdata Tahun: 2005 Versi: 1.0/0.0.
Chapter 8 Security Transparencies © Pearson Education Limited 1995, 2005.
Chapter 5 Database Application Security Models
Introduction (Pendahuluan)  Information Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 1 Introduction to Databases
Chapter 19 Security Transparencies. 2 Chapter 19 - Objectives Scope of database security. Why database security is a serious concern for an organization.
1 Kyung Hee University Prof. Choong Seon HONG Network Control.
ISOM MIS3150 Data and Info Mgmt Database Security Arijit Sengupta.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
PART THREE E-commerce in Action Norton University E-commerce in Action.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 3 Administration of Users.
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Security Security is a measure of the system’s ability to protect data and information from unauthorized access while still providing access to people.
Lecture 1: Overview modified from slides of Lawrie Brown.
Switch off your Mobiles Phones or Change Profile to Silent Mode.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Computer Security “Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware,
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Database Application Security Models Database Application Security Models 1.
SEC835 Practical aspects of security implementation Part 1.
The protection of the DB against intentional or unintentional threats using computer-based or non- computer-based controls. Database Security – Part 2.
D ATABASE A DMINISTRATION L ECTURE N O 3 Muhammad Abrar.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Section 3 Database Security. 3-2 CA306 Introduction Section Content 3.1 Security Overview 3.2 Security Controls 3.3 Views 3.4 Security in Oracle 3.5 Web.
Welcome to Introduction to Computer Security. Why Computer Security The past decade has seen an explosion in the concern for the security of information.
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
CSCI 3140 Module 6 – Database Security Theodore Chiasson Dalhousie University.
14.1/21 Part 5: protection and security Protection mechanisms control access to a system by limiting the types of file access permitted to users. In addition,
Database Security Tampere University of Technology, Introduction to Databases. Oleg Esin.
Controlling User Access Fresher Learning Program January, 2012.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Database Security. Multi-user database systems like Oracle include security to control how the database is accessed and used for example security Mechanisms:
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Chap1: Is there a Security Problem in Computing?.
MBA 664 Database Management Dave Salisbury ( )
Academic Year 2014 Spring Academic Year 2014 Spring.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Computer Security By Duncan Hall.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
CST 312 Pablo Breuer. measures to deter, prevent, detect, and correct security violations that involve the transmission of information.
Database Security. Introduction to Database Security Issues (1) Threats to databases Loss of integrity Loss of availability Loss of confidentiality To.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Database and Cloud Security
CS457 Introduction to Information Security Systems
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Database Security and Authorization
Security and Administration Transparencies
Secure Software Confidentiality Integrity Data Security Authentication
INTRODUCTION A Database system is basically a computer based record keeping system. The collection of data, usually referred to as the database, contains.
Presentation transcript:

1 Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department

2 Database Security

3 Security  Secrecy: Users should not be able to see things they are not supposed to.  Security: is keeping unauthorized entities from doing things you don’t want them to do.  A security policy: is a statement of what is and what is not allowed.  A security mechanism: is a method, tool, or procedure for enforcing a security policy.

4 Security types  Computer Security: Generic name for the collection of tools designed to protect data and to thwart hackers.  Network Security: Measures to protect data during their transmission.  Internet Security: Measures to protect data during their transmission over a collection of interconnected networks.

5 Database Security  Database Security is the protection of the data against accidental or intentional loss, destruction, or misuse.  Database system security is more than securing the database.  Secure database.  Secure DBMS.  Secure applications.  Secure operating system in relation to database system.  Secure web server in relation to database system.  Secure network environment in relation to database system.

6 Basic Component of data security Generally Security is:  Confidentiality.  Protection of data from unauthorized disclosure.  Who is authorized to use data?  Integrity.  Assurance that data received is as sent by an authorized entity.  Availability.  Can access data whenever. C I A S S = Secure

7 Confidentiality  Confidentiality: The property that information is not made available or disclosed to unauthorized individuals, entities.  Not the same as privacy.  Privacy: The right of an entity (normally a person), acting in its own behalf, to determine the degree to which it will interact with its environment, including the degree to which the entity is willing to share information about itself with others.  Privacy is a reason for confidentiality.

8 Integrity  Integrity: Users should not be able to modify things they are not supposed to.  Data integrity: The property that data has not been changed, destroyed, or lost in an unauthorized or accidental manner.  System integrity: The quality that a system has when it can perform its intended function in a unimpaired manner, free from deliberate unauthorized manipulation.

9 Availability  Availability: authorized users should be able to see and modify things they are allowed to.  The property of a system or a system resource being accessible and usable upon demand by an authorized system entity, according to performance specifications for the system. i.e., a system is available if it provides services according to the system design whenever users request them.  Note: Turning off a computer provides confidentiality and integrity, but hurts availability...

10 Goals of Security  Prevention  Prevent attackers from violating security policy.  Detection  Detect attackers’ violation of security policy.  Recovery  Stop attack, assess and repair damage.  Continue to function correctly even if attack succeeds.

11 Security For:  Vulnerability: An error or weakness in the design, implementation, or operation of a system.  Vulnerability = a weakness in a security system.  Attack: A means of exploit some vulnerability in a system.  Threat: An adversary that is motivated and capable of exploiting a vulnerability.  Threat = circumstances that have a potential to cause harm.

12 Security Problems  Information when stored, is subject to:  Copying (and distributing) by unauthorized person.  Modification by unauthorized person.  Information when sent over network, is subject to:  Eavesdropping by unauthorized person.  Modification by unauthorized person.  Organization’s network is subject to:  Access internal resource.  Denial of service attack.  Be used as springboard to attack other networks.

13 Security Attacks  Eavesdropping:  Messages get tapped on its way from source to destination.  Tampering:  Changing contents of messages, inserting erroneous messages, possibly replacing valid ones.  Replay:  Capture earlier (may be encrypted) messages and send it again.  Impostering (masquerading):  Impostering client to get access to service,  Impostering server to get information from client.

14 Examples of Attackers:  Scan your system for confidential documents.  Corrupt information on your system.  Use your system to store pirated software.  Cause your system to crash.  Use your credit card number stored in computer.  Block access to your system.  Install applications in your system.

15 Threats to data security can come from:  Accidental losses:  Attributable to Human error.  Software or hardware failure:  By using procedures on user authorization, uniform software installation procedures, hardware maintenance.  Theft and fraud.  Loss of privacy (personal data).  Loss of confidentiality (corporate data).  Loss of data integrity (invalid/corrupt data).  Loss of availability.

16 Security policy  Security policy = set of permissions.  A set of requirements and guidelines to ensure a desired level of security for the activities performed in the system.  Examples:  Messages can only be read by the intended recipient.  Files can only be written by respective owners.  Service should be free from replaying attacks.  The system is secure if and only if the security policy cannot be violated.

17 Security Categories 1. Physical Security. 2. Technological Security.  Application Security.  Operating System Security.  Network Security. 3. Policies & Procedures.  All Three Required for securing database and grantee data is protected.

18 1. Physical Security:  Limit access to physical space to prevent asset theft and unauthorized entry.  Protecting against information leakage and document theft. Examples:  Computing resources.  Storage (live and backups).  Communications and remote access.  Support (power and cooling).

19 2. Technological Security: 2.1 Application Security:  No flaws in identity verification process.  Configure server correctly (local files, database content) 2.2 Operating System & Network Security:  Applications use operating system for many functions.  Operating System code likely contains vulnerabilities.  Regularly download patches to eliminate.  Network Security: mitigate malicious traffic.  Tools: Firewalls & Intrusion Detection Systems.

20 3. Policies & Procedures:  Guard sensitive corporate information.  Employees need to be aware, be educated to be somewhat paranoid and vigilant. Example:  Personal attack:  Taking advantage of unsuspecting employees or person. (e.g. attacker gets employee to divulge his username & password)

21 Security Concepts  Seven Keys Security Concepts: 1.Authentication.  Ensure the user is who he/she claims to be. 2.Authorization.  Deal with who can access what and in what mode. 3.Confidentiality.  Protect content of data from being reviled to unauthorized party. 4.Data / Message Integrity  Ensure data has not been changed

22 5.Accountability  Ability to determine the attacker or principal. 6.Availability  Service/resource is accessible to legitimate use 7.Non-Repudiation  Message sender cannot deny later having sent it.

23 Authorization  Checking whether a user has permission to conduct some action.  Identity is the key for Authority.  Is a “subject” allowed to access an “object” (open a file)?  Access Control List: mechanism used by many operating systems to determine whether users are authorized to conduct different actions.

24 Access Control Model  An Access Control Model includes:  Subjects  Computers,Processes, The system.  Objects  Data, Programs.  Actions  The subjects can performed on the objects(select,Insert, delete,...)  Security Policy  Defines the authorization rules (permissions).

25 Security System Objects Subjects Access control

26 Access Control Lists (ACLs)  Set of three - tuples  (User, Resource, Privilege)  Specifies which users are allowed to access which resources with which privileges.  Privileges can be assigned based on roles (e.g. admin). UserResourcePrivilege Alice/office/Alice/*Read, write, execute Bob/home/Bob /*Read A Simple ACL

27 Security Models  Access Matrix Model:  Represents two main entities: objects and subjects  Columns represent objects  Rows represent subjects  Objects: tables, views, procedures, database objects  Subjects: users, roles, privileges, modules  Access levels: a subject has access to objects at its level and all levels below it.

28 Access matrix Security Models

29 Access Modes:  Static Modes  Dynamic modes

30

31 Roles  Named group of related privileges that are granted to users or other roles.  Used to group users.  Can reduce hundreds of thousands of security settings to hundreds of security settings.  If user is in multiple roles, will gain privileges of each role.

32 Privileges  Privileges allow users to perform specific actions in the database. There are two types of privileges: 1.Object Privileges: allow the user to have access to the data within an object or execute a stored program. 2.System Privileges: allow the user to logon to the system and create or manipulate objects.

33 Object Privileges  ALTER : Change the definition of a table.  SELECT : Query the data in a table or view.  DELETE : Delete records from a table or view.  INSERT : Add records to a table or view.  EXECUTE : Run stored procedures and functions.  INDEX : Create an index on a table.  READ : Allow the user to view from a directory.  UPDATE : Modify the data in a table or view.  REFERENCE : Create a reference to a table.

34 Account System Privileges  Each ACCOUNT can be allocated many SYSTEM PRIVILEGEs and many ROLEs  An ACCOUNT has all the PRIVILEGEs  A ROLE can have many SYSTEM PRIVILEGEs and it may also have a relationship to other ROLEs  ROLEs simplify the administration of the database.  A set of privileges can be assigned to or removed from a ROLE just once.

35 Oracle Security  Oracle security components:  An ACCOUNT is a user account  A PROFILE is a set of system resource that are assigned to an account.  A PRIVILEGE is the right to perform a task  A ROLE consists of groups of PRIVILEGEs and other ROLEs

36 SQL GRANT Command  The GRANT command gives permissions to users to access and change data.  GRANT privileges ON tablename TO { grantee... } [ WITH GRANT OPTION ] Possible privileges are:  SELECT: user can retrieve data.  UPDATE: user can modify existing data.  DELETE: user can remove data.  INSERT: user can insert new data.  REFERENCES: user can make references to the table.  GRANT: is used to grant privileges to users.

37 REVOKE command  The REVOKE command removes permissions from users to access and change data.  Removes privileges to access a table.  REVOKE {SELECT, INSERT, UPDATE, DELETE} ON tablename FROM username. Example  Remove privileges from Smith to insert or delete from emp  REVOKE INSERT, DELETE ON emp FROM smith

38 Application Security Models  Models:  Database role based.  Application role based.  Application function based.  Application role and function based.  Application table based.

39 Security Model Based on Database Roles Application authenticates application users:  Maintain all users in a table.  Each user is assigned a role.  roles have privileges assigned to them  A proxy user is needed to activate assigned roles;  all roles are assigned to the proxy user  Model and privileges are database dependent.

40 Security Model Based on Database Roles Schema User: Oracle user that owns all database objects. Application User: Oracle user that need access to those schema objects.

41 Security Model Based on Database Roles  Implementation in Oracle:  Create users  Add content to your tables  Add a row for an application user  Look for application user’s role  Activate the role for this specific session

42 Security Model Based on Application Roles  Application roles are mapped to real business roles.  Application authenticates users.  Each user is assigned to an application role.  Application roles are provided with application privileges (read and write)

43 Security Model Based on Application Roles

44 Security Model Based on Application Functions  Application authenticates users.  Application is divided into functions.  Considerations:  Isolates application security from database.  Passwords must be securely encrypted.  Must use a real database user.  Granular privileges require more effort during implementation.

45 Security Model Based on Application Functions

46 Security Model Based on Application Roles and Functions  Combination of models.  Application authenticates users.  Application is divided into functions:  Roles are assigned to functions.  Functions are assigned to users.  Highly flexible model.

47 Security Model Based on Application Roles and Functions

48 Security Model Based on Application Tables  Depends on the application to authenticate users.  Application provides privileges to the user based on tables; not on a role or a function.  User is assigned access privilege to each table owned by the application owner.

49 Security Model Based on Application Tables

50 Questions? ?