Chapter 6 – Database Security  Integrity for databases: record integrity, data correctness, update integrity  Security for databases: access control,

Slides:



Advertisements
Similar presentations
Data Modeling and Database Design Chapter 1: Database Systems: Architecture and Components.
Advertisements

PowerPoint Presentation by Charlie Cook Copyright © 2004 South-Western. All rights reserved. Chapter 3 Database Management Systems Database Management.
Introduction to Database Management  Department of Computer Science Northern Illinois University January 2001.
Information Security Principles & Applications
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 10 Managing a Database.
Database Management: Getting Data Together Chapter 14.
Security in Databases. 2 Srini & Nandita (CSE2500)DB Security Outline review of databases reliability & integrity protection of sensitive data protection.
Living in a Digital World Discovering Computers 2010.
Introduction to Databases Transparencies
Security in Databases. 2 Outline review of databases reliability & integrity protection of sensitive data protection against inference multi-level security.
Business Driven Technology Unit 2 Exploring Business Intelligence Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution.
Chapter 4 Relational Databases Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 4-1.
Mgt 20600: IT Management & Applications Databases Tuesday April 4, 2006.
Managing Data Resources. File Organization Terms and Concepts Bit: Smallest unit of data; binary digit (0,1) Byte: Group of bits that represents a single.
Chapter 4 Relational Databases Copyright © 2012 Pearson Education 4-1.
SE571 Security in Computing
Chapter 9 Database Management
IT 221: Introduction to Information Security Principles Lecture 11: Database Security For Educational Purposes Only Revised: November 13, 2002.
1 Intro to Info Tech Database Management Systems Copyright 2003 by Janson Industries This presentation can be viewed on line at:
CS370 Spring 2007 CS 370 Database Systems Lecture 2 Overview of Database Systems.
Copyright © 2003 by Prentice Hall Module 4 Database Management Systems 1.What is a database? Data hierarchy and data organization Field, record, file,
Discovering Computers Fundamentals, 2012 Edition Your Interactive Guide to the Digital World.
Chapter 6 – Database Security  Integrity for databases: record integrity, data correctness, update integrity  Security for databases: access control,
Copyright © 2003 by Prentice Hall Computers: Tools for an Information Age Chapter 13 Database Management Systems: Getting Data Together.
PHP Programming with MySQL Slide 8-1 CHAPTER 8 Working with Databases and MySQL.
Objectives Overview Define the term, database, and explain how a database interacts with data and information Define the term, data integrity, and describe.
Chapter 2 CIS Sungchul Hong
Week 9 - Wednesday.  What did we talk about last time?  Government evaluation standards  Database basics.
STORING ORGANIZATIONAL INFORMATION— DATABASES CIS 429—Chapter 7.
Database Security And Audit. Databasics Data is stored in form of files Record : is a one related group of data (in a row) Schema : logical structure.
Management Information Systems By Effy Oz & Andy Jones
Organizing Data and Information AD660 – Databases, Security, and Web Technologies Marcus Goncalves Spring 2013.
1 Welcome: To the second learning sequence “ Data Base (DB) and Data Base Management System (DBMS) “ Recap : In the previous learning sequence, we discussed.
Databases Collections of data. Set of rules to organize data. Types ◦ Relational: use (rows) & columns to organize. ◦ Object oriented: complex data (audio,
The protection of the DB against intentional or unintentional threats using computer-based or non- computer-based controls. Database Security – Part 2.
Chapter 1 : Introduction §Purpose of Database Systems §View of Data §Data Models §Data Definition Language §Data Manipulation Language §Transaction Management.
Discovering Computers Fundamentals Fifth Edition Chapter 9 Database Management.
Chapter 10 Database Management. Chapter 10 Objectives Discuss the functions common to most DBMSs Identify the qualities of valuable information Explain.
Professor Michael J. Losacco CIS 1110 – Using Computers Database Management Chapter 9.
Objectives Overview Define the term, database, and explain how a database interacts with data and information Describe the qualities of valuable information.
Lecture2: Database Environment Prepared by L. Nouf Almujally & Aisha AlArfaj 1 Ref. Chapter2 College of Computer and Information Sciences - Information.
©Silberschatz, Korth and Sudarshan1.1Database System Concepts Chapter 1: Introduction Purpose of Database Systems View of Data Data Models Data Definition.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
C6 Databases. 2 Traditional file environment Data Redundancy and Inconsistency: –Data redundancy: The presence of duplicate data in multiple data files.
Lecture2: Database Environment Prepared by L. Nouf Almujally 1 Ref. Chapter2 Lecture2.
Lecture # 3 & 4 Chapter # 2 Database System Concepts and Architecture Muhammad Emran Database Systems 1.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 7 Storing Organizational Information - Databases.
Chapter 1 Introduction to Databases. 1-2 Chapter Outline   Common uses of database systems   Meaning of basic terms   Database Applications  
CHAPTER 5 Database Security 1. Objectives  Explain briefly the concept of databases  Identify the security requirement of the databases  List and explain.
Database Security Outline.. Introduction Security requirement Reliability and Integrity Sensitive data Inference Multilevel databases Multilevel security.
Fanny Widadie, S.P, M.Agr 1 Database Management Systems.
Pertemuan Ke 7 Agung BP. Pembahasan Integrity for databases: record integrity, data correctness, update integrity Security for databases: access control,
IT Auditing & Assurance, 2e, Hall & Singleton Chapter 3: Data Management Systems.
Programming Logic and Design Fourth Edition, Comprehensive Chapter 16 Using Relational Databases.
Managing Data Resources. File Organization Terms and Concepts Bit: Smallest unit of data; binary digit (0,1) Byte: Group of bits that represents a single.
Foundations of Business Intelligence: Databases and Information Management.
1 Chapter 9 Database Management. Objectives Overview Define the term, database, and explain how a database interacts with data and information Describe.
Introduction to Databases
Introduction to Databases Dr. Osama AL Rababah. Objectives In this capture you will learn: Some common uses of database systems. The characteristics of.
1 Chapter 2 Database Environment Pearson Education © 2009.
Network Security Philadelphia UniversitylAhmad Al-Ghoul Module 7 Module 7 Data Base Security  MModified by :Ahmad Al Ghoul  PPhiladelphia.
1 Management Information Systems M Agung Ali Fikri, SE. MM.
Chapter 7 Database Security. SCSR 3413 Computer Security Protecting data is a primary concern to secure systems, user count on the DataBase Management.
Pertemuan Ke 7 Agung BP.
Chapter Ten Managing a Database.
Chapter 4 Relational Databases
Chapter 8 Data Base Security
Database Security Jagdish S. Gangolly School of Business
Database Dr. Roueida Mohammed.
Security in Computing, Fifth Edition
Presentation transcript:

Chapter 6 – Database Security  Integrity for databases: record integrity, data correctness, update integrity  Security for databases: access control, inference, and aggregation  Multilevel secure databases: partitioned, cryptographically sealed, filtered

Introduction to Databases  Database – collection of data and set of rules that organize the data by specifying certain relationships among the data  Database administrator (DBA)  Database management system (DBMS) – database manager, front- end

Introduction to Databases  Records – contain related group of data  Fields (elements) – elementary data items  Schema – logical structure of database  Subschema – view into database

Introduction to Databases  Relational Rows (relation); columns (attributes)Rows (relation); columns (attributes) DB2, Oracle, AccessDB2, Oracle, Access  Hierarchical IMSIMS  Object-oriented

Introduction to Databases  Queries SELECT NAME = ‘ADAMS’SELECT NAME = ‘ADAMS’ SELECT (ZIP = ‘43210’) ^ (NAME = ‘ADAMS’)SELECT (ZIP = ‘43210’) ^ (NAME = ‘ADAMS’)  Project SHOW FIRST WHERE (ZIP = ‘43210’) ^ (NAME = ‘ADAMS’)SHOW FIRST WHERE (ZIP = ‘43210’) ^ (NAME = ‘ADAMS’)  Join SHOW NAME, AIRPORT WHERESHOW NAME, AIRPORT WHERE NAME.ZIP = AIRPORT.ZIP

Advantages of Using Databases  Shared access  Minimal redundancy  Data consistency  Data integrity  Controlled access

Security Requirements  Physical database integrity  Logical database integrity  Element integrity  Auditability  Access control  User authentication  Availability

Integrity of the Database  Users must be able to trust the accuracy of the data values  Updates are performed by authorized individuals  Integrity is the responsibility of the DBMS, the OS, and the computing system manager  Must be able to reconstruct the database at the point of a failure

Element Integrity  Correctness or accuracy of elements  Field checks  Access control  Maintain a change log – list every change made to the database

Auditability & Access Control  Desirable to generate an audit record of all access to the database (reads/writes)  Pass-through problem – accessing a record or element without transferring the data received to the user (no reads/writes)  Databases separated logically by user access privileges

Other Security Requirements  User Authentication  Integrity  Confidentiality  Availability

Reliability and Integrity  Database integrity  Element integrity  Element accuracy  Some protection from OS File accessFile access Data integrity checksData integrity checks

Two-Phase Update  Failure of computing system in middle of modifying data  Intent Phase – gather resources needed for update; write commit flag to the database  Update Phase – make permanent changes

Redundancy / Internal Consistency  Error detection / Correction codes (parity bits, Hamming codes, CRCs)  Shadow fields  Log of user accesses and changes

Concurrency/Consistency  Access by two users sharing the same database must be constrained (lock)  Monitors –check entered values to ensure consistency with rest of DB  Range Comparisons  State Constraints – describes condition of database (unique employee #)  Transition Constraints – conditions before changes are applied to DB