Pertemuan Ke 7 Agung BP. Pembahasan Integrity for databases: record integrity, data correctness, update integrity Security for databases: access control,

Slides:



Advertisements
Similar presentations
Relational Database and Data Modeling
Advertisements

Chapter 23 Database Security and Authorization Copyright © 2004 Pearson Education, Inc.
Relational Databases Chapter 4.
Database Management System
Information Security Principles & Applications
Chapter Information Systems Database Management.
Database Management: Getting Data Together Chapter 14.
1 Pertemuan 01 Pengantar tentang database Matakuliah: >/ > Tahun: > Versi: >
Security in Databases. 2 Srini & Nandita (CSE2500)DB Security Outline review of databases reliability & integrity protection of sensitive data protection.
1 Minggu 7, Pertemuan 13 Security Matakuliah: T0206-Sistem Basisdata Tahun: 2005 Versi: 1.0/0.0.
Security in Databases. 2 Outline review of databases reliability & integrity protection of sensitive data protection against inference multi-level security.
Chapter 4 Relational Databases Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 4-1.
Mgt 20600: IT Management & Applications Databases Tuesday April 4, 2006.
Last time Finish OTR Database Security Introduction to Databases
DBMS1 Database Management System (DBMS) Introductory Concepts Week-1.
Chapter 4 Relational Databases Copyright © 2012 Pearson Education 4-1.
SE571 Security in Computing
10/5/1999Database Management -- R. Larson Data Administration and Database Administration University of California, Berkeley School of Information Management.
Management Information Systems
PHASE 3: SYSTEMS DESIGN Chapter 7 Data Design.
IT 221: Introduction to Information Security Principles Lecture 11: Database Security For Educational Purposes Only Revised: November 13, 2002.
Chapter 4 Relational Databases Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 4-1.
Chapter 6 – Database Security  Integrity for databases: record integrity, data correctness, update integrity  Security for databases: access control,
PHP Programming with MySQL Slide 8-1 CHAPTER 8 Working with Databases and MySQL.
© Paradigm Publishing Inc. 9-1 Chapter 9 Database and Information Management.
Objectives Overview Define the term, database, and explain how a database interacts with data and information Define the term, data integrity, and describe.
CHAPTER 6 Users and Basic Security. Progression of Steps for Creating a Database Environment 1. Install Oracle database binaries (Chapter 1) 2. Create.
Chapter 2 CIS Sungchul Hong
Database Security And Audit. Databasics Data is stored in form of files Record : is a one related group of data (in a row) Schema : logical structure.
9 Copyright © 2005, Oracle. All rights reserved. Administering User Security.
Chapter 6 – Database Security  Integrity for databases: record integrity, data correctness, update integrity  Security for databases: access control,
1 Introduction to Database Systems. 2 Database and Database System / A database is a shared collection of logically related data designed to meet the.
Organizing Data and Information AD660 – Databases, Security, and Web Technologies Marcus Goncalves Spring 2013.
Chapter 7: Database Systems Succeeding with Technology: Second Edition.
© Paradigm Publishing Inc. 9-1 Chapter 9 Database and Information Management.
Computer Security: Principles and Practice
Databases Collections of data. Set of rules to organize data. Types ◦ Relational: use (rows) & columns to organize. ◦ Object oriented: complex data (audio,
The protection of the DB against intentional or unintentional threats using computer-based or non- computer-based controls. Database Security – Part 2.
7 Copyright © 2004, Oracle. All rights reserved. Administering Users.
Discovering Computers Fundamentals Fifth Edition Chapter 9 Database Management.
1.file. 2.database. 3.entity. 4.record. 5.attribute. When working with a database, a group of related fields comprises a(n)…
INFORMATION MANAGEMENT Unit 2 SO 4 Explain the advantages of using a database approach compared to using traditional file processing; Advantages including.
Lesson Overview 3.1 Components of the DBMS 3.1 Components of the DBMS 3.2 Components of The Database Application 3.2 Components of The Database Application.
CHAPTER 5 Database Security 1. Objectives  Explain briefly the concept of databases  Identify the security requirement of the databases  List and explain.
Database Security Outline.. Introduction Security requirement Reliability and Integrity Sensitive data Inference Multilevel databases Multilevel security.
Prepared By Prepared By : VINAY ALEXANDER ( विनय अलेक्सजेंड़र ) PGT(CS),KV JHAGRAKHAND.
Database Environment Chapter 2. Data Independence Sometimes the way data are physically organized depends on the requirements of the application. Result:
IT Auditing & Assurance, 2e, Hall & Singleton Chapter 3: Data Management Systems.
Programming Logic and Design Fourth Edition, Comprehensive Chapter 16 Using Relational Databases.
Database Security. Multi-user database systems like Oracle include security to control how the database is accessed and used for example security Mechanisms:
Database Management Systems (DBMS)
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
IST 318 Database Administration Lecture 9 Database Security.
Chapter 9 Database Security and Authorization Copyright © 2004 Pearson Education, Inc.
Database Security. Multi-user database systems like Oracle include security to control how the database is accessed and used for example security Mechanisms:
Network Security Philadelphia UniversitylAhmad Al-Ghoul Module 7 Module 7 Data Base Security  MModified by :Ahmad Al Ghoul  PPhiladelphia.
1 Management Information Systems M Agung Ali Fikri, SE. MM.
1 Section 1 - Introduction to SQL u SQL is an abbreviation for Structured Query Language. u It is generally pronounced “Sequel” u SQL is a unified language.
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner.
19 Copyright © 2008, Oracle. All rights reserved. Security.
DATABASE SECURITY.
Pertemuan Ke 7 Agung BP.
Chapter 4 Relational Databases
Chapter 3: Data Management Systems
Chapter 8 Working with Databases and MySQL
Chapter 8 Data Base Security
Chapter 9 Database and Information Management.
Geographic Information Systems
Security in Computing, Fifth Edition
Presentation transcript:

Pertemuan Ke 7 Agung BP

Pembahasan Integrity for databases: record integrity, data correctness, update integrity Security for databases: access control, inference, and aggregation Multilevel secure databases: partitioned, cryptographically sealed,filtd filtered Security in data mining applications

PUSTAKA Charles P. Pfleeger & Shari Lawrence Pfleeger, Security in Computing, 4 th Ed., Pearson Education, 2007 Chapter 6

Konsep Database Database adalah kumpulan data dan seperangkat aturan yang mengatur tentang data dengan menetapkan hubungan tertentu antara data. User/pengguna menggambarkannya data berupa logical format. Physical Format tidak selalu mendapatkan perhatian secara serius oleh pengguna/user.

Logical Format Database

Physical Format

DBA (Database Administrator) adalah seseorang yang memberikan aturan kepada pengguna untuk mengelola, mengatur dan memantau data di database. Contoh Sintak memberi Grant User di Oracle: create user alfredo identified by alfredos_secret; create user alfredo identified externally; create user alfredo identified globally as 'external_name';

Lanjt. create user alfredo identified by alfredos_secret default tablespace ts_users temporary tablespace ts_temp; Atau create user alfredo identified by passw0rd account lock; grant connect to alfredo; grant

grant system_privilege to username;system_privilege grant system_privilege_1, system_privileges_2,..,system_privileges_n to username;system_privilege_1 grant system_privilege_1 to username with admin option;system_privilege_1with admin option grant object_privilege to username;object_privilege grant object_privilege to username with grant option;object_privilege grant object_privilege to username with hierarchy option;object_privilege hierarchy option

The user interacts with the database through a program called a database manager or a database management system (DBMS), informally known as a front end

Komponen Record – contain one related group of data Each record contains fields or elements. The logical structure of a database is called a schema A particular user may have access to only part of the database, ini disebut dengan Subschema

The name of each column is called an attribute of the database A relation is a set of columns.

Users interact with database managers through commands to the DBMS that retrieve, modify, add, or delete fields and records of the database. Command is called query.

Other, more complex, selection criteria are possible, with logical operators such as and ( ∧ ) and or ( ∨ ), and comparisons such as less (<)

Advantage of Using Databases vs file

A database is a single collection of data, stored and maintained at one central location, to which many people may have access as needed. The users are unaware of the physical arrangements; the unified logical arrangement is all they see.

With a database we can....

Shared access – users use one common, centralized set of data Minimal redundancy. users do not have to collect and maintain their own sets of data Data consistency. change to a data value affects all users of the data value. Data integrity. data values are protected against accidental or malicious undesirable changes Controlled access. only authorized users are allowed to view or to modify data values

Security Requirements Physical database integrity. Logical database integrity. Element integrity. Auditability. Access control. User authentication. Availability.

Integrity of the Database Two situations can affect the integrity of a database: when the whole database is damaged or corrupt. when individual data items are unreadable.

Integrity of the database as a whole is the responsibility of : The DBMS The operating system The (human) computing system manager.

Proposals for Multilevel Security Separation ◦Partitioning ◦Encryption ◦Integrity Lock

Trusted Front End A user identifies himself or herself to the front end; the front end authenticates the user's identity. The user issues a query to the front end. The front end verifies the user's authorization to data The front end issues a query to the database manager

The database manager performs I/O access, interacting with low level access control to achieve access to actual data. The database manager returns the result of the query to the trusted front end. The front end analyzes the sensitivity levels of the data items in the result and selects those items consistent with the user's security level.

The front end transmits selected data to the untrusted front end formatting. The untrusted front end transmits formatted data to the user.

Summary of Database Security

Address three aspects of security for database management systems: Masalah keutuhan dan kerahasiaan database secara spesifik ◦Kerahasiaan tanggung jawab dari user. ◦Keutuhan seluruh database dan table tanggung jawab dari DBMS dan DBA.

Permasalahan Data di database. Permasalahan bisa terletak pada user dan tingkat sensitivitas data pada tiap-tiap database atau bahkan tiap-tiap table.