Database Security Tampere University of Technology, 2003. 8102300 Introduction to Databases. Oleg Esin.

Slides:



Advertisements
Similar presentations
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Advertisements

II.I Selected Database Issues: 1 - SecuritySlide 1/20 II. Selected Database Issues Part 1: Security Lecture 2 Lecturer: Chris Clack 3C13/D6.
II.I Selected Database Issues: 1 - SecuritySlide 1/23 II. Selected Database Issues Part 1: Security Lecture 3 Lecturer: Chris Clack 3C13/D6.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
Database Administration and Security Transparencies 1.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Principles of Information Security, 2nd edition1 Cryptography.
Security Dale-Marie Wilson, Ph.D.. Why Database Security? Data Valuable resource Must be strictly controlled and managed Corporate resource Have strategic.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
1 Minggu 7, Pertemuan 13 Security Matakuliah: T0206-Sistem Basisdata Tahun: 2005 Versi: 1.0/0.0.
Chapter Extension 23 SSL/TLS and //https © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Chapter 8 Security Transparencies © Pearson Education Limited 1995, 2005.
Chapter 16 Security. 2 Chapter 16 - Objectives u The scope of database security. u Why database security is a serious concern for an organization. u The.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Chapter 19 Security.
Chapter 19 Security Transparencies © Pearson Education Limited 1995, 2005.
 2001 Prentice Hall, Inc. All rights reserved. Chapter 7 – Computer and Network Security Outline 7.1Introduction 7.2Ancient Ciphers to Modern Cryptosystems.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
DATABASE SECURITY By Oscar Suciadi CS 157B Prof. Sin-Min Lee.
DATABASE ADMINISTRATION AND SECURITY
Chapter 19 Security Transparencies. 2 Chapter 19 - Objectives Scope of database security. Why database security is a serious concern for an organization.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Chapter 19 Security Integrity Security Control –computer-based –non-computer-based PC security DBMS and Web security Risk Analysis Data protection and.
II.I Selected Database Issues: 1 - SecuritySlide 1/24 II. Selected Database Issues Part 1: Security Lecture 1 Lecturer: Chris Clack 3C13/D6.
© Pearson Education Limited, Chapter 5 Database Administration and Security Transparencies.
D ATABASE A DMINISTRATION L ECTURE N O 4 Muhammad Abrar.
Security CPSC 356 Database Ellen Walker Hiram College (Includes figures from Database Systems by Connolly & Begg, © Addison Wesley 2002)
ISOM MIS3150 Data and Info Mgmt Database Security Arijit Sengupta.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Database  A database is an organized collection of data for one or more purposes, usually in digital form. The data are typically organized to model.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Chapter 13 – Network Security
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security and Transaction Nhi Tran CS 157B - Dr. Lee Fall, 2003.
Types of Electronic Infection
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Section 3 Database Security. 3-2 CA306 Introduction Section Content 3.1 Security Overview 3.2 Security Controls 3.3 Views 3.4 Security in Oracle 3.5 Web.
ACM 511 Introduction to Computer Networks. Computer Networks.
CSCI 3140 Module 6 – Database Security Theodore Chiasson Dalhousie University.
11/4/2012ISC239 Isabelle Bichindaritz1 Database Security.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Network Security & Accounting
CSC271 Database Systems Lecture # 31. Summary: Previous Lecture  Remaining steps/activities in  Physical database design methodology  Monitoring and.
Chap1: Is there a Security Problem in Computing?.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
Distributed Systems Ryan Chris Van Kevin. Kinds of Systems Distributed Operating System –Offers Transparent View of Network –Controls multiprocessors.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
1 Chapter 7 Data Protection Data Recovery As with almost all complex forms of computer hardware and software, there is always the possibility.
DATA SECURITY. Security considerations apply not only to the data held in the database Breaches of security may affect other parts of the system which.
Web Database Security Session 12 & 13 Matakuliah: Web Database Tahun: 2008.
Database Security Threats. Database An essential corporate resource Data is a valuable resource Must be strictly controlled, managed and secured May have.
Chapter 40 Internet Security.
Chapter Name September 98 Security by Adrienne Watt.
Security and Administration Transparencies
By Oscar Suciadi CS 157B Prof. Sin-Min Lee
By Oscar Suciadi CS 157B Prof. Sin-Min Lee
برنامج أمن أنظمة الحاسب
Database Security &Threats
By Oscar Suciadi CS 157B Prof. Sin-Min Lee
Implementation of security elements in database
Electronic Payment Security Technologies
Presentation transcript:

Database Security Tampere University of Technology, Introduction to Databases. Oleg Esin.

What is database security? Database security – The mechanisms that protect the database against intentional or accidental threats. Major areas of loss:  theft and fraud  loss of confidentiality  loss of privacy  loss of integrity  loss of availability

Threats Treat – Any situation or event, whether intentional or accidental, that may adversely affect a system and consequently the organization.  Using another person’s means of access  Illegal entry by hacker  Creating “trapdoor” into system  Theft of data, programs, and equipment  Staff shortages or strikes  Inadequate staff training  Viewing and disclosing unauthorized data  Data corruption owning to power loss or surge  Physical damage to equipment  Introduction of viruses

Potential threats to computer system  DBMS and Application Software - Failure of security mechanisms giving greater access; Program alteration; Theft of programs.  Communication networks - Wire tapping; Breaking of cables; Electronic interference and radiation.  Data/Database Administrator - Inadequate security policies and procedures. zHardware - fire/flood/bombs; Data corruption due to power loss; Theft of equipment;  Database - Unauthorized amendment or copying of data; Theft of data; Data corruption due to power loss.  Users - Using another person’s means of access; Viewing and disclosing unauthorized data; Inadequate Staff training; Introduction of viruses.  Programmers/Operators - Creating trapdoors; Program alteration; Inadequate security policies; Staff shortage or strikes.

Countermeasures – Computer-Based Controls  Authorization and Authentication  Views  Backup and Recovery  Integrity  Encryption  RAID technology

Authorization and Authentication  Authorization – The granting of a right or privilege that enables a subject to have legitimate access to a system or a system’s objects.  Authentication – A mechanism that determines whether a user is who he/she claims to be.

Views View - A view is the dynamic result of one or more relational operations operating on the base relations to produce another relation. A view is a virtual relation that does not actually exist in the database, but is produced upon request by a particular user, at the time of request. The view mechanism provides a powerful and flexible security mechanism by hiding parts of the database from certain users.

Backup and Recovery Backup - The process of periodically taking a copy of the database and log file on to offline storage media. Journaling - The process of keeping and maintaining a log file (or journal) of all changes made to the database to enable recovery to be undertaken effectively in the event of a failure.

Encryption Encryption - The encoding of the data by a special algorithm that renders the data unreadable by any program without the decryption key. Symmetric encryption - DES, IDEA, RC4, BlowFish, AES. Asymmetric encryption - RSA, Diffie-Helman. Plain-data Algorithm and password Encrypted data

RAID - Redundant Array of Independent Disks RAID is a category of disk drives that employ two or more drives in combination for fault tolerance and performance. RAID disk drives are used frequently on servers running the databases.  Level 0: Provides data striping (spreading out blocks of each file across multiple disks) but no redundancy. This improves performance but does not deliver fault tolerance.  Level 1: Provides disk mirroring.  Level 3: Same as Level 0, but also reserves one dedicated disk for error correction data. It provides good performance and some level of fault tolerance.  Level 5: Provides data striping at the byte level and also stripe error correction information. This results in excellent performance and good fault tolerance.

Microsoft Access and Oracle DBMS Microsoft Access: System level security - password. User-level security - identification as a member of groups (Administrators and Users), permissions are granted (Open/Run, Read, Update, Delete, etc). Oracle DBMS: System level security - name, password. User-level security is based on a privilege, i.e a right to execute a particular type of SQL statements or to access another user’s object. System privileges and object privileges.

DBMSs and Web Security  Proxy servers  Firewalls  Message Digest Algorithms and Digital Signature  Digital Certificates  SSL and S-HTTP

Proxy servers Proxy servers is a computer that sits between a Web browser and a Web servers. It intercepts all requests for web pages and saves them locally for some time. Proxy server provides improvement in performance and filters requests. Computer A Computer B Proxy-server Internet

Firewalls Firewall - is a system that prevents unauthorized access to or from private network. Implemented in software, hardware or both.  Packet filter  Application gateway  Circuit-level gateway (TCP, UDP protocols)  Proxy server

Message Digest Algorithms and Digital Signatures Message digest algorithm is the one-way hash function that produces a fixed-length string (hash) from an arbitrary-sized message. It’s computationally infeasible that there is another message with the same digest, the digest does not reveal anything about the message. Digital signature consist of two parts: a string of bits that is computed from the message and the private key of organization. Digital signature is used to verify that the message comes from this organization.

Digital Certificates Digital Certificate is an attachment to an electronic message used for security purposes, most commonly to verify that a user sending a message is who he/she claims to be, and provide the receiver with the means to encrypt a reply. Protocol - X.509. Digital Certificate Authorities - VeriSign, Thwate.

Secure Sockets Layer and Secure HTTP SSL creates a secure connection between a client and a server, over which any amount of data can be sent securely. S-HTTP is designed to transmit individual messages securely. Both use asymmetric encryption.  Allow Web browsers and servers to authenticate each other  Permit Web site owners to control access to particular servers, directories, files  Allow sharing of sensitive information (credit card numbers) only between browser and server  Ensure that data exchange between browser and server is reliable