+ Security Concerns Chapter 10.1. + Security types Physical security Access security Database security.

Slides:



Advertisements
Similar presentations
Chapter 23 Database Security and Authorization Copyright © 2004 Pearson Education, Inc.
Advertisements

REDCap Executive Overview
Database Administration and Security Transparencies 1.
©2006 ITT Educational Services Inc. Course Name: IT390 Business Database Administration Unit 5 Slide 1 IT390 Business Database Administration Unit 5 :
Security and Integrity
Database Management System
Systems Development Audit. Principles  To check that they system is producing the expected results  Ensure that the appropriate controls are operating.
Session - 15 RECOVERY CONTROL - 1 Matakuliah: M0184 / Pengolahan Data Distribusi Tahun: 2005 Versi:
Backup The flip side of recovery. Types of Failures Transaction failure –Transaction must be aborted System failure –Hardware or software problem resulting.
Chapter 8 : Transaction Management. u Function and importance of transactions. u Properties of transactions. u Concurrency Control – Meaning of serializability.
Chapter 8 Security Transparencies © Pearson Education Limited 1995, 2005.
Chapter 9 Database Design
Concepts of Database Management Seventh Edition
The Database Market Presented to the class of BA 471 May, 2006 Dr. Rene Reitsma Amy Miller ● Elaina Reinhard ● Shannon Wegner.
Module 12: Backup and Recovery. Overview Backup and recovery methods available in Oracle and SQL Server 2008 Types of failure Types of recovery Formulating.
Module 5 Understanding SQL Server 2008 R2 Recovery Models.
DATABASE SECURITY By Oscar Suciadi CS 157B Prof. Sin-Min Lee.
Chapter 1 Overview of Databases and Transaction Processing.
SQL Server 2008 Implementation and Maintenance Chapter 7: Performing Backups and Restores.
Chapter 13: Data Security & Disaster Recovery Database Management Systems.
© Pearson Education Limited, Chapter 5 Database Administration and Security Transparencies.
ApexSQL Log Recover accidentally truncated, dropped or deleted data with or without transaction log or its backup. Recover data from un-attachable/corrupted.
Concepts of Database Management Sixth Edition
Describe How Software and Network Security Can Keep Systems and Data Secure P3. M2 and D1 Unit 7.
Maintaining a Mirrored Database Tips and Tricks by Paul G. Hiles.
Chapter 16 Designing Effective Output. E – 2 Before H000 Produce Hardware Investment Report HI000 Produce Hardware Investment Lines H100 Read Hardware.
Concepts of Database Management Eighth Edition
Next Back MAP 3-1 Management Information Systems for the Information Age Copyright 2002 The McGraw-Hill Companies, Inc. All rights reserved Chapter 3 Database.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 5.1 © Copyright IBM Corporation 2008 DB2 9 Fundamentals.
The protection of the DB against intentional or unintentional threats using computer-based or non- computer-based controls. Database Security – Part 2.
Metadata, Security, and the DBA Chapter 8.1 V3.0 Napier University Dr Gordon Russell.
 Chapter 14 – Security Engineering 1 Chapter 12 Dependability and Security Specification 1.
Introduction to the new mainframe © Copyright IBM Corp., All rights reserved. Chapter 12 Understanding database managers on z/OS.
Note1 (Admi1) Overview of administering security.
CSCI 3140 Module 6 – Database Security Theodore Chiasson Dalhousie University.
Chapter One (Database System) Objectives Introduction to Database Management Systems (DBMS) Data and Information History of DB Types of DB.
Information System Audit : © South-Asian Management Technologies Foundation Chapter 10 Case Study: Conducting an Information Systems Audit.
INTRODUCTION TO DBS Database: a collection of data describing the activities of one or more related organizations DBMS: software designed to assist in.
IT Auditing & Assurance, 2e, Hall & Singleton Chapter 3: Data Management Systems.
1 Principles of Database Systems With Internet and Java Applications Today’s Topic Chapter 15: Reliability and Security in Database Servers Instructor’s.
Advanced Databases DBA: Security and Backups Guide to Oracle 10g 1.
1 Chapter Overview Understanding Data Restoration Issues Understanding the Types of Database Backups Understanding the Restoration Process.
MBA 664 Database Management Dave Salisbury ( )
Module 6: Data Protection. Overview What does Data Protection include? Protecting data from unauthorized users and authorized users who are trying to.
TM 13-1 Copyright © 1999 Addison Wesley Longman, Inc. Data and Database Administration.
Chapter 15: Reliability and Security in Database Servers Neyha Amar CS 157B May 6, 2008.
IMS 4212: Data and Database Administration 1 Dr. Lawrence West, Management Dept., University of Central Florida Data & Database Administration.
Chapter 9 Database Security and Authorization Copyright © 2004 Pearson Education, Inc.
Warwick Rudd – Henry Rooney – How Available is SQL Server 2016? DAT33 6.
SQL Introduction to database and SQL. Chapter 1: Databases and Database Users 6 Introduction to Databases Databases touch all aspects of our lives. Examples:
IS 4506 Windows NTFS and IIS Security Features.  Overview Windows NTFS Server security Internet Information Server security features Securing communication.
Web Database Security Session 12 & 13 Matakuliah: Web Database Tahun: 2008.
AGENDA 1.Importance of backups and backup strategy 2.Full DB backup and Restore 3.Filegroup Backup and restore 4.File Backup and Restore 5.Page restore.
Copyright © 2016 Pearson Education, Inc. CHAPTER 12: DATA AND DATABASE ADMINISTRATION Modern Database Management 12 th Edition Jeff Hoffer, Ramesh Venkataraman,
Indexing strategies and good physical designs for performance tuning Kenneth Ureña /SpanishPASSVC.
ORACLE's Approach ORALCE uses a proprietary mechanism for security. They user OLS.... ORACLE Labeling Security. They do data confidentiality They do adjudication.
Protecting Data at Rest Through Encryption CIO Summit November 30, 2007.
Disaster Recovery Scenarios René Romo González DBA at Intel Second Meetup DBA100.
Information Systems Security
Database recovery contd…
Business Continuity for Virtual SQL Servers
Design for Security Pepper.
SQL Server 2000 and Access 2000 limits
Common Security Mistakes
Chapter 3: Data Management Systems
Computer-Based Processing: Developing an Audit Assessment Approach
Safety of information systems Fault-tolerant systems
Systems Design Chapter 6.
السلوك التنظيمى المعاصر
Distributed Availability Groups
Presentation transcript:

+ Security Concerns Chapter 10.1

+ Security types Physical security Access security Database security

+ Physical security

+ Data security – Backup Strategies

+ Backup strategies Transactions and commits – recovery from failure – next class – inside the DBMS Mirroring of hard drives – avoid loss of data if a drive fails (pretty common practice) Periodic backups of data (change vs full) Off site backup of data (disaster recovery)

+ Access security Require network users to authenticate to reach network resources JMU has secure VPN access…must authenticate to reach JMU network resources (some)

+ Database security Who makes the decisions? What features in the db support security? What mysql statements address security?

+ Application security Log on ? Secure entry information include statements

+ Database security Security subsystem Access control Views Audit trail Triggers Encryption of database

+ MySQL – Support for security Users CREATE USER abc IDENTIFIED BY PASSWORD(‘somepass’); GRANT ALL PRIVILEGES ON X.* to abc; GRANT GRANT ON X.* to abc; Creates a user, giving them access to everything in database X including the right to provide access to other users. Privileges

+ mysql_real_escape_string()

+ Next time Transactions in SQL Spend 5 min / team reporting on project status Can show screens if present What is going well? What is challenging? Do you need any help?

+ Tuesday Overview of some front ends that make database management easier A look at a couple of other Relational DBMS A brief overview of XML Thursday Project demonstrations