Module 6: Data Protection. Overview What does Data Protection include? Protecting data from unauthorized users and authorized users who are trying to.

Slides:



Advertisements
Similar presentations
Module 13: Performance Tuning. Overview Performance tuning methodologies Instance level Database level Application level Overview of tools and techniques.
Advertisements

Module 12: Auditing SQL Server Environments
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 8 Application Data Auditing.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 8 Application Data Auditing.
Transaction Processing. Objectives After completing this lesson, you should be able to do the following: –Define transactions effectively for an application.
Module 20 Troubleshooting Common SQL Server 2008 R2 Administrative Issues.
1 Data Concurrency David Konopnicki 1997 Revised by Mordo Shalom 2004.
Data and Database Administration Chapter 12. Outline What is Concurrency Control? Background Serializability  Locking mechanisms.
Chapter 9 Auditing Database Activities
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 5 Database Application Security Models.
System Administration Accounts privileges, users and roles
Oracle8 - The Complete Reference. Koch a& Loney1 By What Authority? Presented by Victor Matos.
DBMS Functions Data, Storage, Retrieval, and Update
Chapter 5 Database Application Security Models
Transaction Management and Concurrency Control
Chapter 1 Introduction to Databases
Adapted from Afyouni, Database Security and Auditing Database Application Auditing – Ch. 8.
Module 8: Server Management. Overview Server-level and instance-level resources such as memory and processes Database-level resources such as logical.
1 IT420: Database Management and Organization Transactions 31 March 2006 Adina Crăiniceanu
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 3 Administration of Users.
Database Technical Session By: Prof. Adarsh Patel.
Profiles, Password Policies, Privileges, and Roles
MICROSOFT SQL SERVER 2005 SECURITY  Special Purpose Logins and Users  SQL Server 2005 Authentication Modes  Permissions  Roles  Managing Server Logins.
Module 9 Authenticating and Authorizing Users. Module Overview Authenticating Connections to SQL Server Authorizing Logins to Access Databases Authorization.
IS 221: DATABASE ADMINISTRATION Lecture 6:Create Users & Manage Users. Information Systems Department 1.
The protection of the DB against intentional or unintentional threats using computer-based or non- computer-based controls. Database Security – Part 2.
1099 Why Use InterBase? Bill Todd The Database Group, Inc.
Oracle Locking Michael Messina Principal Database Analyst Indiana University.
Triggers A Quick Reference and Summary BIT 275. Triggers SQL code permits you to access only one table for an INSERT, UPDATE, or DELETE statement. The.
Unit 9 Transaction Processing. Key Concepts Distributed databases and DDBMS Distributed database advantages. Distributed database disadvantages Using.
1 IT420: Database Management and Organization Session Control Managing Multi-user Databases 24 March 2006 Adina Crăiniceanu
Roles & privileges privilege A user privilege is a right to execute a particular type of SQL statement, or a right to access another user's object. The.
1 Figure 9-10: Database and Instant Messaging Security Concerns Other Applications  There are many other applications  Each has its own security issues.
Module 11 Creating Highly Concurrent SQL Server® 2008 R2 Applications.
Introduction to Oracle. Oracle History 1979 Oracle Release client/server relational database 1989 Oracle Oracle 8 (object relational) 1999.
Dale Roberts 1 Department of Computer and Information Science, School of Science, IUPUI Dale Roberts, Lecturer Computer Science, IUPUI
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 9 Auditing Database Activities.
IT Auditing & Assurance, 2e, Hall & Singleton Chapter 3: Data Management Systems.
Random Logic l Forum.NET l Transaction Isolation Levels Forum.NET Meeting ● Nov
Database Security. Multi-user database systems like Oracle include security to control how the database is accessed and used for example security Mechanisms:
SQL Server 2005 Engine Optimistic Concurrency Tony Rogerson, SQL Server MVP Independent Consultant 26 th.
© 2006 ITT Educational Services Inc. Course Name: IT390 Business Database Administration Unit 8 Slide 1 IT 390 Business Database Administration Unit 8:
Increasing security by disabling DML statements to a dba user in Oracle database Hakik PACI Polytechnic University of Tirana.
SQLintersection Understanding Transaction Isolation Levels Randy Knight Wednesday, 3:45-5:00.
Transactions, Roles & Privileges Oracle and ANSI Standard SQL Lecture 11.
Oracle 11g: SQL Chapter 7 User Creation and Management.
Database Security. Multi-user database systems like Oracle include security to control how the database is accessed and used for example security Mechanisms:
Module 11: Managing Transactions and Locks
7 Copyright © 2007, Oracle. All rights reserved. Administering User Security.
Module 6: Administering Reporting Services. Overview Server Administration Performance and Reliability Monitoring Database Administration Security Administration.
Intro To Oracle :part 1 1.Save your Memory Usage & Performance. 2.Oracle Login ways. 3.Adding Database to DB Trees. 4.How to Create your own user(schema).
Module 14: Managing Transactions and Locks. Overview Introducing Transactions and Locks Managing Transactions Understanding SQL Server Locking Architecture.
Lock Tuning. Overview Data definition language (DDL) statements are considered harmful DDL is the language used to access and manipulate catalog or metadata.
Secure Data Access with SQL Server 2005 Doug Rees Associate Technologist, CM Group
In this session, you will learn to: Implement triggers Implement transactions Objectives.
3 Copyright © 2004, Oracle. All rights reserved. Database Architecture Comparison.
Does the Optimistic Concurrency resolve your blocking problems Margarita Naumova, SQL Master Academy.
Locks, Blocks & Isolation Oh My!. About Me Keith Tate Data Professional for over 14 Years MCITP in both DBA and Dev tracks
Chapter 6 Password, Profiles, Privileges, and Roles
Microsoft SQL Server 2014 for Oracle DBAs Module 8
Policy Based Management: Introduction & implementation
Policy Based Management: Introduction & implementation
A Technical Overview of Microsoft® SQL Server™ 2005 High Availability Beta 2 Matthew Stephen IT Pro Evangelist (SQL Server)
Isolation Levels Understanding Transaction Temper Tantrums
Common Security Mistakes
Designing Database Solutions for SQL Server
Optimistic Concurrency Internals
Implementing Database Roles in the Enterprise Geodatababse
Module 13: Creating Highly Concurrent SQL Server 2012 Applications
Presentation transcript:

Module 6: Data Protection

Overview What does Data Protection include? Protecting data from unauthorized users and authorized users who are trying to update the same data simultaneously Using locking modes to achieve concurrency and consistency Implementing database security features to protect the database, database objects and data Using auditing features to monitor database activity

Concurrency and Consistency Isolation Levels and Concurrency Issues Concurrency and consistency are mutually opposing goals Oracle supports Read Committed and Serializable isolation levels  Achieves other levels through Row Versioning SQL Server Removes “Writers Blocking Readers – Readers Blocking Writers” with Snapshot Isolation SQL Server Supports all Four Isolation levels

Locking Locking granularity SQL Server supports lock escalation Explicit locking can be achieved by using lock hints in Both DBMS Oracle Locking SQL Server Locking Table Level Row level (default) Table Partition Page Row (default)

Demonstration 1: Isolation Level Behaviors In this demonstration you will see how to: Create a dirty read Create a committed read with blocking Create a snapshot isolation to remove blocking

Database Security Security is implemented in both DBMSs using logins and privileges Users can be classified as: Schema owners (SQL Server database object owners) Application users Administrative users User authentication can be achieved through the operating system login or database login SQL Server security depends on Windows security for features such as password expiration

Privileges and Roles Oracle and SQL Server both contain: System-level privileges – to perform actions against any object in the database Object-level privileges – to perform actions against specific schema objects Roles Group  System-level and object-level privileges SQL Server groups fixed roles: Server and Database Application roles in SQL Server  Implemented using application logic  Password protected

Demonstration 2: Provide Instance Security In this demonstration you will see how to: Create a Windows user account Associate a SQL Server login with the Windows user account

Auditing Auditing facilitates database activity monitoring Monitoring  statements, privileges, or objects Oracle audit key DDL and DML statements. SQL Server 2008 all actions (DDL and DML) are auditable. SQL Server audits can be enabled and generated, and then viewed from the audit target SQL Server Profiler offers various events that can be used for auditing SQL Server features such as DDL triggers and event notifications can aid in auditing

Review We defined concurrency and consistency and saw the challenges they offer We learned how concurrency and consistency can be balanced by use of isolation levels implemented using lock modes We learned about login and authentication at the database system level and database level, the various system and object level privileges and privilege management using roles We learned the basics of auditing functionality in SQL Server as compared to Oracle