ITN270.001 Wake Tech1 ITN270 Advanced Internet Databases Lecture 16. Security, Database Backups, Maintenance & Repair Topics: – Internal Security – External.

Slides:



Advertisements
Similar presentations
MySQL Access Privilege System
Advertisements

13 Copyright © Oracle Corporation, All rights reserved. Controlling User Access.
Security Pertemuan 7 Matakuliah: T0413 Tahun: 2009.
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
Linux+ Guide to Linux Certification, Second Edition
User Accounts and Permissions Chapter IV / Part II.
Chapter 10 Overview  Implement Microsoft Windows Authentication Mode and Mixed Mode  Assign login accounts to database user accounts and roles  Assign.
Linux File Security. What is Permission ? Specifies what right are granting to users to access the resources available in the computer. So that important.
Group Accounts; Securing Resources with Permissions
Authentication and authorization Access control consists of two steps, authentication and authorization. Subject Do operation Reference monitor Object.
Default: Zoom 65% then screenshot. DB XStudio tests Launcher DB XStudio XAgent tests Backup DB tests Launcher.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 3 Administration of Users.
ITN Wake Tech1 ITN270 Advanced Internet Databases Lecture 14. Introduction to MySQL Administration and the MySQL Data Directory Topics: –Overview.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 3 Administration of Users.
Help session: Unix basics Keith 9/9/2011. Login in Unix lab  User name: ug0xx Password: ece321 (initial)  The password will not be displayed on the.
SQL HW1 Turn in as a hardcopy at the start of next class period. You may work this assignment in groups.
Mass user creation On our servers is used the convention, that each of user has only one database, which has the same name, as the user itself. This method.
Today’s Objectives Chapters 10 and 11 Security in SQL Server –Manage server logins and database users. –Manage server-level, database-level, and application.
CHAPTER 6 Users and Basic Security. Progression of Steps for Creating a Database Environment 1. Install Oracle database binaries (Chapter 1) 2. Create.
C HAPTER 6 NTFS PERMISSIONS & SECURITY SETTING. INTRODUCTION NTFS provides performance, security, reliability & advanced features that are not found in.
9 Copyright © 2005, Oracle. All rights reserved. Administering User Security.
Copyright س Oracle Corporation, All rights reserved. 14 Controlling User Access.
IOS110 Introduction to Operating Systems using Windows Session 8 1.
Linux+ Guide to Linux Certification, Second Edition
Updating FireRMS Presented by Dan Cook Implementation Team Lead ZOLL.
Managing Groups, Folders, Files and Security Local Domain local Global Universal Objects Folders Permissions Inheritance Access Control List NTFS Permissions.
IS 221: DATABASE ADMINISTRATION Lecture 6:Create Users & Manage Users. Information Systems Department 1.
ITN Wake Tech1 ITN270 Advanced Internet Databases Lecture 15. General MySQL Administration Topics: –Securing a New MySQL Installation –MySQL Server.
Reliability and Security in Database Servers By Samuel Njoroge.
Controlling User Access. Objectives After completing this lesson, you should be able to do the following: Create users Create roles to ease setup and.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 5.1 © Copyright IBM Corporation 2008 DB2 9 Fundamentals.
A Brief Documentation.  Provides basic information about connection, server, and client.
IMS 4212: Database Security 1 Dr. Lawrence West, Management Dept., University of Central Florida Data & Database Administration Security.
Securing Sensitive Information Data Security Dashboards often contain the most important data in the company Securing that information makes business.
Controlling User Access Fresher Learning Program January, 2012.
1 Principles of Database Systems With Internet and Java Applications Today’s Topic Chapter 15: Reliability and Security in Database Servers Instructor’s.
Database Security. Multi-user database systems like Oracle include security to control how the database is accessed and used for example security Mechanisms:
Linux+ Guide to Linux Certification, Third Edition
Linux+ Guide to Linux Certification, Third Edition
Copyright © 2004, Oracle. All rights reserved. CONTROLLING USER ACCESS Oracle Lecture 8.
Apache, MySQL and PHP Installation and Configuration Chapter 2 MySQL Installation and Configuration.
Lecture 6 File, Folder and Share Security. Objectives Managing file and folder security.
CSC 411/511: DBMS Design Dr. Nan Wang 1 Database Administration.
DATA BASE ADMINISTRING DATABASE SERVICES IN RED HAT LINUX.
Chapter 15: Reliability and Security in Database Servers Neyha Amar CS 157B May 6, 2008.
SQOOP INSTALLATION GUIDE Lecturer : Prof. Kyungbaek Kim Presenter : Zubair Amjad.
VIRTUAL HOSTING WITH PureFTPd And MYSQL (Quota And Bandwidth Management) BY Odoh Kenneth Emeka Sun Yu Patrick Appiah.
Oracle 11g: SQL Chapter 7 User Creation and Management.
13 Copyright © Oracle Corporation, All rights reserved. Controlling User Access.
File System Security ls -l. First Columm d = directory l = symbolic link b = block special file c = character special file p = fifo (or named pipe) special.
1 Copyright © 2009, Oracle. All rights reserved. Controlling User Access.
6 Copyright © 2007, Oracle. All rights reserved. Managing Security and Metadata.
How to curb the appetite of your BI team and other useful tricks.
Slide Set #24: Database security SY306 Web and Databases for Cyber Operations.
MySQL Backup and Security Best practices on how to run MySQL on Linux in a secure way Lenz Grimmer
DBMS ● What are they? ● Why used ● Examples? – Oracle – Access – MySQL – Postgres – SQLServer – Sqlite.
Linux Filesystem Management
Administrating a Database
Development Environment Basics
CONTENT MANAGEMENT SYSTEM CSIR-NISCAIR, New Delhi
Open Source Server Side Scripting Permissions & Users
Designing Database Solutions for SQL Server
אבטחת נתונים בסביבת SQL Data Security
Security and File Permission
MySQL User Privileges: Grant
10 Administration etc..
Chapter 9: Managing Groups, Folders, Files, and Object Security
Administrating a Database
We Need To Talk Security
Presentation transcript:

ITN Wake Tech1 ITN270 Advanced Internet Databases Lecture 16. Security, Database Backups, Maintenance & Repair Topics: – Internal Security – External Security –Backups –Maintenance & Repair

ITN Wake Tech2 Internal Security Issues related to file access authorizations –Server Binary Files Only Administrator can access –Client programs Accessible to users so they can run the programs –Files created after the initial installation (option files, SSL-related files, database directory) Administrator

ITN Wake Tech3 Internal Security Access to files in data directory How to steal data –Six steps (Refer to your textbook) Securing Your MySQL Installation –Change owner for the following directory except the data directory #chown -R root.mysqlgrp /usr/local/mysql #chown -R mysqladm.mysqlgrp /usr/local/mysql/data

ITN Wake Tech4 Internal Security Change the mode of base directory & its subdirectory: –chmod 755 /usr/local/mysql mysqladm has full access and everyone else has only read and execute permission –chmod 755 /usr/local/mysql/bin –chmod 700 /usr/local/mysql/libexec clients do not have permission to access –change mode of data directory chmod -R go-rwx /usr/local/mysql/data –only account for running the server can directly access the data directory

ITN Wake Tech5 Internal Security Securing the Socket File –for connection by the client to the local host –change the mode so that users can only remove the files they created Securing Option files –should not be exposed

ITN Wake Tech6 External Security GRANT & REVOKE statements to set up & modify user access to MySQL Structure & Contents of Grant Tables:

ITN Wake Tech7 External Security Structure & Contents of Grant Tables: –user accounts for users may connect to the server password, global privileges - apply to all databases –db which accounts have privileges for which databases Privileges apply to all tables in a database –tables_priv table level privileges apply to all columns in a table –columns_priv column-level privilege

ITN Wake Tech8 Setting up MySQL accounts Without GRANT Statements Modify the grant tables directly Examples: –GRANT ALL ON *.* TO IDENTIFIED BY ‘password’ WITH GRANT OPTION –INSERT INTO user VALUES(‘localhost’, ‘userid’, PASSWORD(‘password’), ‘Y’, ‘Y’, ‘Y’, ‘Y’, ‘Y’, ‘Y’, ‘Y’, ‘Y’, ‘Y’, ‘Y’, ‘Y’, ‘Y’, ‘Y’, ‘Y’);

ITN Wake Tech9 Setting Up Secure Connections Localhost –No need to have SSL in the connection Remote access: –GRANT ALL ON finance.* TO IDENTIFIED BY ‘password’ REQUIR SSL,

ITN Wake Tech10 Locking a database/table for read Lock a Table –LOCK TABLE tb_name READ RELEASE TABLE LOCK –UNLOCK TABLE; Locking All Database for READ access –FLUSH TABLES WITH READ LOCK RELEASE the LOCK –UNLOCK TABLES;

ITN Wake Tech11 Database Backups %mysqlsump *.* > filename direct copy –cp /usr/local/mysql/data/? Filename

ITN Wake Tech12 Table Repair and Data Recovery Checking & Reparing Database Tables –Checking - myisamchk myisamchk tbl_name myisamchk --check tbl_name –Reparing - myisamchk myisamchk --recover --quick tbl_name myisamchk --recover tbl_name myisamchk --safe-recover tble_name

ITN Wake Tech13 Table Repair and Data Recovery Checking & Reparing Tables Using the Server –CHECK mysqlcheck db_name; mysqlcheck db_name tb_name1, tb_name2 mysqlcheck --database db_name1 db_name2 mysqlcheck --all-databases –REPAIR mysqlcheck --repair ?? mysqlcheck --repair --quick ?? Mysqlcheck --repair --extended ??

ITN Wake Tech14 Table Repair and Data Recovery Recovering an entire database –Logfiles