Network Security Philadelphia UniversitylAhmad Al-Ghoul 2010-20111 Module 7 Module 7 Data Base Security  MModified by :Ahmad Al Ghoul  PPhiladelphia.

Slides:



Advertisements
Similar presentations
Introduction to Database Management  Department of Computer Science Northern Illinois University January 2001.
Advertisements

Network Security Philadelphia UniversityAhmad Al-Ghoul Module 11 Exploring Secure Topologies  MModified by :Ahmad Al Ghoul  PPhiladelphia.
Monday, 08 June 2015Dr. Mohamed Osman1 What is Database Administration A high level function (technical Function) that is responsible for ► physical DB.
Chapter Information Systems Database Management.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 10 Managing a Database.
Database Management: Getting Data Together Chapter 14.
Security in Databases. 2 Srini & Nandita (CSE2500)DB Security Outline review of databases reliability & integrity protection of sensitive data protection.
Getting Started (Excerpts) Chapter One DAVID M. KROENKE’S DATABASE CONCEPTS, 2 nd Edition.
Living in a Digital World Discovering Computers 2010.
Chapter 8 Security Transparencies © Pearson Education Limited 1995, 2005.
Security in Databases. 2 Outline review of databases reliability & integrity protection of sensitive data protection against inference multi-level security.
Chapter 4 Relational Databases Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 4-1.
BUSINESS DRIVEN TECHNOLOGY
Functions of a Database Management System. Functions of a DBMS C.J. Date n Indexing n Views n Security n Integrity n Concurrency n Backup/Recovery n Design.
Databases and Database Management Systems
Chapter 1 Introduction to Databases
Chapter 4 Database Management Systems. Chapter 4Slide 2 What is a Database Management System (DBMS)?  Database An organized collection of related data.
Chapter 4 Relational Databases Copyright © 2012 Pearson Education 4-1.
Software Development Unit 2 Databases What is a database? A collection of data organised in a manner that allows access, retrieval and use of that data.
DATABASE MANAGEMENT SYSTEM ARCHITECTURE
IT 221: Introduction to Information Security Principles Lecture 11: Database Security For Educational Purposes Only Revised: November 13, 2002.
CS370 Spring 2007 CS 370 Database Systems Lecture 2 Overview of Database Systems.
Copyright © 2003 by Prentice Hall Module 4 Database Management Systems 1.What is a database? Data hierarchy and data organization Field, record, file,
Your Interactive Guide to the Digital World Discovering Computers 2012.
Discovering Computers Fundamentals, 2012 Edition Your Interactive Guide to the Digital World.
Chapter 6 – Database Security  Integrity for databases: record integrity, data correctness, update integrity  Security for databases: access control,
6-1 DATABASE FUNDAMENTALS Information is everywhere in an organization Information is stored in databases –Database – maintains information about various.
The University of Akron Dept of Business Technology Computer Information Systems DBMS Functions 2440: 180 Database Concepts Instructor: Enoch E. Damson.
© Paradigm Publishing Inc. 9-1 Chapter 9 Database and Information Management.
Objectives Overview Define the term, database, and explain how a database interacts with data and information Define the term, data integrity, and describe.
STORING ORGANIZATIONAL INFORMATION— DATABASES CIS 429—Chapter 7.
Chapter 6 – Database Security  Integrity for databases: record integrity, data correctness, update integrity  Security for databases: access control,
Chapter 1 In-lab Quiz Next week
Information Systems: Databases Define the role of general information systems Describe the elements of a database management system (DBMS) Describe the.
Chapter 7: Database Systems Succeeding with Technology: Second Edition.
© Paradigm Publishing Inc. 9-1 Chapter 9 Database and Information Management.
The protection of the DB against intentional or unintentional threats using computer-based or non- computer-based controls. Database Security – Part 2.
Chapter 1 : Introduction §Purpose of Database Systems §View of Data §Data Models §Data Definition Language §Data Manipulation Language §Transaction Management.
Discovering Computers Fundamentals Fifth Edition Chapter 9 Database Management.
Objectives Overview Define the term, database, and explain how a database interacts with data and information Describe the qualities of valuable information.
1.file. 2.database. 3.entity. 4.record. 5.attribute. When working with a database, a group of related fields comprises a(n)…
Storing Organizational Information - Databases
Dimu' Rumpak © 2009 by Prentice Hall 1 Getting Started Didimus Rumpak, M.Si. Database Concepts Chapter 1 1.
Database Management System (DBMS) an Introduction DeSiaMore 1.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 7 Storing Organizational Information - Databases.
Chapter 1 Introduction to Databases. 1-2 Chapter Outline   Common uses of database systems   Meaning of basic terms   Database Applications  
INFORMATION MANAGEMENT Unit 2 SO 4 Explain the advantages of using a database approach compared to using traditional file processing; Advantages including.
CHAPTER 5 Database Security 1. Objectives  Explain briefly the concept of databases  Identify the security requirement of the databases  List and explain.
Database Security Outline.. Introduction Security requirement Reliability and Integrity Sensitive data Inference Multilevel databases Multilevel security.
INFO1408 Database Design Concepts Week 15: Introduction to Database Management Systems.
Prepared By Prepared By : VINAY ALEXANDER ( विनय अलेक्सजेंड़र ) PGT(CS),KV JHAGRAKHAND.
Pertemuan Ke 7 Agung BP. Pembahasan Integrity for databases: record integrity, data correctness, update integrity Security for databases: access control,
DATABASE MANAGEMENT SYSTEM ARCHITECTURE
Database Management Systems (DBMS)
0 / Database Management. 1 / Identify file maintenance techniques Discuss the terms character, field, record, and table Describe characteristics.
1 Chapter 9 Database Management. Objectives Overview Define the term, database, and explain how a database interacts with data and information Describe.
Introduction to Databases Dr. Osama AL Rababah. Objectives In this capture you will learn: Some common uses of database systems. The characteristics of.
Control of data redundancy Data consistency More information from the same amount of data Sharing of data Improved data integrity Improved security Enforcement.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 1 Database Systems.
Presentation on Database management Submitted To: Prof: Rutvi Sarang Submitted By: Dharmishtha A. Baria Roll:No:1(sem-3)
Functions of a Database Management System
Pertemuan Ke 7 Agung BP.
Chapter Ten Managing a Database.
Chapter 4 Relational Databases
Database Management Systems
What is a Database and Why Use One?
Chapter 9 Database and Information Management.
Data Model.
Security in Computing, Fifth Edition
Presentation transcript:

Network Security Philadelphia UniversitylAhmad Al-Ghoul Module 7 Module 7 Data Base Security  MModified by :Ahmad Al Ghoul  PPhiladelphia University  FFaculty Of Administrative & Financial Sciences  BBusiness Networking & System Management Department  RRoom Number  E Address:

Network Security Philadelphia UniversitylAhmad Al-Ghoul Contents  Concept of a Data Base  Components of Data Bases  Advantages of Using Data Bases  Security Requirements  Integrity of the Data Base  Element Integrity  Field Checks  Access Control  Change Log

Network Security Philadelphia UniversitylAhmad Al-Ghoul Concept of a Data Base  Collection of data and a set of rules that organise the data by specifying certain relationships among the data.  The data items are stored in a file  User is not concerned with the precise physical format of the file.  A data base administrator is the person – who defines the rules that organise the data –Controls who should have access to what parts of the data  The user interacts with the database through a program called data base manager or DBMS (front-end).

Network Security Philadelphia UniversitylAhmad Al-Ghoul Components of Data Bases  The data base file consists of –Records: contains one related group of data –Each record contains fields or elements  A data base can be viewed as a two- dimensional table  The logical structure of a data base is called a schema

Network Security Philadelphia UniversitylAhmad Al-Ghoul Components of Data Bases  The name of each column is called an attribute of the data base.  A relation is a set of columns.  Users interact with data base managers through commands that retrieve, modify, add or delete fields and records of the data base –Commands are called a query  DBMSs have precise rules of syntax for queries. SELECT NAME = ‘AYŞE’ retrieves all records having the value AYŞE in the NAME field.  The result of executing a query is a subschema

Network Security Philadelphia UniversitylAhmad Al-Ghoul Advantages of Using Data Bases  Shared access –Many users can use one common, centralised set of data  Min. Redundancy –Individual users do not have to collect and maintain their own sets of data  Consistency –A change to data value affects all users of data value  Integrity –Values are protected against accidental or malicious incorrect changes  Controlled access –Only authorised users are allowed to view or modify data values

Network Security Philadelphia UniversitylAhmad Al-Ghoul Security Requirements  Physical data base integrity –İmmune to power failures  Logical data base integrity –Structure is preserved  Element integrity –Data contained in each element is correct  Auditibility –Trace who accessed/ modified elements  Access control –User is allowed to access to only authorised data  User authentication –To ensure every user is positively identified  Availability –Users can access the data base in general and all the data for which they are authorised

Network Security Philadelphia UniversitylAhmad Al-Ghoul Integrity of the Data Base  Trust the accuracy of the data values  Updates are performed only by authorised individuals  Data must be protected from corruption –The whole data base is damaged –Individual data items are unreadable  Integrity of the data base is the responsibility of the DBMS  Periodic back-ups of a data base  DBMS must maintain a log of transactions

Network Security Philadelphia UniversitylAhmad Al-Ghoul Element Integrity  Authorised users are responsible for putting correct data into the data base –Mistakes in collecting data –Mistakes in computing results –Mistakes in entering data  The DBMS maintains the integrity by: –Applying field checks –Access control –Change log

Network Security Philadelphia UniversitylAhmad Al-Ghoul Field Checks  Test for appropriate values in a position –Numeric –Uppercase letter –A set of acceptable characters  The check ensures that a value falls within specified bounds or is not greater thatn the sum of the values in two other fields  Prevents simple errors as the data is enetered

Network Security Philadelphia UniversitylAhmad Al-Ghoul Access Control  A data base may contain data from different sources –Redundant data might have been stored in many places  Data bases have led to the collection and control of this data at one central source –Who has authorisation to update which elements –Policy issues

Network Security Philadelphia UniversitylAhmad Al-Ghoul Change Log  A list of every change made to the data base  The log contains –Original –Modified values  With this log a data base administrator can undo any changes that were in error.