Download presentation
Presentation is loading. Please wait.
Published byCorey Wiggins Modified over 9 years ago
1
Academic Year 2014 Spring Academic Year 2014 Spring
2
MODULE CC3005NI: Advanced Database Systems “DATABASE SECURITY” Academic Year 2014 Spring Academic Year 2014 Spring
3
Widespread use of multi user database systems has increased productivity and efficiency for many organisations. However, it also exposes these organisations to greater vulnerability of the databases being misused. The overall objective of database security is to protect data in the databases against unauthorised use, disclosure, alteration or destruction. Objective of Database Security:
4
Different Concepts Database Security o How to protect data from unauthorised use Only authorised users are permitted to use the database They do so under the access control imposed by the system Database Integrity o How to ensure accuracy or validity of data Entity integrity, domain integrity, referential integrity rules Other user defined, application specific integrity rules Database Security vs. Integrity:
5
Common Features The database systems must be aware of constraints that users must not violate These constraints must be specified by DBA in some suitable language These constraints must be maintained in the system catalogue The DBMS must monitor user operations in order to ensure that the constraints are properly enforced. Database Security vs. Integrity:
6
General Concerns Legal, Social Ethical Issues Whether a person has a legal right to access the information Data Protection Act to ensure proper control of access to personal/confidential information Policy Issues What is the company scheme to protect its database Issued to be Considered:
7
Hardware Issues Physical security of the computer system and the reliability of the hardware Software Issues Reliability of Operating systems used Issued to be Considered:
8
Database specific Concerns Unauthorised used of the database, either deliberately or accidentally Unauthorised users attempting access to the database Authorised users attempting unauthorised operations on certain data objects Data encryption provides additional protection for sensitive data during transmission Issued to be Considered:
9
In the context of database security, an access request / access right contains three aspects User – who is requesting access Operation – what operation is requested (select, insert, delete, update) Data object – what data object is requested Typically, users will have different access rights on various data objects in a database Access Request:
10
Depending on the security schemes used, the scope of data objects ranges from: Entire database A set of relations A set of tuples / columns A particular attribute value within a tuple Granularity of Data Objects:
11
Authorisation subsystem Provided by database security mechanism to check and verify user’s identity for ensuring the security of the database against unauthorised access Before accessing database a user must Identify themselves Authenticate their identification Additional identification & authentication may further be required during session e. g. Cash point, oracle log in, finger prints retina scans etc. Identification and Authentication:
12
Two main approaches to database security, depending on the type of objects (user or data) through which the access control is exercised Discretionary Access Control o Control is exercised by assigning users different access rights (privileges / authorities) on different data objects Mandatory Access Control o Control is exercised by assigning data objects different classification levels and assigning user different clearance levels Two Main Approaches:
13
Discretionary Access Control (DAC) provide flexibility in allowing access to database DACs protect unstructured work in progress DAC objects contain information protected by Mandatory Access Control (MAC) DAC also includes privileges associated with email DAC labels are derived from MAC labels Access decisions in DAC do not take into account user’s role or program’s functionality Discretionary Access Control:
14
There are various methods used in Discretionary Access Control like; Access Matrix use table(s) to specify access privilege for different users on different data objects Security Rules use a suitable language to specify user’s access rights Discretionary Access Control:
15
Discretionary Access Control - Access Matrix:
16
An Access Matrix may contain many empty cells, so its information could be stored as user profiles or object profiles User Profiles (from the example) User Atable1:select; table1, attr2:update; table2:select User Btable1,attr1:select; table2:select; table2, attr1:update Object Profiles (from the example) Table 1userA:select Table 2userA:select; userB:select; userD:insert Discretionary Access Control - Access Matrix:
17
Supported by SQL standard and facilitated by two statements GRANT and REVOKE GRANT – Definition of Security Rules GRANT operation ON data object TO user(s) Violation response Discretionary Access Control - Security Rules:
18
Some examples Value independent rules GRANTONTO GRANT SELECT ON TABLE Employee TO Ram, Shyam, Hari; Value dependent rules GRANTTO GRANT SELECT ON TABLE Supplier where Supplier-city = ‘London’ TO Ganesh; Context dependent rules GRANT TO GRANT UPDATE ON TABLE Product WHEN Day() in (‘Mon’, ‘Tue’, ‘Wed’, ‘Thu’, ‘Fri’) AND Now() >= Time ‘09:00:00’ AND NOW() >= Time ‘17:00:00’ TO Order-Dept; Discretionary Access Control - Security Rules:
19
Violation Response GRANTONTO e.g. GRANT SELECT ON TABLE Employee TO Ram ON attempted violation Reject; REVOKE – Deletion of Security Rules REVOKE SELECT ON TABLE Employee TO Ram; REVOKE UPDATE ON TABLE Employee TO Ram; REVOKE DELETE ON TABLE Employee TO Ram; REVOKE INSERT ON TABLE Employee TO Ram; or, REVOKE SELECT, INSERT ON TABLE Employee TO Ram; REVOKE ALL ON TABLE Employee TO Ram; Discretionary Access Control - Security Rules:
20
Why Mandatory Access Control (MAC) is needed? Enhances security of database Gives consistent view of operations General rule is all allowed accesses are provided by MAC Access that is not part of MAC is Discretionary Access Control (DAC) MAC adds to complexity Mandatory Access Control:
21
MAC is used for type enforcement (TE) as is done in programming languages MAC protects organizational data MAC deals with database queries, reports and statistical studies Data protection for a class is determined by its label Relabel privileges follow a set of rules since label makes a difference in access Mandatory Access Control:
22
Relabels are used for declassification of existing objects or for approvability Relabels do not allow changing or observing the content Information flow is specified between MAC labels Information flow restrictions are essential for maintaining confidentiality Mandatory Access Control:
23
Examples: Official reports (DAC permission allows DAC copy) Statistical analysis of medical records (providers and researchers have different view of same data) Accounting records (updated by structured programs and accessed by unstructured programs) Mandatory Access Control:
24
Key Points of the scheme Each data objects is assigned a classification level Each user is assigned a clearance level o Users with a clearance level I can only access data objects whose classification level j is lower than or equal to i. o The classification and clearance levels have the same number of possibilities o These levels form a strict ordering hierarchy Mandatory Control:
25
Example Mandatory Control – Security Classification Method:
26
Questions: According to the information given in the tables: What is a manager’s access right? o Select tables 1 and 2; o Update table 2 and attributes 1 and 2 of table 1 o Delete table 2 and attribute 2 of table 1 Is a manager allowed to delete a data item from the attribute 1 of Table 1? o No Who can select attribute 1 of Table 2? o Everyone Mandatory Control – Security Classification Method:
27
Discretionary Access Control More widely used due to its flexibility Supported by current SQL standard Mandatory Access Control With more rigid structure Suitable for organisations with strict requirement for security and hierarchy (e.g. Government, defence systems, for sensitive / classified information) Comparison:
28
Thank you!!! Questions are WELCOME Academic Year 2014 Spring Academic Year 2014 Spring
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.