Download presentation
Presentation is loading. Please wait.
Published byGary Lawrence Modified over 9 years ago
1
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture
2
Database Security & Auditing: Protecting Data Integrity & Accessibility2 Objectives Define security Describe an information system and its components Define database management system functionalities Outline the concept of information security
3
Database Security & Auditing: Protecting Data Integrity & Accessibility3 Objectives (continued) Identify the major components of information security architecture Define database security List types of information assets and their values Describe security methods
4
Database Security & Auditing: Protecting Data Integrity & Accessibility4 Security Database security: degree to which data is fully protected from tampering or unauthorized acts Comprises information system and information security concepts
5
Database Security & Auditing: Protecting Data Integrity & Accessibility5 Information Systems Wise decisions require: –Accurate and timely information –Information integrity Information system: comprised of components working together to produce and generate accurate information Categorized based on usage
6
Database Security & Auditing: Protecting Data Integrity & Accessibility6 Information Systems (continued)
7
Database Security & Auditing: Protecting Data Integrity & Accessibility7 Information Systems (continued)
8
Database Security & Auditing: Protecting Data Integrity & Accessibility8 Information Systems (continued)
9
Database Security & Auditing: Protecting Data Integrity & Accessibility9 Information Systems (continued) Information system components include: –Data –Procedures –Hardware –Software –Network –People
10
Database Security & Auditing: Protecting Data Integrity & Accessibility10 Information Systems (continued)
11
Database Security & Auditing: Protecting Data Integrity & Accessibility11 Information Systems (continued) Client/server architecture: –Based on the business model –Can be implemented as one-tier; two-tier; n-tier –Composed of three layers Tier: physical or logical platform Database management system (DBMS): collection of programs that manage database
12
Database Security & Auditing: Protecting Data Integrity & Accessibility12 Information Systems (continued)
13
Database Security & Auditing: Protecting Data Integrity & Accessibility13 Database Management Essential to success of information system DBMS functionalities: –Organize data –Store and retrieve data efficiently –Manipulate data (update and delete) –Enforce referential integrity and consistency –Enforce and implement data security policies and procedures –Back up, recover, and restore data
14
Database Security & Auditing: Protecting Data Integrity & Accessibility14 Database Management (continued) DBMS components include: –Data –Hardware –Software –Networks –Procedures –Database servers
15
Database Security & Auditing: Protecting Data Integrity & Accessibility15 Database Management (continued)
16
Database Security & Auditing: Protecting Data Integrity & Accessibility16 Information Security Information is one of an organization’s most valuable assets Information security: consists of procedures and measures taken to protect information systems components C.I.A. triangle: confidentiality, integrity, availability Security policies must be balanced according to the C.I.A. triangle
17
Database Security & Auditing: Protecting Data Integrity & Accessibility17 Information Security (continued)
18
Database Security & Auditing: Protecting Data Integrity & Accessibility18 Confidentiality Addresses two aspects of security: –Prevention of unauthorized access –Information disclosure based on classification Classify company information into levels: –Each level has its own security measures –Usually based on degree of confidentiality necessary to protect information
19
Database Security & Auditing: Protecting Data Integrity & Accessibility19 Confidentiality (continued)
20
Database Security & Auditing: Protecting Data Integrity & Accessibility20 Integrity Consistent and valid data, processed correctly, yields accurate information Information has integrity if: –It is accurate –It has not been tampered with Read consistency: each user sees only his changes and those committed by other users
21
Database Security & Auditing: Protecting Data Integrity & Accessibility21 Integrity (continued)
22
Database Security & Auditing: Protecting Data Integrity & Accessibility22 Integrity (continued)
23
Database Security & Auditing: Protecting Data Integrity & Accessibility23 Availability Systems must be always available to authorized users Systems determines what a user can do with the information
24
Database Security & Auditing: Protecting Data Integrity & Accessibility24 Availability (continued) Reasons for a system to become unavailable: –External attacks and lack of system protection –System failure with no disaster recovery strategy –Overly stringent and obscure security policies –Bad implementation of authentication processes
25
Database Security & Auditing: Protecting Data Integrity & Accessibility25 Information Security Architecture Protects data and information produced from the data Model for protecting logical and physical assets Is the overall design of a company’s implementation of C.I.A. triangle
26
Database Security & Auditing: Protecting Data Integrity & Accessibility26 Information Security Architecture (continued)
27
Database Security & Auditing: Protecting Data Integrity & Accessibility27 Information Security Architecture (continued) Components include: –Policies and procedures –Security personnel and administrators –Detection equipments –Security programs –Monitoring equipment –Monitoring applications –Auditing procedures and tools
28
Database Security & Auditing: Protecting Data Integrity & Accessibility28 Database Security Enforce security at all database levels Security access point: place where database security must be protected and applied Data requires highest level of protection; data access point must be small
29
Database Security & Auditing: Protecting Data Integrity & Accessibility29 Database Security (continued)
30
Database Security & Auditing: Protecting Data Integrity & Accessibility30 Database Security (continued) Reducing access point size reduces security risks Security gaps: points at which security is missing Vulnerabilities: kinks in the system that can become threats Threat: security risk that can become a system breach
31
Database Security & Auditing: Protecting Data Integrity & Accessibility31 Database Security (continued)
32
Database Security & Auditing: Protecting Data Integrity & Accessibility32 Database Security (continued)
33
Database Security & Auditing: Protecting Data Integrity & Accessibility33 Database Security Levels Relational database: collection of related data files Data file: collection of related tables Table: collection of related rows (records) Row: collection of related columns (fields)
34
Database Security & Auditing: Protecting Data Integrity & Accessibility34 Database Security Levels (continued)
35
Database Security & Auditing: Protecting Data Integrity & Accessibility35 Menaces to Databases Security vulnerability: a weakness in any information system component
36
Database Security & Auditing: Protecting Data Integrity & Accessibility36 Menaces to Databases (continued)
37
Database Security & Auditing: Protecting Data Integrity & Accessibility37 Menaces to Databases (continued) Security threat: a security violation or attack that can happen any time because of a security vulnerability
38
Database Security & Auditing: Protecting Data Integrity & Accessibility38 Menaces to Databases (continued)
39
Database Security & Auditing: Protecting Data Integrity & Accessibility39 Menaces to Databases (continued) Security risk: a known security gap intentionally left open
40
Database Security & Auditing: Protecting Data Integrity & Accessibility40 Menaces to Databases (continued)
41
Database Security & Auditing: Protecting Data Integrity & Accessibility41 Menaces to Databases (continued)
42
Database Security & Auditing: Protecting Data Integrity & Accessibility42 Asset Types and Their Value Security measures are based on the value of each asset Types of assets include: –Physical –Logical –Intangible –Human
43
Database Security & Auditing: Protecting Data Integrity & Accessibility43 Security Methods
44
Database Security & Auditing: Protecting Data Integrity & Accessibility44 Security Methods (continued)
45
Database Security & Auditing: Protecting Data Integrity & Accessibility45 Database Security Methodology
46
Database Security & Auditing: Protecting Data Integrity & Accessibility46 Summary Security: level and degree of being free from danger and threats Database security: degree to which data is fully protected from unauthorized tampering Information systems: backbone of day-to-day company operations
47
Database Security & Auditing: Protecting Data Integrity & Accessibility47 Summary (continued) DBMS: programs to manage a database C.I.A triangle: –Confidentiality –Integrity –Availability Secure access points Security vulnerabilities, threats and risks
48
Database Security & Auditing: Protecting Data Integrity & Accessibility48 Summary (continued) Information security architecture –Model for protecting logical and physical assets –Company’s implementation of a C.I.A. triangle Enforce security at all levels of the database
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.