Download presentation
Presentation is loading. Please wait.
Published byGerald Todd Modified over 9 years ago
1
What are the common problems facing Database Security? Presenters: Group 13 Yichen Jiang, Yingxu Liu Ericka Chickowski, “Five Hurdles That Slow Database Security Adoption”, Dark Reading, Mar 20, 2013
2
Overview Why database security is so important? Current technologies Challenges: scale, tech integration, tradeoff
3
Why Database Security is So Important? On March 20, a wave of cyberattacks that targeted South Korean banks and media networks. [1] On March 8, the U.S. National Vulnerability Database (NVD) was taken down due to suspicious activity detected. [2]
4
Why Database Security is So Important? On early March, an anonymous hacker claimed to have attacked a website belonging to the U.S. Department of State. An analyze indicated 199 Email Addresses, 207 Possible Hashed Passwords leaked.[3]
5
Current technologies Database Activity Monitoring (DAM) Interchangeably: ◦ Security Information and Event Management (SIEM) ◦ Security event manager (SEM) ◦ Security information management (SIM)
6
Challenges - Scale (1/3) A small or midsize operation has only dozens or even hundreds of database servers to protect. 40% of Fortune 500 companies have more than 10,000 database servers. Even 20% of those databases require activity monitor and enforce separation of duties, it can easily cost millions.
7
Challenges - Tech integration (2/3) Use DAM for failed log-in detection DAM and SIEM don’t work well together
8
Challenges - Trade off (3/3) Security comes second to performance. When administrators focus on availability, they often overlook configuration issues that can introduce security vulnerabilities and expose confidential data.
9
Reference [1] Kelly Jackson Higgins, “'Loud' Data-Annihilation Cyberattacks Hit South Korean Banks, Media Outlets”, Dark Reading, Mar 20, 2013. [2] Larry Seltzer, “U.S. National Vulnerability Database Hacked”, Dark Reading, Mar 14, 2013. [3] “Anonymous Attacks US State Department Careers Website”, Dark Reading, Mar 14, 2013. [4] Ericka Chickowski, “Five Hurdles That Slow Database Security Adoption”, Dark Reading, Mar 20, 2013
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.