Unit I PPT
Unit I PPT
Unit I PPT
✓ Statistics shows that virus alerts, email spamming, identity theft, data theft,
and types of security breaches on the rise.
✓ Database Security is the degree to which all the data is fully protected from
tampering or unauthorised acts.
✓ The great challenge is to develop a new database security policy to secure data
and prevent integrity data violations.
✓ Most of the DBMS did not have a security mechanism for authentication and
encryption until recently.
Security Architecture: Introduction
• Security measures
• Prevent physical access to the servers where the
data resided.
• Operating systems require authentication of the
identity of computer users.
• Implement security models that enforce security
measures.
• DBA should manage databases and implement security
policies to protect the data (assets).
Information Systems
✓ In today’s global market , corporate companies all
over the world to gain a portion of market share.
✓ People Consists of :
Domain Experts
Knowledge Engineers
Power Users
Information Systems …
Components of Information System
Purpose of DBMS
DBMS Architecture
Information security
• Information is one of an organization’s
most valuable assets
• Information security: consists of procedures
and measures taken to protect information
systems components
• NSTISSC - National Security
Telecommunications & Information Systems
Security Committee - information
• C.I.A. triangle: Confidentiality, Integrity,
Availability
• Security policies must be balanced according
to the C.I.A. triangle
Information Security Architecture …
CIA Triangle
Confidentiality Integrity
Information is classified Information is accurate and
into different levels of protected from tampering by
confidentiality to ensure unauthorised persons
that only authorised users Information is consistent and
access the information validated
Availability
Information is available all the times only
for authorised and authenticated persons
System is protected from being shutdown
due to external or internal threats or
attacks
Information security : Confidentiality
Logical
and
Physical Assets
Information Security Architecture …
Outlines the Components of Information Security Architecture
✓ Policies and Procedures
- Documented procedures and company policies that
elaborate on how security is to be carried out
✓ Security personnel and Administrators
- People who enforce and keep security in order
✓ Detection equipment
- Devices that authenticate employees and Detect equipment that is
prohibited by the company
✓ Security Programs
- Tools that protect computer systems’ server
✓ Monitoring Equipment
- Devices that monitor physical properties , employees and other
important assets
✓ Monitoring Applications
- Utilities and applications used to monitor network traffic and Internet
activities
✓ Auditing Procedures and Tools
- Checks and Controls put in place to ensure that security measures are
working
Database Security
✓ One of the functions of DBMS is to empower DBA to implement and
enforce security at all levels of security
✓ A security access point is a place where database security must be
protected and applied
✓ The Major Security access points illustrated in the below figure
✓ Network – One of the most sensitive security access points. Protect the
network and provide network access only to applications,
operating systems and databases.
✓ Data – The data access point deals with data design needed to enforce data
integrity
Database Security Access Points
✓ Vulnerabilities are kinks in the system that must be watched because they can
become threats.
✓ In the world of information security , a threat is defined as a security risk that has
high possibility of becoming a system breach.
Database Security Levels
Database
Component Security Methods
Protected
People ✓ Physical limits on access to hardware and documents
✓ Through the process of identification and authentication
make certain that the individual is who is claim s to be
through the use of devices, such as ID cards, eye scans, and
passwords
✓ Training courses on the importance of security and how to
guard assets
✓ Establishment of security policies and procedures
Applications ✓ Authentication of users who access applications
✓ Business rules
✓ Single sign-on ( A method for signing on once for different
applications and web sites)
Network ✓ Firewalls to block network intruders
✓ Virtual Private Network (VPN)
✓ Authentication
Database Security Methods …
✓ Windows by Microsoft
✓ Macintosh by Apple
The OS Security Environment
✓ A compromised OS can
compromise a Database
Environment
✓ Model :
▪ Bank Building – OS
▪ Safe – DB
▪ Money - Data
The Components of an OS Security Environment
✓ File Permission
✓ File Transfer
✓ File Sharing
Files …
File Permission
• Every OS has a method of implementing file permission to grant read, write or
execute privileges to different users.
• The following figure gives how the file permissions are assigned to a user in
windows
Files …
✓ In UNIX, file permissions work differently than windows.
✓ For each file there are three permission settings
✓ Each setting consists of rwx ( r – read, w – write and x – execute)
1. First rwx is Owner of the file
2. Second rwx is Group to which owner belongs
3. Third rwx is All other users
✓ The given images gives the details of UNIX file permission.
Files …
✓ File Transfer – moving the file from one location to another location in a
disk/web/cloud
✓ FTP is an Internet service that allows transferring files from one computer to
another
✓ FTP clients and servers transmit usernames and passwords in plaintext
format( Not Encrypted). This means any hacker can sniff network traffic and
be able to get the logon information easily.
✓ Files also transferred as plaintext format
✓ A root account cannot be used to transfer file using FTP
✓ Anonymous FTP is the ability to log on to the FTP server without being
authenticated.
✓ This method is usually used to provide access to files in the public domain.
Files …
✓ Here are some best practices for transferring files
✓ Never use the normal FTP Utility. Instead, use the secure FTP utility , if
possible.
✓ Make two FTP directories: one for file uploads with write permission
only and another one file is for file downloads with read permission.
✓ Use specific accounts for FTP that do not have access to any files or
directories outside the file UPLOAD and DOWNLOAD directories.
✓ Turn on logging , and scan the FTP logs for unusual activities on a
regular basis.
✓ There are many badly written programs and utilities that could change
the content of memory
✓ Digital Card
▪ Also known as security card or smart card
▪ Similar to credit card in dimensions but instead of magnetic strip
▪ It has an electronic circuit that stores the user identification information
✓ Kerberos
▪ Developed by Massachusetts Institute of Technology (MIT) , USA
▪ It is to enable two parties to exchange information over an open network by assigning a
unique key. Called ticket , to each user.
▪ The ticket is used to encrypt communicated messages
Digital Authentication used by many OS …
✓ Lightweight Directory Access Protocol (LDAP)
▪ Developed by University of Michigan, USA
▪ Uses centralized directory database storing information about people,
offices and machines in a hierarchical manner
▪ LDAP directory can be easily distributed to many network servers.
▪ You can use LADP to store information about
• Users (User name and User id)
• Passwords
• Internal telephone directory
• Security keys
▪ Use LADP for these following reasons
• LDAP can be used across all platforms ( OS independent )
• Easy to maintain
• Can be employed for multiple purposes
▪ LDAP architecture is Client / Server based
Digital Authentication used by many OS …
✓ E-mail may be the tool most frequently used by hackers to exploit viruses, worms,
✓ E-mail was the medium used in many of the most famous worm and virus attacks
✓ For example :
▪ Love Bug Worm
▪ I LOVE YOU worm
▪ Mydoom worm
▪ Melissa virus
✓ E-mail is not only to used to send viruses and worms, nut to send spam e-mail, private and
2) Charu C. Aggarwal, Philip S Yu, “Privacy Preserving Data Mining”: Models and
Algorithms, Kluwer Academic Publishers, 2008
3) Ron Ben Natan, ”Implementing Database Security and Auditing”, Elsevier Digital
Press, 2005.