SlideShare une entreprise Scribd logo
1  sur  24
Presentation
on
Database Security
Submitted to:Charmi Purohit
Prepared By: Kumbhani Minaxi
Limbasiya Jignasha
Minaxi & Jignasha 1/24
Database Security
Index
 Definition
 Data security Lifecycle
 Countermeasures
- Authorization
- Views
- Backup And Recovery
- Integrity
- Encryption
- RAID Technology
Minaxi & Jignasha 2/24
Database Security
What is Database Security?
 Database Security is the mechanism that protect the
database against intentional or accidental threats.
 Security policy describes the security measures
enforced.
 Security mechanisms of the underlying DBMS must
be utilized to enforce the policy.
Minaxi & Jignasha 3/24
Database Security
Requirements
Security curriculum is relatively light in database
systems area
Focus currently on protecting information through
network configuration, systems administration,
application security
Need to specifically consider database system security
issues
Minaxi & Jignasha 4/24
Database Security
Goals
Understand security issues in:
a general database system environment
a specific DBMS (Oracle) environment
Consider database security issues in context of general
security principles and ideas
Consider issues relating to both database storage and
database system communication with other
applications
Minaxi & Jignasha 5/24
Database Security
Main Message
 Database system security is more than securing the
database
• Secure database
• Secure DBMS
• Secure applications/application development
• Secure operating system in relation to database
system
• Secure web server in relation to database system
• Secure network environment in relation to
database system
Minaxi & Jignasha 6/24
Database Security
Purpose
 We consider database security in relation to the
following situations:
- Theft and Fraud
- Loss of confidentiality
- Loss of privacy
- Loss of integrity
- Loss of availability
Minaxi & Jignasha 7/24
Database Security
Data Security Lifecycle
Minaxi & Jignasha 8/24
Database Security
Threat
 Threat is any intentional or accidental event that
may adversely affect the system.
 Examples of threats:
- Using another person’s log-in name to
access data
- Unauthorized copying data
- Program/Data alteration
- Illegal entry by hacker
- Viruses
Minaxi & Jignasha 9/24
Database Security
Countermeasures
 A Countermeasures is an action that you take on
order to weaken the effect of another action, a
situation, or to make it harmless.
 Because the threat never developed, We didn’t need
to take any real countermeasures.
Minaxi & Jignasha 10/24
Database Security
Countermeasures
 Computer-Based Controls:
- Authorization
- Authenticating
- Views
- Backup and Recovery
- Integrity
- Encryption
- Privileges,Roles,GrantRevoke
- RAID Technology
Minaxi & Jignasha 11/24
Database Security
Authorization
 The granting of a privilege that enable a user to have
a legitimate access to a system.
 They are sometimes referred as access controls.
 The process of authorization involves authenticating
the user requesting access to objects.
Minaxi & Jignasha 12/24
Database Security
Authenticating
 Means a mechanism that determines whether a user
is who he/she claim to be.
 A system administrator is responsible for allowing
users to have access to the system by creating
individual user accounts.
Minaxi & Jignasha 13/24
Database Security
 Four Authenticating Users to the Database:
1)Introduction to User Authentication
2)password for Authentication
3)Strong Authentication
4)Proxy Authentication and Authorization
Minaxi & Jignasha 14/24
Database Security
Views
 A view is virtual relation that does not actually exit in
the database, but is produced upon request by a
particular user, at the time of request.
 The view mechanism provides a powerful and
flexible security mechanism by hiding parts of the
database from certain users.
 The user is not aware of the existence of any
attributes or rows that are missing from the view.
Minaxi & Jignasha 15/24
Database Security
Backup and Recovery
 DBMS should provide backup facilities to assist with
the recovery of a database failure.
 backup and recovery refers to the various strategies
and procedures involved in protecting your database
against data loss and reconstructing the database
after any kind of data loss.
Minaxi & Jignasha 16/24
Database Security
 Backups can be divided into physical backups and
logical backups.
 Backup have two distinct purpose:
1)Primary purpose is to recover data After it’s loss,
be it by data deletion or corruption.
2)Secondary purpose of backup is to recover data
from an earlier time.
Minaxi & Jignasha 17/24
Database Security
Integrity
 Data integrity is a fundamental component of
information security.
 Maintaining a secure database system by preventing
data from becoming invalid.
 Only authorized users should be allowed to modify
data.
 Numeric columns should not accept alphabetic data.
 For example, students
Minaxi & Jignasha 18/24
Database Security
Encryption
 The encoding of data by a special algorithm that
renders the data unreadable by any program without
the decryption key.
 It also protects the data transmitted over
communication lines.
Plain-Data Encrypted
Data
Algorithm and
Password
Minaxi & Jignasha 19/24
Database Security
privilege
 A privilege allows a user to access some data object
in a certain manner (e.g., to read or to modify).
 SQL-92 supports access control through GRANT and
REVOKE commands.
 GRANT command: Give users privileges to base
tables and views.
 REVOKE command: intended to achieve the reverse,
to withdraw the granted privilege from the user.
Minaxi & Jignasha 20/24
Database Security
Grant and Revoke
Black
Brown (owner)
Red
White
GRANT SELECT ON
Employee
TO Red
GRANT SELECT ON Employee
TO Black
WITH GRANT OPTION
?
Brown revokes
grant
given to Black
?
Brown does not want
Red to access the
Employee relationGRANT UPDATE(Salary) ON
Employee TO White
Minaxi & Jignasha 21/24
Database Security
RAID Technology
 Redundant Array of Independent Disks
 The DBMS is running on must be fault-tolerant,
meaning that the DBMS should continue to operate
even if one of the hardware components fails.
One solution is the use of RAID technology.
 RAID works on having a large disk array comprising
an arrangement of several independent disks that are
organized to improve reliability and at the same time
increase performance.
Minaxi & Jignasha 22/24
Database Security
References
 http://www.wikipedia.com
 http://www.techonNet.com
 http://www.About.com/Databases
Minaxi & Jignasha 23/24
Database Security
Database Security Presentation

Contenu connexe

Tendances

Information security and Attacks
Information security and AttacksInformation security and Attacks
Information security and AttacksSachin Darekar
 
Database Security Management
Database Security Management Database Security Management
Database Security Management Ahsin Yousaf
 
Database Security, Threats & Countermeasures.pptx
Database Security, Threats & Countermeasures.pptxDatabase Security, Threats & Countermeasures.pptx
Database Security, Threats & Countermeasures.pptxSaqibAhmedKhan4
 
The CIA triad.pptx
The CIA triad.pptxThe CIA triad.pptx
The CIA triad.pptxGulnurAzat
 
Data security and Integrity
Data security and IntegrityData security and Integrity
Data security and IntegrityZaid Shabbir
 
Security of the database
Security of the databaseSecurity of the database
Security of the databasePratik Tamgadge
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture NotesFellowBuddy.com
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security conceptsG Prachi
 
Database Systems Security
Database Systems SecurityDatabase Systems Security
Database Systems Securityamiable_indian
 
Database Security & Encryption
Database Security & EncryptionDatabase Security & Encryption
Database Security & EncryptionTech Sanhita
 
Object Oriented Database Management System
Object Oriented Database Management SystemObject Oriented Database Management System
Object Oriented Database Management SystemAjay Jha
 
Cia security model
Cia security modelCia security model
Cia security modelImran Ahmed
 
2 database system concepts and architecture
2 database system concepts and architecture2 database system concepts and architecture
2 database system concepts and architectureKumar
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information SecurityDr. Loganathan R
 
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIAInformation Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIADheeraj Kataria
 

Tendances (20)

DB security
 DB security DB security
DB security
 
Information security and Attacks
Information security and AttacksInformation security and Attacks
Information security and Attacks
 
Database Security Management
Database Security Management Database Security Management
Database Security Management
 
Database Security, Threats & Countermeasures.pptx
Database Security, Threats & Countermeasures.pptxDatabase Security, Threats & Countermeasures.pptx
Database Security, Threats & Countermeasures.pptx
 
The CIA triad.pptx
The CIA triad.pptxThe CIA triad.pptx
The CIA triad.pptx
 
Data security and Integrity
Data security and IntegrityData security and Integrity
Data security and Integrity
 
Database security
Database securityDatabase security
Database security
 
Security of the database
Security of the databaseSecurity of the database
Security of the database
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Database Systems Security
Database Systems SecurityDatabase Systems Security
Database Systems Security
 
Elmasri Navathe DBMS Unit-1 ppt
Elmasri Navathe DBMS Unit-1 pptElmasri Navathe DBMS Unit-1 ppt
Elmasri Navathe DBMS Unit-1 ppt
 
Database Security & Encryption
Database Security & EncryptionDatabase Security & Encryption
Database Security & Encryption
 
Object Oriented Database Management System
Object Oriented Database Management SystemObject Oriented Database Management System
Object Oriented Database Management System
 
DBMS Bascis
DBMS BascisDBMS Bascis
DBMS Bascis
 
Cia security model
Cia security modelCia security model
Cia security model
 
2 database system concepts and architecture
2 database system concepts and architecture2 database system concepts and architecture
2 database system concepts and architecture
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIAInformation Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
 
Database security
Database security Database security
Database security
 

Similaire à Database Security Presentation

Dbms ii mca-ch12-security-2013
Dbms ii mca-ch12-security-2013Dbms ii mca-ch12-security-2013
Dbms ii mca-ch12-security-2013Prosanta Ghosh
 
Adbms 46 security and integrity of databases
Adbms 46 security and integrity of databasesAdbms 46 security and integrity of databases
Adbms 46 security and integrity of databasesVaibhav Khanna
 
Chapter 5 database security
Chapter 5   database securityChapter 5   database security
Chapter 5 database securitySyaiful Ahdan
 
Data base security & integrity
Data base security &  integrityData base security &  integrity
Data base security & integrityPooja Dixit
 
Information Security Management. Security solutions copy
Information Security Management. Security solutions copyInformation Security Management. Security solutions copy
Information Security Management. Security solutions copyyuliana_mar
 
databasesecurit-phpapp01.pdf
databasesecurit-phpapp01.pdfdatabasesecurit-phpapp01.pdf
databasesecurit-phpapp01.pdfAnSHiKa187943
 
Database security in database management.pptx
Database security in database management.pptxDatabase security in database management.pptx
Database security in database management.pptxFarhanaMariyam1
 
database-security-access-control-models-a-brief-overview-IJERTV2IS50406.pdf
database-security-access-control-models-a-brief-overview-IJERTV2IS50406.pdfdatabase-security-access-control-models-a-brief-overview-IJERTV2IS50406.pdf
database-security-access-control-models-a-brief-overview-IJERTV2IS50406.pdfDr Amit Phadikar
 
Solvit identity is the new perimeter
Solvit   identity is the new perimeterSolvit   identity is the new perimeter
Solvit identity is the new perimeterS.E. CTS CERT-GOV-MD
 
Locking Down Your Data: Best Practices for Database Security
Locking Down Your Data: Best Practices for Database SecurityLocking Down Your Data: Best Practices for Database Security
Locking Down Your Data: Best Practices for Database SecurityFredReynolds2
 
The Federal Information Security Management Act
The Federal Information Security Management ActThe Federal Information Security Management Act
The Federal Information Security Management ActMichelle Singh
 
Database security and privacy
Database security and privacyDatabase security and privacy
Database security and privacyMd. Ahasan Hasib
 
Remote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal ThingRemote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal ThingKaren Oliver
 
Webinar: Best Practices for Securing and Protecting MongoDB Data
Webinar: Best Practices for Securing and Protecting MongoDB DataWebinar: Best Practices for Securing and Protecting MongoDB Data
Webinar: Best Practices for Securing and Protecting MongoDB DataMongoDB
 
Data base security
Data base securityData base security
Data base securitySara Nazir
 

Similaire à Database Security Presentation (20)

Dbms ii mca-ch12-security-2013
Dbms ii mca-ch12-security-2013Dbms ii mca-ch12-security-2013
Dbms ii mca-ch12-security-2013
 
Adbms 46 security and integrity of databases
Adbms 46 security and integrity of databasesAdbms 46 security and integrity of databases
Adbms 46 security and integrity of databases
 
Chapter 5 database security
Chapter 5   database securityChapter 5   database security
Chapter 5 database security
 
Data base security & integrity
Data base security &  integrityData base security &  integrity
Data base security & integrity
 
Information Security Management. Security solutions copy
Information Security Management. Security solutions copyInformation Security Management. Security solutions copy
Information Security Management. Security solutions copy
 
databasesecurit-phpapp01.pdf
databasesecurit-phpapp01.pdfdatabasesecurit-phpapp01.pdf
databasesecurit-phpapp01.pdf
 
uu (2).pdf
uu (2).pdfuu (2).pdf
uu (2).pdf
 
ELNA6eCh24.ppt
ELNA6eCh24.pptELNA6eCh24.ppt
ELNA6eCh24.ppt
 
Dstca
DstcaDstca
Dstca
 
Database security in database management.pptx
Database security in database management.pptxDatabase security in database management.pptx
Database security in database management.pptx
 
database-security-access-control-models-a-brief-overview-IJERTV2IS50406.pdf
database-security-access-control-models-a-brief-overview-IJERTV2IS50406.pdfdatabase-security-access-control-models-a-brief-overview-IJERTV2IS50406.pdf
database-security-access-control-models-a-brief-overview-IJERTV2IS50406.pdf
 
Solvit identity is the new perimeter
Solvit   identity is the new perimeterSolvit   identity is the new perimeter
Solvit identity is the new perimeter
 
Locking Down Your Data: Best Practices for Database Security
Locking Down Your Data: Best Practices for Database SecurityLocking Down Your Data: Best Practices for Database Security
Locking Down Your Data: Best Practices for Database Security
 
The Federal Information Security Management Act
The Federal Information Security Management ActThe Federal Information Security Management Act
The Federal Information Security Management Act
 
En ch23
En ch23En ch23
En ch23
 
Database security and privacy
Database security and privacyDatabase security and privacy
Database security and privacy
 
Remote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal ThingRemote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal Thing
 
Webinar: Best Practices for Securing and Protecting MongoDB Data
Webinar: Best Practices for Securing and Protecting MongoDB DataWebinar: Best Practices for Securing and Protecting MongoDB Data
Webinar: Best Practices for Securing and Protecting MongoDB Data
 
Chap05
Chap05Chap05
Chap05
 
Data base security
Data base securityData base security
Data base security
 

Dernier

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 

Dernier (20)

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 

Database Security Presentation

  • 1. Presentation on Database Security Submitted to:Charmi Purohit Prepared By: Kumbhani Minaxi Limbasiya Jignasha Minaxi & Jignasha 1/24 Database Security
  • 2. Index  Definition  Data security Lifecycle  Countermeasures - Authorization - Views - Backup And Recovery - Integrity - Encryption - RAID Technology Minaxi & Jignasha 2/24 Database Security
  • 3. What is Database Security?  Database Security is the mechanism that protect the database against intentional or accidental threats.  Security policy describes the security measures enforced.  Security mechanisms of the underlying DBMS must be utilized to enforce the policy. Minaxi & Jignasha 3/24 Database Security
  • 4. Requirements Security curriculum is relatively light in database systems area Focus currently on protecting information through network configuration, systems administration, application security Need to specifically consider database system security issues Minaxi & Jignasha 4/24 Database Security
  • 5. Goals Understand security issues in: a general database system environment a specific DBMS (Oracle) environment Consider database security issues in context of general security principles and ideas Consider issues relating to both database storage and database system communication with other applications Minaxi & Jignasha 5/24 Database Security
  • 6. Main Message  Database system security is more than securing the database • Secure database • Secure DBMS • Secure applications/application development • Secure operating system in relation to database system • Secure web server in relation to database system • Secure network environment in relation to database system Minaxi & Jignasha 6/24 Database Security
  • 7. Purpose  We consider database security in relation to the following situations: - Theft and Fraud - Loss of confidentiality - Loss of privacy - Loss of integrity - Loss of availability Minaxi & Jignasha 7/24 Database Security
  • 8. Data Security Lifecycle Minaxi & Jignasha 8/24 Database Security
  • 9. Threat  Threat is any intentional or accidental event that may adversely affect the system.  Examples of threats: - Using another person’s log-in name to access data - Unauthorized copying data - Program/Data alteration - Illegal entry by hacker - Viruses Minaxi & Jignasha 9/24 Database Security
  • 10. Countermeasures  A Countermeasures is an action that you take on order to weaken the effect of another action, a situation, or to make it harmless.  Because the threat never developed, We didn’t need to take any real countermeasures. Minaxi & Jignasha 10/24 Database Security
  • 11. Countermeasures  Computer-Based Controls: - Authorization - Authenticating - Views - Backup and Recovery - Integrity - Encryption - Privileges,Roles,GrantRevoke - RAID Technology Minaxi & Jignasha 11/24 Database Security
  • 12. Authorization  The granting of a privilege that enable a user to have a legitimate access to a system.  They are sometimes referred as access controls.  The process of authorization involves authenticating the user requesting access to objects. Minaxi & Jignasha 12/24 Database Security
  • 13. Authenticating  Means a mechanism that determines whether a user is who he/she claim to be.  A system administrator is responsible for allowing users to have access to the system by creating individual user accounts. Minaxi & Jignasha 13/24 Database Security
  • 14.  Four Authenticating Users to the Database: 1)Introduction to User Authentication 2)password for Authentication 3)Strong Authentication 4)Proxy Authentication and Authorization Minaxi & Jignasha 14/24 Database Security
  • 15. Views  A view is virtual relation that does not actually exit in the database, but is produced upon request by a particular user, at the time of request.  The view mechanism provides a powerful and flexible security mechanism by hiding parts of the database from certain users.  The user is not aware of the existence of any attributes or rows that are missing from the view. Minaxi & Jignasha 15/24 Database Security
  • 16. Backup and Recovery  DBMS should provide backup facilities to assist with the recovery of a database failure.  backup and recovery refers to the various strategies and procedures involved in protecting your database against data loss and reconstructing the database after any kind of data loss. Minaxi & Jignasha 16/24 Database Security
  • 17.  Backups can be divided into physical backups and logical backups.  Backup have two distinct purpose: 1)Primary purpose is to recover data After it’s loss, be it by data deletion or corruption. 2)Secondary purpose of backup is to recover data from an earlier time. Minaxi & Jignasha 17/24 Database Security
  • 18. Integrity  Data integrity is a fundamental component of information security.  Maintaining a secure database system by preventing data from becoming invalid.  Only authorized users should be allowed to modify data.  Numeric columns should not accept alphabetic data.  For example, students Minaxi & Jignasha 18/24 Database Security
  • 19. Encryption  The encoding of data by a special algorithm that renders the data unreadable by any program without the decryption key.  It also protects the data transmitted over communication lines. Plain-Data Encrypted Data Algorithm and Password Minaxi & Jignasha 19/24 Database Security
  • 20. privilege  A privilege allows a user to access some data object in a certain manner (e.g., to read or to modify).  SQL-92 supports access control through GRANT and REVOKE commands.  GRANT command: Give users privileges to base tables and views.  REVOKE command: intended to achieve the reverse, to withdraw the granted privilege from the user. Minaxi & Jignasha 20/24 Database Security
  • 21. Grant and Revoke Black Brown (owner) Red White GRANT SELECT ON Employee TO Red GRANT SELECT ON Employee TO Black WITH GRANT OPTION ? Brown revokes grant given to Black ? Brown does not want Red to access the Employee relationGRANT UPDATE(Salary) ON Employee TO White Minaxi & Jignasha 21/24 Database Security
  • 22. RAID Technology  Redundant Array of Independent Disks  The DBMS is running on must be fault-tolerant, meaning that the DBMS should continue to operate even if one of the hardware components fails. One solution is the use of RAID technology.  RAID works on having a large disk array comprising an arrangement of several independent disks that are organized to improve reliability and at the same time increase performance. Minaxi & Jignasha 22/24 Database Security
  • 23. References  http://www.wikipedia.com  http://www.techonNet.com  http://www.About.com/Databases Minaxi & Jignasha 23/24 Database Security