SlideShare a Scribd company logo
1 of 32
DATABASE SECURITY
Database
the heart of each information system
a persistent collection of related data,
where data are facts that have an implicit
meaning.
built to store logically interrelated data
representing some aspects of the real
world, which must be collected, processed,
and made accessible to a given user
population.
Database Concepts
• The database is constructed according
to a data model which define the way in
which data and interrelationships
between them can be represented.
Data
Models
• The collection of software programs that
provide the functionalities for defining,
maintaining, and accessing data stored
in a database is called a database
management system (DBMS).
DBMS
Database abstraction levels
Internal level
• describing
the physical
storage of the
database
Conceptual (or
logical level )
• providing the
users with a
high level
description of
the real world
that the
database
represents
External level
• describing
the views that
different
users or
applications
have on the
stored data.
The internal level maps the logical
objects supported by the data model to
the physical objects of the underlying
operating system
Data Security
• Concerned with
improper disclosure
of information. The
terms secrecy or non-
disclosure are
synonyms for
confidentiality.
Confidentiality
• Concerned with
improper modification
of information or
processes.
Integrity
• Concerned with
improper denial of
access to information.
The term denial of
service is also used
as a synonym for
availability.
Availability
Top Ten Database Security Threats
• When someone is granted database privileges that
exceed the requirements of their job function, these
privileges can be abused.
Excessive and Unused Privileges
• Users may abuse legitimate database privileges for
unauthorized purposes.
Privilege Abuse
• Injection attacks usually involve inserting (or
“injecting”) unauthorized or malicious statements into
the input fields of web applications that gives an
attacker unrestricted access to an entire database.
Input Injection (Formerly SQL Injection)
• Cybercriminals, state-sponsored hackers, and spies use
advanced attacks that blend multiple tactics—such as
spear phishing emails and malware—to penetrate
organizations and steal sensitive data.
Malware
• Automated recording of database transactions involving
sensitive data should be part of any database deployment.
Failure to collect detailed audit records of database activity
represents a serious organizational risk on many levels.
Weak Audit Trail
• Backup storage media is often completely unprotected from
attack.
Storage Media Exposure
• It is common to find vulnerable and un-patched databases, or
discover databases that still have default accounts and
configuration parameters.
Exploitation of Vulnerable, Misconfigured
Databases
• Many companies struggle to maintain an accurate inventory of
their databases and the critical data objects contained within them.
Unmanaged Sensitive Data
• Denial of Service (DoS) is a general attack category in which
access to network applications or data is denied to intended users.
Denial of Service
• Many organizations are ill-equipped to deal with a security breach
due to the lack of expertise required to implement security
controls, enforce policies, or conduct incident response processes.
Limited Security Expertise and Education
Approaches to Data Security
Prevention
• Prevention ensures that security breaches cannot
occur. The basic technique is that the system
examines every action and checks its conformance
with the security policy before allowing it to occur.
• This technique is called access control.
Detection
• Detection ensures that sufficient history of the
activity in the system is recorded in an audit trail, so
that a security breach can be detected after the fact.
• This technique is called auditing.
ACCESS CONTROL
Access Control Policies
Discretionary
Access
Control (DAC)
Mandatory
Access
Control
(MAC)
Role-Based
Access
Control
(RBAC)
Discretionary Access Control
• The word discretionary characterizes the fact that users
can be given the ability of passing their privileges to
others.
• Discretionary access control policies are based on
authorizations rules.
• An authorization rule states that a subject has the privilege to
exercise a given action on a given object.
• The kind (and granularity) of subjects, objects, and
actions that can be referenced in authorizations may be
different in different systems.
Discretionary access control policies
Subjects
Subjects are the entities
to which authorizations
can be granted.
Typically, subjects are
users.
Objects
Objects are the entities
to be protected.
Typically, objects
correspond to
information container
(tables or portion of it) or
procedures.
Actions
Actions define the
specific operations that
subjects can execute on
objects.
Actions to be supported
include the operations
corresponding to the
basic read, write, delete,
create, and execute
Authorizations
• Authorizations define which accesses are
to be allowed.
• The simplest form of authorization is a triple
(subject, object, action) specifying that
subject is authorized to exercise action on
object.
• Example
• subject object access
• Joe Black Employee-relation read
Granularity and Modes of Access Control
The entire
database.
Some
collection of
relations.
One relation.
Some
columns of
one relation.
Some rows
of one
relation.
DAC modes in SQL operations
The ability to INSERT and
DELETE is specified on a
relation by relation basis.
SELECT is also usually
specified on a relation by
relation basis.
UPDATE can be restricted
to certain columns of a
relation.
Access Control Mechanisms
Security
through
Views
Grant and
Revoke
Stored
Procedures
Query
modification
SECURITY THROUGH
VIEWS
View Based Access Control
• A base relation is a “real" relation in the
database, that is actually stored in the
Database.
• A view is a “virtual" relation which is derived
from base relations and other views.
• For retrieval purposes users need not
distinguish between views and base
relations.
• Views, therefore, provide a very powerful
mechanism for specifying data-dependent
authorization for data retrieval.
A user who has read access
to TOY-DEPT is thereby
limited to retrieving
information about employees
in the Toy Department.
Suppose that a new
employee
Brown is inserted in
base relation
EMPLOYEE, as shown
in Table 3. The view
TOY-DEPT will be
automatically modified to
include Brown, as
shown in Table 4.
Views can also be used to provide access to statistical information.
A view is simply another relation in the database,
which happens to be automatically
modified by the DBMS whenever its base relations are modified.
Problem:
Difficult to maintain updates.
GRANTING AND
REVOCATION OF ACCESS
Grant
• Granting and revocation allow users to selectively and
dynamically grant privileges to other users, and
subsequently revoke them if so desired.
• The GRANT command applies to base relations as well
as views.
• In SQL granting is accomplished by means of the GRANT
statement which has the following general format.
Some examples of GRANT statements
Note that it is not possible to
grant a user the grant option on
a privilege, without
allowing the grant option itself to
be further granted.
Revoke
• Revocation in SQL is accomplished by means of the
REVOKE statement which has the following general
format.
• Examples:
STORED PROCEDURES
Assign rights to execute compiled programs
GRANT RUN ON <program> TO <user>
Problem:
Programs may access resources for which the user who runs the program
does not have permission.
QUERY MODIFICATION
• It is not supported in SQL
• In this technique, a query submitted by a user is
modified to include further restrictions as determined
by the user's authorization.

More Related Content

What's hot

Database security and security in networks
Database security and security in networksDatabase security and security in networks
Database security and security in networksG Prachi
 
Database security
Database securityDatabase security
Database securityCAS
 
Data base security & integrity
Data base security &  integrityData base security &  integrity
Data base security & integrityPooja Dixit
 
Chapter 5 database security
Chapter 5   database securityChapter 5   database security
Chapter 5 database securitySyaiful Ahdan
 
Database Security And Authentication
Database Security And AuthenticationDatabase Security And Authentication
Database Security And AuthenticationSudeb Das
 
Distributed database security with discretionary access control
Distributed database security with discretionary access controlDistributed database security with discretionary access control
Distributed database security with discretionary access controlJyotishkar Dey
 
Data base security
Data base securityData base security
Data base securitySara Nazir
 
Security and Integrity of Data
Security and Integrity of DataSecurity and Integrity of Data
Security and Integrity of DataAdeel Riaz
 
Database security and privacy
Database security and privacyDatabase security and privacy
Database security and privacyMd. Ahasan Hasib
 
Distributed database security with discretionary access control
Distributed database security with discretionary access controlDistributed database security with discretionary access control
Distributed database security with discretionary access controlJyotishkar Dey
 
Data security and Integrity
Data security and IntegrityData security and Integrity
Data security and IntegrityZaid Shabbir
 
Database Systems Security
Database Systems SecurityDatabase Systems Security
Database Systems Securityamiable_indian
 

What's hot (20)

DB security
 DB security DB security
DB security
 
Database security
Database securityDatabase security
Database security
 
Database security and security in networks
Database security and security in networksDatabase security and security in networks
Database security and security in networks
 
Database security
Database securityDatabase security
Database security
 
Data base security & integrity
Data base security &  integrityData base security &  integrity
Data base security & integrity
 
Chapter 5 database security
Chapter 5   database securityChapter 5   database security
Chapter 5 database security
 
DBMS SECURITY
DBMS SECURITYDBMS SECURITY
DBMS SECURITY
 
Database security issues
Database security issuesDatabase security issues
Database security issues
 
Database security
Database securityDatabase security
Database security
 
Database Security And Authentication
Database Security And AuthenticationDatabase Security And Authentication
Database Security And Authentication
 
Distributed database security with discretionary access control
Distributed database security with discretionary access controlDistributed database security with discretionary access control
Distributed database security with discretionary access control
 
Data base security
Data base securityData base security
Data base security
 
Security and Integrity of Data
Security and Integrity of DataSecurity and Integrity of Data
Security and Integrity of Data
 
Database security and privacy
Database security and privacyDatabase security and privacy
Database security and privacy
 
Database Security
Database SecurityDatabase Security
Database Security
 
Distributed database security with discretionary access control
Distributed database security with discretionary access controlDistributed database security with discretionary access control
Distributed database security with discretionary access control
 
Data security and Integrity
Data security and IntegrityData security and Integrity
Data security and Integrity
 
Database Systems Security
Database Systems SecurityDatabase Systems Security
Database Systems Security
 
Database security
Database securityDatabase security
Database security
 
Database modeling and security
Database modeling and securityDatabase modeling and security
Database modeling and security
 

Similar to 01 database security ent-db

IT 650 Principles of Database DesignProject Milestone – 5.docx
IT 650 Principles of Database DesignProject Milestone – 5.docxIT 650 Principles of Database DesignProject Milestone – 5.docx
IT 650 Principles of Database DesignProject Milestone – 5.docxpriestmanmable
 
Unit 2 rdbms study_material
Unit 2  rdbms study_materialUnit 2  rdbms study_material
Unit 2 rdbms study_materialgayaramesh
 
CST204 DBMSMODULE1 PPT (1).pptx
CST204 DBMSMODULE1 PPT (1).pptxCST204 DBMSMODULE1 PPT (1).pptx
CST204 DBMSMODULE1 PPT (1).pptxMEGHANA508383
 
MobileDBSecurity.pptx
MobileDBSecurity.pptxMobileDBSecurity.pptx
MobileDBSecurity.pptxmissionsk81
 
Bca examination 2016 dbms
Bca examination 2016 dbmsBca examination 2016 dbms
Bca examination 2016 dbmsAnjaan Gajendra
 
Security Issues Surrounding Data Manipulation in a Relational Database
Security Issues Surrounding Data Manipulation in a Relational DatabaseSecurity Issues Surrounding Data Manipulation in a Relational Database
Security Issues Surrounding Data Manipulation in a Relational DatabaseDavid Murphy
 
Security and Integrity violations, Authorisation and views, Integrity Constant
Security and Integrity violations, Authorisation and views, Integrity ConstantSecurity and Integrity violations, Authorisation and views, Integrity Constant
Security and Integrity violations, Authorisation and views, Integrity ConstantPrakash Kumar
 
Database management system lecture notes
Database management system lecture notesDatabase management system lecture notes
Database management system lecture notesUTSAHSINGH2
 
Cp 121 lecture 01
Cp 121 lecture 01Cp 121 lecture 01
Cp 121 lecture 01ITNet
 
Characteristics and Advantages of Database Management System
Characteristics and Advantages of Database Management SystemCharacteristics and Advantages of Database Management System
Characteristics and Advantages of Database Management SystemCharthaGaglani
 
DBMS-material for b.tech students to learn
DBMS-material for b.tech students to learnDBMS-material for b.tech students to learn
DBMS-material for b.tech students to learnRajasekhar364622
 
History Of Database Technology
History Of Database TechnologyHistory Of Database Technology
History Of Database TechnologyJacqueline Thomas
 
Unit 2 - Chapter 7 (Database Security).pptx
Unit 2 - Chapter 7 (Database Security).pptxUnit 2 - Chapter 7 (Database Security).pptx
Unit 2 - Chapter 7 (Database Security).pptxSakshiGawde6
 

Similar to 01 database security ent-db (20)

IT 650 Principles of Database DesignProject Milestone – 5.docx
IT 650 Principles of Database DesignProject Milestone – 5.docxIT 650 Principles of Database DesignProject Milestone – 5.docx
IT 650 Principles of Database DesignProject Milestone – 5.docx
 
Unit 1.pptx
Unit 1.pptxUnit 1.pptx
Unit 1.pptx
 
Unit 2 rdbms study_material
Unit 2  rdbms study_materialUnit 2  rdbms study_material
Unit 2 rdbms study_material
 
Lecture 1.pptx
Lecture 1.pptxLecture 1.pptx
Lecture 1.pptx
 
CST204 DBMSMODULE1 PPT (1).pptx
CST204 DBMSMODULE1 PPT (1).pptxCST204 DBMSMODULE1 PPT (1).pptx
CST204 DBMSMODULE1 PPT (1).pptx
 
MobileDBSecurity.pptx
MobileDBSecurity.pptxMobileDBSecurity.pptx
MobileDBSecurity.pptx
 
Data base Access Control a look at Fine grain Access method
Data base Access Control a look at Fine grain Access methodData base Access Control a look at Fine grain Access method
Data base Access Control a look at Fine grain Access method
 
MS-CIT Unit 9.pptx
MS-CIT Unit 9.pptxMS-CIT Unit 9.pptx
MS-CIT Unit 9.pptx
 
Bca examination 2016 dbms
Bca examination 2016 dbmsBca examination 2016 dbms
Bca examination 2016 dbms
 
Security Issues Surrounding Data Manipulation in a Relational Database
Security Issues Surrounding Data Manipulation in a Relational DatabaseSecurity Issues Surrounding Data Manipulation in a Relational Database
Security Issues Surrounding Data Manipulation in a Relational Database
 
Security and Integrity violations, Authorisation and views, Integrity Constant
Security and Integrity violations, Authorisation and views, Integrity ConstantSecurity and Integrity violations, Authorisation and views, Integrity Constant
Security and Integrity violations, Authorisation and views, Integrity Constant
 
Database management system lecture notes
Database management system lecture notesDatabase management system lecture notes
Database management system lecture notes
 
Database management systems
Database management systemsDatabase management systems
Database management systems
 
Cp 121 lecture 01
Cp 121 lecture 01Cp 121 lecture 01
Cp 121 lecture 01
 
Characteristics and Advantages of Database Management System
Characteristics and Advantages of Database Management SystemCharacteristics and Advantages of Database Management System
Characteristics and Advantages of Database Management System
 
DBMS-material for b.tech students to learn
DBMS-material for b.tech students to learnDBMS-material for b.tech students to learn
DBMS-material for b.tech students to learn
 
A1802030104
A1802030104A1802030104
A1802030104
 
History Of Database Technology
History Of Database TechnologyHistory Of Database Technology
History Of Database Technology
 
4_5949547032388570388.ppt
4_5949547032388570388.ppt4_5949547032388570388.ppt
4_5949547032388570388.ppt
 
Unit 2 - Chapter 7 (Database Security).pptx
Unit 2 - Chapter 7 (Database Security).pptxUnit 2 - Chapter 7 (Database Security).pptx
Unit 2 - Chapter 7 (Database Security).pptx
 

More from uncleRhyme

Performance appraisal
Performance appraisalPerformance appraisal
Performance appraisaluncleRhyme
 
Labor managementrelations
Labor managementrelationsLabor managementrelations
Labor managementrelationsuncleRhyme
 
Compensation and benefits
Compensation and benefitsCompensation and benefits
Compensation and benefitsuncleRhyme
 
Training and developing employees
Training and developing employeesTraining and developing employees
Training and developing employeesuncleRhyme
 
02 database oprimization - improving sql performance - ent-db
02  database oprimization - improving sql performance - ent-db02  database oprimization - improving sql performance - ent-db
02 database oprimization - improving sql performance - ent-dbuncleRhyme
 
networkmedia presentation1
networkmedia presentation1networkmedia presentation1
networkmedia presentation1uncleRhyme
 
Data warehouse architecture
Data warehouse architectureData warehouse architecture
Data warehouse architectureuncleRhyme
 
Ictinfraosi7 layers tcpipmodel2016e
Ictinfraosi7 layers tcpipmodel2016eIctinfraosi7 layers tcpipmodel2016e
Ictinfraosi7 layers tcpipmodel2016euncleRhyme
 
Introduction to data warehousing
Introduction to data warehousingIntroduction to data warehousing
Introduction to data warehousinguncleRhyme
 
Introduction to data warehousing
Introduction to data warehousingIntroduction to data warehousing
Introduction to data warehousinguncleRhyme
 
Ictinframodule1
Ictinframodule1Ictinframodule1
Ictinframodule1uncleRhyme
 
Revenue and profit
Revenue and profitRevenue and profit
Revenue and profituncleRhyme
 

More from uncleRhyme (16)

Performance appraisal
Performance appraisalPerformance appraisal
Performance appraisal
 
Labor managementrelations
Labor managementrelationsLabor managementrelations
Labor managementrelations
 
Compensation and benefits
Compensation and benefitsCompensation and benefits
Compensation and benefits
 
Training and developing employees
Training and developing employeesTraining and developing employees
Training and developing employees
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
02 database oprimization - improving sql performance - ent-db
02  database oprimization - improving sql performance - ent-db02  database oprimization - improving sql performance - ent-db
02 database oprimization - improving sql performance - ent-db
 
networkmedia presentation1
networkmedia presentation1networkmedia presentation1
networkmedia presentation1
 
Data warehouse architecture
Data warehouse architectureData warehouse architecture
Data warehouse architecture
 
Ictinfraosi7 layers tcpipmodel2016e
Ictinfraosi7 layers tcpipmodel2016eIctinfraosi7 layers tcpipmodel2016e
Ictinfraosi7 layers tcpipmodel2016e
 
Introduction to data warehousing
Introduction to data warehousingIntroduction to data warehousing
Introduction to data warehousing
 
Introduction to data warehousing
Introduction to data warehousingIntroduction to data warehousing
Introduction to data warehousing
 
Ictinframodule1
Ictinframodule1Ictinframodule1
Ictinframodule1
 
Revenue and profit
Revenue and profitRevenue and profit
Revenue and profit
 

Recently uploaded

ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxNikitaBankoti2
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIShubhangi Sonawane
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesShubhangi Sonawane
 

Recently uploaded (20)

ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 

01 database security ent-db

  • 2. Database the heart of each information system a persistent collection of related data, where data are facts that have an implicit meaning. built to store logically interrelated data representing some aspects of the real world, which must be collected, processed, and made accessible to a given user population.
  • 3. Database Concepts • The database is constructed according to a data model which define the way in which data and interrelationships between them can be represented. Data Models • The collection of software programs that provide the functionalities for defining, maintaining, and accessing data stored in a database is called a database management system (DBMS). DBMS
  • 4. Database abstraction levels Internal level • describing the physical storage of the database Conceptual (or logical level ) • providing the users with a high level description of the real world that the database represents External level • describing the views that different users or applications have on the stored data. The internal level maps the logical objects supported by the data model to the physical objects of the underlying operating system
  • 5. Data Security • Concerned with improper disclosure of information. The terms secrecy or non- disclosure are synonyms for confidentiality. Confidentiality • Concerned with improper modification of information or processes. Integrity • Concerned with improper denial of access to information. The term denial of service is also used as a synonym for availability. Availability
  • 6. Top Ten Database Security Threats
  • 7. • When someone is granted database privileges that exceed the requirements of their job function, these privileges can be abused. Excessive and Unused Privileges • Users may abuse legitimate database privileges for unauthorized purposes. Privilege Abuse • Injection attacks usually involve inserting (or “injecting”) unauthorized or malicious statements into the input fields of web applications that gives an attacker unrestricted access to an entire database. Input Injection (Formerly SQL Injection)
  • 8. • Cybercriminals, state-sponsored hackers, and spies use advanced attacks that blend multiple tactics—such as spear phishing emails and malware—to penetrate organizations and steal sensitive data. Malware • Automated recording of database transactions involving sensitive data should be part of any database deployment. Failure to collect detailed audit records of database activity represents a serious organizational risk on many levels. Weak Audit Trail • Backup storage media is often completely unprotected from attack. Storage Media Exposure
  • 9. • It is common to find vulnerable and un-patched databases, or discover databases that still have default accounts and configuration parameters. Exploitation of Vulnerable, Misconfigured Databases • Many companies struggle to maintain an accurate inventory of their databases and the critical data objects contained within them. Unmanaged Sensitive Data • Denial of Service (DoS) is a general attack category in which access to network applications or data is denied to intended users. Denial of Service • Many organizations are ill-equipped to deal with a security breach due to the lack of expertise required to implement security controls, enforce policies, or conduct incident response processes. Limited Security Expertise and Education
  • 10. Approaches to Data Security Prevention • Prevention ensures that security breaches cannot occur. The basic technique is that the system examines every action and checks its conformance with the security policy before allowing it to occur. • This technique is called access control. Detection • Detection ensures that sufficient history of the activity in the system is recorded in an audit trail, so that a security breach can be detected after the fact. • This technique is called auditing.
  • 12. Access Control Policies Discretionary Access Control (DAC) Mandatory Access Control (MAC) Role-Based Access Control (RBAC)
  • 13. Discretionary Access Control • The word discretionary characterizes the fact that users can be given the ability of passing their privileges to others. • Discretionary access control policies are based on authorizations rules. • An authorization rule states that a subject has the privilege to exercise a given action on a given object. • The kind (and granularity) of subjects, objects, and actions that can be referenced in authorizations may be different in different systems.
  • 14. Discretionary access control policies Subjects Subjects are the entities to which authorizations can be granted. Typically, subjects are users. Objects Objects are the entities to be protected. Typically, objects correspond to information container (tables or portion of it) or procedures. Actions Actions define the specific operations that subjects can execute on objects. Actions to be supported include the operations corresponding to the basic read, write, delete, create, and execute
  • 15. Authorizations • Authorizations define which accesses are to be allowed. • The simplest form of authorization is a triple (subject, object, action) specifying that subject is authorized to exercise action on object. • Example • subject object access • Joe Black Employee-relation read
  • 16. Granularity and Modes of Access Control The entire database. Some collection of relations. One relation. Some columns of one relation. Some rows of one relation.
  • 17. DAC modes in SQL operations The ability to INSERT and DELETE is specified on a relation by relation basis. SELECT is also usually specified on a relation by relation basis. UPDATE can be restricted to certain columns of a relation.
  • 18. Access Control Mechanisms Security through Views Grant and Revoke Stored Procedures Query modification
  • 20. View Based Access Control • A base relation is a “real" relation in the database, that is actually stored in the Database. • A view is a “virtual" relation which is derived from base relations and other views. • For retrieval purposes users need not distinguish between views and base relations. • Views, therefore, provide a very powerful mechanism for specifying data-dependent authorization for data retrieval.
  • 21. A user who has read access to TOY-DEPT is thereby limited to retrieving information about employees in the Toy Department.
  • 22. Suppose that a new employee Brown is inserted in base relation EMPLOYEE, as shown in Table 3. The view TOY-DEPT will be automatically modified to include Brown, as shown in Table 4.
  • 23. Views can also be used to provide access to statistical information. A view is simply another relation in the database, which happens to be automatically modified by the DBMS whenever its base relations are modified. Problem: Difficult to maintain updates.
  • 25. Grant • Granting and revocation allow users to selectively and dynamically grant privileges to other users, and subsequently revoke them if so desired. • The GRANT command applies to base relations as well as views. • In SQL granting is accomplished by means of the GRANT statement which has the following general format.
  • 26. Some examples of GRANT statements
  • 27. Note that it is not possible to grant a user the grant option on a privilege, without allowing the grant option itself to be further granted.
  • 28. Revoke • Revocation in SQL is accomplished by means of the REVOKE statement which has the following general format. • Examples:
  • 29.
  • 30.
  • 31. STORED PROCEDURES Assign rights to execute compiled programs GRANT RUN ON <program> TO <user> Problem: Programs may access resources for which the user who runs the program does not have permission.
  • 32. QUERY MODIFICATION • It is not supported in SQL • In this technique, a query submitted by a user is modified to include further restrictions as determined by the user's authorization.