DBMS Microproject

Download as pdf or txt
Download as pdf or txt
You are on page 1of 17

Database

Management
system
Microproject

Guided By:
MISS. I.B TIRSE
–––––––
SANJIVANI RURAL EDUCATION SOCIETY’S

SANJIVANI K. B. P. POLYTECHNIC KOPARGAON – 423603.

CERTIFICATE
This is to certify that, the project report entitled:

“DATABASE SECURITY”

Submitted by:
Submitted by:

▪ Ayush Sasane [232]

▪ Sanket Thorat [246]

▪ Pranav Salunke [226]

▪ Siddhart Salve [228]


MISS. I.B TIRSE PROF. G.N. JORVEKAR
Project Guide H.O.D Computer Tech.
A PROJECT REPORT ON

“DATABASE SECURITY”

Submitted by:

▪ Ayush Sasane [232]

▪ Sanket Thorat [246]

▪ Pranav Salunke [226]

▪ Siddhart Salve [228]

Second Year Diploma in Computer Technology


Under the Guidance of:
MISS. I.B TIRSE
Department Of Computer Technology
SRES, Sanjivani K.B.P Polytechnic Kopargaon – 423601
MSBTE, Mumbai
DEPARTMENT OF COMPUTER TECHNOLOGY,
SANJIVANI K.B.P POLYTECHNIC, KOPARGAON.
(2020-21)

Examiner’s Certificate
Submitted by:

▪ Ayush Sasane [232]

▪ Sanket Thorat [246]

▪ Pranav Salunke [226]

▪ Siddhart Salve [228]

Project guide: H.O.D


MISS. I.B TIRSE MR. GN JORVEKAR
ACKNOWLEDGEMENT

First and the foremost we, express our deep sense of gratitude,
sincere thanks and deep sense of appreciation to Project Guide
MISS. I.B TIRSE, Department of Computer Technology,
Sanjivani K.B.P. Polytechnic, Kopargaon. Your availability at any
time throughout the year, valuable guidance, opinion, view,
comments, critics, encouragement, and support tremendously
boosted this project work.
Lots of thanks to Head, Computer Technology Department, MR.
G.N. JORVEKAR for providing us the best support we ever had.
We like to express our sincere gratitude to MR. A.R. MIRIKAR,
Principal, Sanjivani K. B. P. Polytechnic, Kopargaon for providing a
great platform to complete the project within the scheduled time.
We are also Thankful to all the faculty members, Computer
Technology Department, Sanjivani K. B. P. Polytechnic,
Kopargaon for giving comments for improvement of work,
encouragement and help during completion of the Project. Last
but not the least; We should say thanks from my bottom of heart to
our Family & Friends for their never-ending love, help, and support
in so many ways through all this time. Thank you so much.

Project Guide: H.O.D PRINCIPAL


MISS. I.B TIRSE Mr. GN JORVEKAR Mr. AR MIRIKAR
DATABASE
SECURITY
INDEX

Sr No Contents

Overview To Database
1
Security

What is Database
2
Security

Why need of database


3
security

Concepts of Database
4
Security

5 Security Problems

6 Security Controls
What is Database Security?

OVERVIEW:
In today's world, we need everything secured whether it
is your mobile phone, computer, vehicle or almost anything.

Database:
It is a collection of information stored in a computer.

Security:
It is being free from danger.

Database Security:
It is the mechanisms that protect the database against
intentional or accidental threats.
Database Security is defined as the process by which
"Confidentiality, Integrity and Availability" of the
database can be protected
Why need of database security?

Concepts of Database Security

Three are 3 main aspects:

1. Secrecy or Confidentiality
2. Integrity
3. Availability
SECRECY / CONFIDENTIALITY:

• It is protecting the database from unauthorized


users.

• " Ensures that users are allowed to do the things


they are trying to do.

• " Encryption is a technique or a process by which


the data is encoded in such a way that only those
authorized users are able to read the data.

INTEGRITY:

• Protecting the database from authorized users.


• Ensures that what users are trying to do is correct.

• For example,
An employee should be able to modify his or her
own information.
AVAILABILITY:

• Database must have not unplanned downtime.


• To ensure this, following steps should be taken
• Restrict the amount of the storage space given
to each user in the database.
• Limit the number of concurrent sessions made
available to each database user.
• Back up the data at periodic intervals to ensure
data recovery in case of application users.
SECURITY PROBLEMS:

Any circumstance or event with the potential to


adversely impact an IS through unauthorized access,
destruction, disclosure, modification of data, and/or
denial of service.

There are two kinds of threats:

• Non-fraudulent Threat
• fraudulent Threat

1. Non-fraudulent Threat:

• Natural or accidental disasters.


• Errors or bugs in hardware or software.
• Human errors.

2. Fraudulent Threat:

Authorized users:
Those who abuse their privileges and authority.
Hostile agents:
Those improper users (outsider or insiders).
who attack the software and/or hardware
system, or read or write data in a database.

DATABASE PROTECTION
REQUIREMENTS:
1. Protection from Improper Access
2. Protection from Inference
3. Integrity of the Database
4. User Authentication
5. Multilevel Protection
6. Confinement
7. Management and Protection of Sensitive Data
SECURITY CONTROLS:
METHODS OF SECURING THE
DATABASE:
• Authorization - privileges, views.
• Encryption - public key / private key, secure
sockets.
• Authentication - passwords.
• Logical - firewalls, net proxies.

SECURITY OF THE DATABASE THROUGH


FIREWALLS:
A FIREWALL is dedicated software on another
computer which inspects network traffic passing through
it and denies (or) permits passage based on set of rules.
Basically, it is a piece of software that monitors all
traffic that goes from your system to another via the
Internet or network and Vice-Versa.
Database Firewalls are a type of Web Application
Firewalls that monitor databases to identify and protect
against database specific attacks that mostly seek to
access sensitive information stored in the databases.
SECURITY OF THE DATABASE
THROUGH ABSTRACTION:
• Data encryption enables to encrypt sensitive data,
such as credit card numbers, stored in table columns.
• Encrypted data is decrypted for a database user who
has access to the data.
• Data encryption helps protect data stored on media
in the event that the storage media or data file gets
stolen.;
ADVANTAGES OF DATA ENCRYPTION:
• As a security administrator, one can be sure that
sensitive data is safe in case the storage media or
data file gets stolen.
• You do not need to create triggers or views to
decrypt data. Data from tables is decrypted for the
database user.
• Database users need not be aware of the fact that the
data they are accessing is stored in encrypted form.
Data is transparently decrypted for the database
users and does not require any action on their part.
• Applications need not be modified to handle
encrypted data. Data encryption/decryption is
managed by the database.
AUTHORIZATION:
• Read authorization - allows reading, but not
modification of data.
• Insert authorization - allows insertion of new data,
but not modification of existing data.
• Update authorization - allows modification, but not
deletion of data.
• Delete authorization - allows deletion of data.

PRIVILEGES IN DATABASE:

• Select: allows read access to relation, or the ability


to query using the view.
• Insert: the ability to insert tuples.
• Update: the ability to update using the SQL update
statement.
• Delete: the ability to delete tuples.
PRIVILEGE TO GRANT
PRIVILEGES:
With grant option:
Allows a user who is granted a privilege to pass the
privilege on to other users.
Example:
Grant selects on branch to U, with grant option
gives U1 the select privileges on branch and allows
U1 to grant this privilege to others.

You might also like