DBMS Microproject
DBMS Microproject
DBMS Microproject
Management
system
Microproject
Guided By:
MISS. I.B TIRSE
–––––––
SANJIVANI RURAL EDUCATION SOCIETY’S
CERTIFICATE
This is to certify that, the project report entitled:
“DATABASE SECURITY”
Submitted by:
Submitted by:
“DATABASE SECURITY”
Submitted by:
Examiner’s Certificate
Submitted by:
First and the foremost we, express our deep sense of gratitude,
sincere thanks and deep sense of appreciation to Project Guide
MISS. I.B TIRSE, Department of Computer Technology,
Sanjivani K.B.P. Polytechnic, Kopargaon. Your availability at any
time throughout the year, valuable guidance, opinion, view,
comments, critics, encouragement, and support tremendously
boosted this project work.
Lots of thanks to Head, Computer Technology Department, MR.
G.N. JORVEKAR for providing us the best support we ever had.
We like to express our sincere gratitude to MR. A.R. MIRIKAR,
Principal, Sanjivani K. B. P. Polytechnic, Kopargaon for providing a
great platform to complete the project within the scheduled time.
We are also Thankful to all the faculty members, Computer
Technology Department, Sanjivani K. B. P. Polytechnic,
Kopargaon for giving comments for improvement of work,
encouragement and help during completion of the Project. Last
but not the least; We should say thanks from my bottom of heart to
our Family & Friends for their never-ending love, help, and support
in so many ways through all this time. Thank you so much.
Sr No Contents
Overview To Database
1
Security
What is Database
2
Security
Concepts of Database
4
Security
5 Security Problems
6 Security Controls
What is Database Security?
OVERVIEW:
In today's world, we need everything secured whether it
is your mobile phone, computer, vehicle or almost anything.
Database:
It is a collection of information stored in a computer.
Security:
It is being free from danger.
Database Security:
It is the mechanisms that protect the database against
intentional or accidental threats.
Database Security is defined as the process by which
"Confidentiality, Integrity and Availability" of the
database can be protected
Why need of database security?
1. Secrecy or Confidentiality
2. Integrity
3. Availability
SECRECY / CONFIDENTIALITY:
INTEGRITY:
• For example,
An employee should be able to modify his or her
own information.
AVAILABILITY:
• Non-fraudulent Threat
• fraudulent Threat
1. Non-fraudulent Threat:
2. Fraudulent Threat:
Authorized users:
Those who abuse their privileges and authority.
Hostile agents:
Those improper users (outsider or insiders).
who attack the software and/or hardware
system, or read or write data in a database.
DATABASE PROTECTION
REQUIREMENTS:
1. Protection from Improper Access
2. Protection from Inference
3. Integrity of the Database
4. User Authentication
5. Multilevel Protection
6. Confinement
7. Management and Protection of Sensitive Data
SECURITY CONTROLS:
METHODS OF SECURING THE
DATABASE:
• Authorization - privileges, views.
• Encryption - public key / private key, secure
sockets.
• Authentication - passwords.
• Logical - firewalls, net proxies.
PRIVILEGES IN DATABASE: