UNIT-1
UNIT-1
UNIT-1
Prepared by
Dr. B. Muruganantham
Assistant Professor
Department of Computer Science and
Engineering
SRMIST, Chennai
References :
2) Charu C. Aggarwal, Philip S Yu, “Privacy Preserving Data Mining”: Models and
Algorithms, Kluwer Academic Publishers, 2008
3) Ron Ben Natan, ”Implementing Database Security and Auditing”, Elsevier Digital
Press, 2005.
Dr.B.Muruganantham /AP/CSE/SRMIST
15CS338E – DATABASE SECURITY AND PRIVACY
UNIT I : SECURITY ARCHITECTURE & OPERATING SYSTEM SECURITY FUNDAMENTALS
✔ Security Architecture:
▪ Introduction
▪ Information Systems
▪ Database Management Systems
▪ Information Security Architecture
▪ Database Security
▪ Asset Types and value
▪ Security Methods
✔ Operating System Security Fundamentals:
▪ Introduction
▪ Operating System Overview
▪ Security Environment
▪ Components
▪ Authentication Methods
✔ User Administration
✔ Password Policies
✔ Vulnerabilities
✔ E-mail Security
Dr.B.Muruganantham /AP/CSE/SRMIST
Security Architecture: Introduction
✔ Security violations and attacks are increased globally at an average rate of 20%.
✔ Statistics shows that virus alerts, email spamming, identity theft, data theft, and types
of security breaches on the rise.
✔ Database Security is the degree to which all the data is fully protected from
tampering or unauthorised acts.
✔ The great challenge is to develop a new database security policy to secure data and
prevent integrity data violations.
✔ Most of the DBMS did not have a security mechanism for authentication and
encryption until recently.
Dr.B.Muruganantham /AP/CSE/SRMIST
Information Systems
✔ In today’s global market , corporate companies all
over the world to gain a portion of market share.
Dr.B.Muruganantham /AP/CSE/SRMIST
Information Systems …
✔ An information can be a back bone of the day-to-day operations of a company as well as
the beacon of long-term strategies and vision.
✔ Information systems are categorized based on usage.
✔ The following figure shows the typical use of system applications at various management
levels
Dr.B.Muruganantham /AP/CSE/SRMIST
Information Systems …
Dr.B.Muruganantham /AP/CSE/SRMIST
Information Systems …
Characteristics of Information System categories
Dr.B.Muruganantham /AP/CSE/SRMIST
Information Systems …
Characteristics of Information System categories …
Category Characteristics Typical Application
System
✔ Captures reasoning of human experts ✔ Virtual University
Simulation
✔ Executive Expert Systems(EESs) are a type of
expert system used by top level management for ✔ Financial Enterprise
strategic management goals
✔ Statistical Trading
✔ A branch of Artificial Intelligence within the
field of computer science studies ✔ Loan Expert
Expert System
(ES) ✔ Software consists of : ✔ Market Analysis
Knowledge Base
Inference Engine
Rules
✔ People Consists of :
Domain Experts
Knowledge Engineers
Power Users
Dr.B.Muruganantham /AP/CSE/SRMIST
Information Systems …
Components of Information System
Dr.B.Muruganantham /AP/CSE/SRMIST
Information Systems …
• Components of Information System …
Dr.B.Muruganantham /AP/CSE/SRMIST
Database Management System
Database :
✔ Mainly used for storing and retrieving the data for processing
✔ Request and Reply protocols are used to communicate client and server
Dr.B.Muruganantham /AP/CSE/SRMIST
Database Management System …
DBMS
Purpose of DBMS
✔ Integrity problems
✔ Atomicity of updates
✔ Security problems
Dr.B.Muruganantham /AP/CSE/SRMIST
Database Management System …
DBMS Architecture
Dr.B.Muruganantham /AP/CSE/SRMIST
Information Security Architecture
Information Security
Dr.B.Muruganantham /AP/CSE/SRMIST
Information Security Architecture …
CIA Triangle
Confidentiality Integrity
Information is classified into Information is accurate and
different levels of protected from tampering by
confidentiality to ensure that unauthorised persons
only authorised users access Information is consistent and
the information validated
Availability
Information is available all the times only
for authorised and authenticated persons
System is protected from being shutdown
due to external or internal threats or attacks
Dr.B.Muruganantham /AP/CSE/SRMIST
Information Security Architecture …
Logical
and
Physical Assets
Dr.B.Muruganantham /AP/CSE/SRMIST
Information Security Architecture …
Components of Information Security Architecture
✔ Policies and Procedures
- Documented procedures and company policies that
elaborate on how security is to be carried out
✔ Security personnel and Administrators
- People who enforce and keep security in order
✔ Detection equipment
- Devices that authenticate employees and Detect equipment that is
prohibited by the company
✔ Security Programs
- Tools that protect computer systems’ server
✔ Monitoring Equipment
- Devices that monitor physical properties , employees and other
important assets
✔ Monitoring Applications
- Utilities and applications used to monitor network traffic and Internet
activities
✔ Auditing Procedures and Tools
- Checks and Controls put in place to ensure that security measures are
working
Dr.B.Muruganantham /AP/CSE/SRMIST
Database Security
✔ One of the functions of DBMS is to empower DBA to implement and enforce
security at all levels of security
✔ A security access point is a place where database security must be protected
and applied
✔ The Security access points illustrated in the below figure
Dr.B.Muruganantham /AP/CSE/SRMIST
Database Security Access Points
✔ People – Individuals who have been granted privileges and permissions to access
networks, workstations, servers, databases, data files and data
✔ Network – One of the most sensitive security access points. Protect the
network and provide network access only to applications, operating systems
and databases.
✔ Data – The data access point deals with data design needed to enforce data
integrity
Dr.B.Muruganantham /AP/CSE/SRMIST
Database security enforcement
Dr.B.Muruganantham /AP/CSE/SRMIST
Data Integrity violation process
✔ Security gaps are points at which security is missing and the systems is vulnerable.
✔ Vulnerabilities are kinks in the system that must be watched because they can become
threats.
✔ In the world of information security , a threat is defined as a security risk that has high
possibility of becoming a system breach.
Dr.B.Muruganantham /AP/CSE/SRMIST
Database Security Levels
Dr.B.Muruganantham /AP/CSE/SRMIST
Menaces to Databases
✔ Security vulnerability
– A weakness in any of the information system components that can be
exploited to violate the integrity , confidentiality, or accessibility of the
system
✔ Security Threat
– A security violation or attack that can happen any time because of
a security vulnerability
✔ Security risk
– A known security gap that a company intentionally leaves open
Dr.B.Muruganantham /AP/CSE/SRMIST
Types of Vulnerabilities
✔ Vulnerability means “ Susceptible to Attacks” ( Source :www.dictionary.com)
✔ Intruders, Attackers and Assailers exploit vulnerabilities in Database environment to
prepare and start their attacks.
✔ Hackers usually explore the weak points of a system until they gain entry
✔ Once the intrusion point is identified , Hackers unleash their array of attacks
▪ Virus
▪ Malicious Code
▪ Worms
▪ Other Unlawful violations
✔ To protect the system the administrator should understand the types of vulnerabilities
✔ The below figure shows the types of vulnerabilities
Dr.B.Muruganantham /AP/CSE/SRMIST
Types of Vulnerabilities …
Category Description Examples
Installation and ✔ Results from default ✔ Incorrect application
Configuration installation configuration
✔ Configuration that is known ✔ Failure to change default
publicly passwords
✔ Does not enforce any security ✔ Failure to change default
measures privileges
✔ Improper configuration or ✔ Using default installation
Installation may result in which does not enforce high
security risks security measures
User Mistakes ✔ Security vulnerabilities are ✔ Lack of Auditing controls
tied to humans too ✔ Untested recovery plan
✔ Carelessness in implementing ✔ Lack of activity monitoring
procedures ✔ Lack of protection against
✔ Failure to follow through malicious code
✔ Accidental errors ✔ Lack of applying patches as
they are released
✔ Bad authentication or
implementation
✔ Social Engineering
✔ Lack of technical information
✔ Susceptibility to scam
Dr.B.Muruganantham /AP/CSE/SRMIST
Types of Vulnerabilities …
Dr.B.Muruganantham /AP/CSE/SRMIST
Types of threats
Dr.B.Muruganantham /AP/CSE/SRMIST
Types of threats , definitions and examples
Threat type Definition Examples
People People intentionally or ✔ Employees
unintentionally inflict damage, ✔ Govt. Authorities or Person who
violation or destruction to all or are in charge
any of the database components ✔ Contractors
(People, Applications, ✔ Consultants
Networks, OS, DBMS, Data ✔ Visitors
files or data) ✔ Hackers
✔ Organised Criminals
✔ Spies
✔ Terrorists
✔ Social Engineers
Malicious Software Code that in most ✔ Viruses
Code cases is intentionally written to ✔ Boot Sector Viruses
damage or violate one or more ✔ Worms
database environment ✔ Trojon Horses
components (People, ✔ Spoofing Code
Applications, Networks, OS, ✔ Denial-of-service flood
DBMS, Data files or data) ✔ Rookits
✔ Bots
✔ Bugs
✔ E-Mail Spamming
✔ Back Door
Dr.B.Muruganantham /AP/CSE/SRMIST
Types of threats , definitions and examples
Dr.B.Muruganantham /AP/CSE/SRMIST
Examples of Malicious Code
✔ Virus – Code that compromises the integrity and state of the system
✔ Boot Sector Virus – Code that compromises the segment in the hard disk that
contains the program used to start the computer
✔ Worm – Code that disrupts the operation of the system
✔ Trojon Horses – Malicious code that penetrates a computer system or network by
pretending to be legitimate coded
✔ Spoofing Code – Malicious code that looks like a legitimate code
✔ Denial-of-service-flood – The act of flooding a web site or network system with
many requests with the intent of overloading the system and forcing it to deny
service legitimate requests
✔ Rootkits and Bots – Malicious or Legitimate code that performs such functions as
automatically retrieving and collecting information from computer system
✔ Bugs - Code that is faulty due to bad design, logic or both
✔ E-Mail Spamming – E-Mail that is sent to may recipients without their permission
✔ Back door – An intentional design element of software that allows developers of the
system to gain access to the application for maintenance or technical problems
Dr.B.Muruganantham /AP/CSE/SRMIST
Types of Threats
✔ Risks are simply the a part of doing business
✔ Managers at all the levels are constantly working to assess and mitigate risks to ensure the
continuity of the department operations.
✔ Administrators should understand the weakness and threats related to the system
Dr.B.Muruganantham /AP/CSE/SRMIST
Definitions and examples of Risk types
Dr.B.Muruganantham /AP/CSE/SRMIST
Asset Types and Their Values
✔ People always tend to protect assets regardless of what they are
Dr.B.Muruganantham /AP/CSE/SRMIST
Database Security Methods
Security methods used to protect database environment components
Database
Component Security Methods
Protected
People ✔ Physical limits on access to hardware and documents
✔ Through the process of identification and authentication make certain
that the individual is who is claim s to be through the use of devices,
such as ID cards, eye scans, and passwords
✔ Training courses on the importance of security and how to guard assets
✔ Establishment of security policies and procedures
Applications ✔ Authentication of users who access applications
✔ Business rules
✔ Single sign-on ( A method for signing on once for different applications
and web sites)
Network ✔ Firewalls to block network intruders
✔ Virtual Private Network (VPN)
✔ Authentication
Dr.B.Muruganantham /AP/CSE/SRMIST
Database Security Methods …
Database Component
Protected Security Methods
OS ✔ Authentication
✔ Intrusion Detection
✔ Password Policies
✔ User accounts
DBMS ✔ Authentication
✔ Audit Mechanism
✔ Database resource limits
✔ Password poilicy
Data files ✔ File permission
✔ Access Monitoring
Data ✔ Data Validation
✔ Data Constraints
✔ Data Encryption
✔ Data Access
Dr.B.Muruganantham /AP/CSE/SRMIST
Database Security Methodology
The below figure presents database security methodology side by side
with the software development life cycle (SDLC) methodology
Dr.B.Muruganantham /AP/CSE/SRMIST
Database Security Methodology…
The following list presents the definition of each phase of the
database security methodology
Dr.B.Muruganantham /AP/CSE/SRMIST
Database Security Definition Revisited
Dr.B.Muruganantham /AP/CSE/SRMIST
Operating System Security Fundamentals
Dr.B.Muruganantham /AP/CSE/SRMIST
Operating System Security Fundamentals …
An OS is having number of key functions and capabilities as outlined
✔ Multitasking
✔ Multisharing
Dr.B.Muruganantham /AP/CSE/SRMIST
Operating System Security Fundamentals …
There are different vendors of OS
✔ Windows by Microsoft
✔ UNIX by companies such as Sun Microsystems, HP and IBM
✔ LINUX “flavours” from various vendors such as Red Hat
✔ Macintosh by Apple
Dr.B.Muruganantham /AP/CSE/SRMIST
The OS Security Environment
▪ Bank Building – OS
▪ Safe – DB
▪ Money - Data
Dr.B.Muruganantham /AP/CSE/SRMIST
The Components of an OS Security Environment
Dr.B.Muruganantham /AP/CSE/SRMIST
Services
Dr.B.Muruganantham /AP/CSE/SRMIST
Files
✔ Files are another one component of OS.
✔ File Transfer
✔ File Sharing
Dr.B.Muruganantham /AP/CSE/SRMIST
Files …
File Permission
• Every OS has a method of implementing file permission to grant read, write or execute
privileges to different users.
• The following figure gives how the file permissions are assigned to a user in windows
Dr.B.Muruganantham /AP/CSE/SRMIST
Files …
✔ In UNIX, file permissions work differently than windows.
✔ For each file there are three permission settings
✔ Each setting consists of rwx ( r – read, w – write and x – execute)
1. First rwx is Owner of the file
2. Second rwx is Group to which owner belongs
3. Third rwx is All other users
✔ The given images gives the details of UNIX file permission.
Dr.B.Muruganantham /AP/CSE/SRMIST
Files …
✔ File Transfer – moving the file from one location to another location in a
disk/web/cloud
✔ FTP is an Internet service that allows transferring files from one computer to
another
✔ FTP clients and servers transmit usernames and passwords in plaintext format(
Not Encrypted). This means any hacker can sniff network traffic and be able to get
the logon information easily.
✔ Never use the normal FTP Utility. Instead, use the secure FTP utility , if
possible.
✔ Make two FTP directories: one for file uploads with write permission only
and another one file is for file downloads with read permission.
✔ Use specific accounts for FTP that do not have access to any files or
directories outside the file UPLOAD and DOWNLOAD directories.
✔ Turn on logging , and scan the FTP logs for unusual activities on a regular
basis.
Dr.B.Muruganantham /AP/CSE/SRMIST
Files …
✔ Sharing files naturally leads to security risks and threats
✔ The peer-to-peer technology is on rise( very well developed now)
✔ Peer-to-Peer programs allow users to share the files over internet
✔ If you were conduct a survey of users that use Peer-to-Peer programs, majority
of the users’ machines are infected with some sort of virus, spyware, or worm.
✔ Most companies prohibit the use of such programs.
✔ The main reason for blocking these programs are
▪ Malicious Code
▪ Adware and spyware
▪ Privacy and confidentiality
▪ Pornography
▪ Copy right issues
Dr.B.Muruganantham /AP/CSE/SRMIST
Memory
✔ You may wonder how memory is an access points to security violations
✔ There are many badly written programs and utilities that could change the
content of memory
✔ Although these programs do not perform deliberate destructions acts.
✔ On the other hand , programs that intentionally damage or scan data in
memory are the type that not only can harm the data integrity, but may also
exploit data for illegal use.
Dr.B.Muruganantham /AP/CSE/SRMIST
Authentication Methods
Dr.B.Muruganantham /AP/CSE/SRMIST
Digital Authentication used by many OS
✔ Digital Certificate
▪ Widely used in e-commerce
▪ Is a passport that identifies and verifies the holder of the certificate
▪ Is an electronic file issued by a trusted party ( Known as certificate authority ) and cannot be
forged or tampered with.
✔ Digital Card
▪ Also known as security card or smart card
▪ Similar to credit card in dimensions but instead of magnetic strip
▪ It has an electronic circuit that stores the user identification information
✔ Kerberos
▪ Developed by Massachusetts Institute of Technology (MIT) , USA
▪ It is to enable two parties to exchange information over an open network by assigning a unique
key. Called ticket , to each user.
▪ The ticket is used to encrypt communicated messages
Dr.B.Muruganantham /AP/CSE/SRMIST
Digital Authentication used by many OS …
✔ Lightweight Directory Access Protocol (LDAP)
▪ Developed by University of Michigan, USA
▪ Uses centralized directory database storing information about people, offices
and machines in a hierarchical manner
▪ LDAP directory can be easily distributed to many network servers.
▪ You can use LADP to store information about
• Users (User name and User id)
• Passwords
• Internal telephone directory
• Security keys
▪ Use LADP for these following reasons
• LDAP can be used across all platforms ( OS independent )
• Easy to maintain
• Can be employed for multiple purposes
▪ LDAP architecture is Client / Server based
Dr.B.Muruganantham /AP/CSE/SRMIST
Digital Authentication used by many OS …
Dr.B.Muruganantham /AP/CSE/SRMIST
Digital Authentication used by many OS …
Dr.B.Muruganantham /AP/CSE/SRMIST
Authorization
✔ Authentication is the process of providing that users really are who they
claim to be.
✔ Authorization is the process that decides whether users are permitted to
perform the functions to they request.
✔ Authorization is not performed until the user is authenticated.
✔ Authorization deals with privileges and rights that have been granted to the
user.
Dr.B.Muruganantham /AP/CSE/SRMIST
User Administration
Dr.B.Muruganantham /AP/CSE/SRMIST
Vulnerabilities of OS
✔ The top vulnerabilities to Windows ✔ The top vulnerabilities to UNIX Systems
Systems ▪ BIND Domain Name System
▪ IIS (Internet Information Server)
▪ RPC (Remote Procedure Call)
▪ MSSQL (Microsoft SQL Server)
▪ Apache Web Server
▪ Windows Authentication ▪ General UNIX authentication accounts with no
▪ IE (Internet Explorer) / weak passwords
Dr.B.Muruganantham /AP/CSE/SRMIST
E-mail Security
✔ E-mail may be the tool most frequently used by hackers to exploit viruses, worms,
and other computer system invaders.
✔ E-mail was the medium used in many of the most famous worm and virus attacks
✔ For example :
▪ Do not configure e-mail server on a machine in which the sensitive data resides
▪ Do not disclose the e-mail server technical details
Dr.B.Muruganantham /AP/CSE/SRMIST