Database Security
Database Security
Database Security
OBJECTIVES
Understand and explain the place of database
security in the context of security analysis and
management.
Understand, explain and apply the security concepts
relevant to database systems.
Understand, identify and find solutions to security
problems in database systems.
Understand the basic language of security
mechanisms as applied to database systems.
Analyze access control requirements and perform
fairly simple implementations using SQL.
Appreciate the limitations of security subsystems.
OVERVIEW
PROTECT
DETECT
PREDICT RECOVER
MINIMIZE
PREVENT
AN OUTLINED DEVELOPMENT
MECHANISM IS:
Unauthorized
disclosure: When
information that should
not have been disclosed
has been disclosed. A
general issue of crucial
importance, which can
be accidental or
deliberate.
THREATS INCLUDE:
Loss of availability:
Sometimes called denial
of service. When the
database is not available
it incurs a loss (otherwise
life is better without the
system!). So any threat
that gives rise to time
offline, even to check
whether something has
occurred, is to be avoided.
CATEGORIES OF SPECIFIC REGULATORY
THREATS TO DATABASE SYSTEMS.
Commercial sensitivity: Most financial
losses through fraud arise from
employees. Access controls provide
both protection against criminal acts
and evidence of attempts (successful
or otherwise) to carry out acts
detrimental to the organization,
whether fraud, extraction of sensitive
data or loss of availability.
Data logs, User Authentication
CATEGORIES OF SPECIFIC REGULATORY
THREATS TO DATABASE SYSTEMS
Personal privacy and data protection:
Internationally, personal data is
normally subject to legislative
controls. Personal data is data about
an identifiable individual.
Example: Postal code for a home may
in some cases identify an individual, if
only one person is living at an address
with the postal code. Such data needs
careful handling and control.
CATEGORIES OF SPECIFIC REGULATORY
THREATS TO DATABASE SYSTEMS
Computer misuse: There is also
generally legislation on the misuse
of computers. Misuse includes the
violation of access controls and
attempts to cause damage by
changing the database state or
introducing worms and viruses to
interfere with proper operation.
These offences are often
extraditable.
Audit requirements: These are
operational constraints built around the
need to know who did what, who tried to
do what, and where and when everything
happened. They involve the detection of
events (including CONNECT and GRANT
transactions), providing evidence for
detection, assurance as well as either
defense or prosecution. There are issues
related to computer-generated evidence.
System logs
PRINCIPLES OF
DATABASE SECURITY
OVERVIEW
•Hardware
•Software
•Data
•Data quality
•Credibility
•Availability
•Business benefit
PRIMARILY CONCERNED WITH THREATS
TO THE DATA AND DATA QUALITY
POINTS TO BEAR IN MIND:
Administrator
System Admin
Staff/Clerk
ACCESS CONTROL