SlideShare a Scribd company logo
DATABASE SECURITYDATABASE SECURITY
By Oscar SuciadiBy Oscar Suciadi
CS 157BCS 157B
Prof. Sin-Min LeeProf. Sin-Min Lee
DefinitionDefinition
Database Security isDatabase Security is
the mechanism that protect the databasethe mechanism that protect the database
against intentional or accidental threats.against intentional or accidental threats.
We consider database security in relation toWe consider database security in relation to
the following situations:the following situations:
- Theft and Fraud- Theft and Fraud
- Loss of confidentiality- Loss of confidentiality
IntroductionIntroduction
– Loss of privacyLoss of privacy
– Loss of integrityLoss of integrity
– Loss of availabilityLoss of availability
Threat isThreat is
any intentional or accidental event thatany intentional or accidental event that
may adversely affect the system.may adversely affect the system.
Introduction (Cont)Introduction (Cont)
Examples of threats:Examples of threats:
- Using another person’s log-in name- Using another person’s log-in name
toto
access dataaccess data
- Unauthorized copying data- Unauthorized copying data
- Program/Data alteration- Program/Data alteration
- Illegal entry by hacker- Illegal entry by hacker
- Viruses- Viruses
- Etc.- Etc.
CountermeasuresCountermeasures
Computer-Based Controls:Computer-Based Controls:
- Authorization- Authorization
- Views- Views
- Backup and Recovery- Backup and Recovery
- Integrity- Integrity
- Encryption- Encryption
- RAID Technology- RAID Technology
AuthorizationAuthorization
The granting of a privilege that enable aThe granting of a privilege that enable a
user to have a legitimate access to auser to have a legitimate access to a
system.system.
They are sometimes referred as accessThey are sometimes referred as access
controls.controls.
The process of authorization involvesThe process of authorization involves
authenticating the user requesting accessauthenticating the user requesting access
to objects.to objects.
AuthenticatingAuthenticating
Means a mechanism that determinesMeans a mechanism that determines
whether a user is who he/she claim to be.whether a user is who he/she claim to be.
A system administrator is responsible forA system administrator is responsible for
allowing users to have access to theallowing users to have access to the
system by creating individual usersystem by creating individual user
accounts.accounts.
Closed Vs Open SystemsClosed Vs Open Systems
Closed SystemsClosed Systems
Some DBMS required authorization forSome DBMS required authorization for
authorized DBMS users to access specificauthorized DBMS users to access specific
objects.objects.
Open SystemsOpen Systems
Allow users to have complete access to allAllow users to have complete access to all
objects within the database.objects within the database.
A DBMS may permit both individual userA DBMS may permit both individual user
identifiers and group identifiers to beidentifiers and group identifiers to be
created.created.
Certain privileges may be associated withCertain privileges may be associated with
specific identifiers, which indicate whatspecific identifiers, which indicate what
kind of privilege is allowed with certainkind of privilege is allowed with certain
with certain database objects.with certain database objects.
Each privileges has a binary valueEach privileges has a binary value
associated with it. The binary values areassociated with it. The binary values are
summed and the total value indicates whatsummed and the total value indicates what
privileges are allowed for a specific user orprivileges are allowed for a specific user or
group with a particular object.group with a particular object.
User & Group IdentifierUser & Group Identifier
UserUser
IdentifierIdentifier
TypeType GroupGroup MemberMember
IdentifierIdentifier
SG37SG37 UserUser SalesSales SG37SG37
SG14SG14 UserUser SalesSales SG14SG14
SG5SG5 UserUser
SalesSales GroupGroup
Access Control MatrixAccess Control Matrix
UserUser
IdentifierIdentifier
Property#Property# TypeType PricePrice Owner#Owner# Staff#Staff# Branch#Branch# QueryQuery
RowRow
LimitLimit
SalesSales 00010001 00010001 00010001 00000000 00000000 00000000 1515
SG37SG37 01010101 01010101 01110111 01010101 01110111 00000000 100100
SG5SG5 11111111 11111111 11111111 11111111 11111111 11111111 nonenone
SELECTSELECT UPDATEUPDATE INSERTINSERT DELETEDELETE ALLALL
00010001 00100010 01000100 10001000 11111111
ViewsViews
Is the dynamic result of one or moreIs the dynamic result of one or more
relational operations operating on therelational operations operating on the
base relations to produce another relation.base relations to produce another relation.
A view is a virtual relation that does notA view is a virtual relation that does not
actually exist in the database, but isactually exist in the database, but is
produced upon request by a particularproduced upon request by a particular
user, at the time of request.user, at the time of request.
Views (Cont)Views (Cont)
The view mechanism provides a powerfulThe view mechanism provides a powerful
and flexible security mechanism by hidingand flexible security mechanism by hiding
parts of the database from certain users.parts of the database from certain users.
The user is not aware of the existence ofThe user is not aware of the existence of
any attributes or rows that are missingany attributes or rows that are missing
from the view.from the view.
Backup & RecoveryBackup & Recovery
Is the process of periodically taking a copyIs the process of periodically taking a copy
of the database and log file on to offlineof the database and log file on to offline
storage media.storage media.
DBMS should provide backup facilities toDBMS should provide backup facilities to
assist with the recovery of a databaseassist with the recovery of a database
failure.failure.
IntegrityIntegrity
Maintaining a secure database system byMaintaining a secure database system by
preventing data from becoming invalid.preventing data from becoming invalid.
EncryptionEncryption
The encoding of data by a special algorithmThe encoding of data by a special algorithm
that renders the data unreadable by anythat renders the data unreadable by any
program without the decryption key.program without the decryption key.
There will be degradation in performanceThere will be degradation in performance
because of the time taken to decode it.because of the time taken to decode it.
It also protects the data transmitted overIt also protects the data transmitted over
communication lines.communication lines.
RAIDRAID
Redundant Array of Independent DisksRedundant Array of Independent Disks
The hardware that the DBMS is running onThe hardware that the DBMS is running on
must be fault-tolerant, meaning that themust be fault-tolerant, meaning that the
DBMS should continue to operate even ifDBMS should continue to operate even if
one of the hardware components fails.one of the hardware components fails.
One solution is the use of RAID technology.One solution is the use of RAID technology.
RAID (Cont)RAID (Cont)
RAID works on having a large disk arrayRAID works on having a large disk array
comprising an arrangement of severalcomprising an arrangement of several
independent disks that are organized toindependent disks that are organized to
improve reliability and at the same timeimprove reliability and at the same time
increase performance.increase performance.

More Related Content

What's hot (20)

PPT
DB security
ERSHUBHAM TIWARI
 
PPTX
Database security
Software Engineering
 
PPTX
Database security and security in networks
Prachi Gulihar
 
PPT
Chapter23
gourab87
 
PPTX
Database security
Arpana shree
 
PDF
Distributed database security with discretionary access control
Jyotishkar Dey
 
PPT
Database security
CAS
 
PPTX
Data base security & integrity
Pooja Dixit
 
PDF
Chapter 5 database security
Syaiful Ahdan
 
PDF
Database security issues
n|u - The Open Security Community
 
PPTX
Database modeling and security
Neeharika Nidadavolu
 
PPT
Data base security
Sara Nazir
 
PDF
Database security
Murchana Borah
 
PPTX
DBMS SECURITY
Wasim Raza
 
PPTX
Database Security And Authentication
Sudeb Das
 
PPTX
Security and Integrity of Data
Adeel Riaz
 
PPTX
Database security and privacy
Md. Ahasan Hasib
 
PDF
Security and Integrity
lubna19
 
PPT
Database security
Prabhat gangwar
 
PDF
Database Security
Ferdous Pathan
 
DB security
ERSHUBHAM TIWARI
 
Database security
Software Engineering
 
Database security and security in networks
Prachi Gulihar
 
Chapter23
gourab87
 
Database security
Arpana shree
 
Distributed database security with discretionary access control
Jyotishkar Dey
 
Database security
CAS
 
Data base security & integrity
Pooja Dixit
 
Chapter 5 database security
Syaiful Ahdan
 
Database security issues
n|u - The Open Security Community
 
Database modeling and security
Neeharika Nidadavolu
 
Data base security
Sara Nazir
 
Database security
Murchana Borah
 
DBMS SECURITY
Wasim Raza
 
Database Security And Authentication
Sudeb Das
 
Security and Integrity of Data
Adeel Riaz
 
Database security and privacy
Md. Ahasan Hasib
 
Security and Integrity
lubna19
 
Database security
Prabhat gangwar
 
Database Security
Ferdous Pathan
 

Similar to Database security copy (20)

PPTX
Database security
afzaalkhalid1
 
PPTX
Database Security and Management Systems
IsmaelKakaRealsoft
 
PPTX
ch20 Secuity & Admin Transparencies-6E.pptx
alhashediyemen1
 
PPT
UNIT 1 DBMS Security made by me it hrlps you to makr your future bright.ppt
AnuradhaGupta789099
 
PPTX
Database Security, Threats & Countermeasures.pptx
SaqibAhmedKhan4
 
PDF
computer security .pdf
FarazTariq18
 
PDF
databasesecurit-phpapp01.pdf
AnSHiKa187943
 
PDF
uu (2).pdf
uzairAsif268
 
PPTX
Database Security Methods, DAC, MAC,View
Dr-Dipali Meher
 
PPTX
Database security in database management.pptx
FarhanaMariyam1
 
PPTX
203135 Muhammad Usama.pptx
muhammadusama257191
 
PPTX
Database technology
Fara Jumakhon
 
PPTX
7 (1) the motor was very good Lock and complete.pptx
nabeehmohammedtaher
 
PPTX
Database security
MaryamAsghar9
 
PPT
Database Security
alraee
 
PDF
5db-security.pdf
HODCA1
 
PPTX
Database management system normalization
AjitPatil801582
 
PDF
Security Issues Surrounding Data Manipulation in a Relational Database
David Murphy
 
DOCX
Database AdministrationObjectivesDiscus.docx
whittemorelucilla
 
PDF
History Of Database Technology
Jacqueline Thomas
 
Database security
afzaalkhalid1
 
Database Security and Management Systems
IsmaelKakaRealsoft
 
ch20 Secuity & Admin Transparencies-6E.pptx
alhashediyemen1
 
UNIT 1 DBMS Security made by me it hrlps you to makr your future bright.ppt
AnuradhaGupta789099
 
Database Security, Threats & Countermeasures.pptx
SaqibAhmedKhan4
 
computer security .pdf
FarazTariq18
 
databasesecurit-phpapp01.pdf
AnSHiKa187943
 
uu (2).pdf
uzairAsif268
 
Database Security Methods, DAC, MAC,View
Dr-Dipali Meher
 
Database security in database management.pptx
FarhanaMariyam1
 
203135 Muhammad Usama.pptx
muhammadusama257191
 
Database technology
Fara Jumakhon
 
7 (1) the motor was very good Lock and complete.pptx
nabeehmohammedtaher
 
Database security
MaryamAsghar9
 
Database Security
alraee
 
5db-security.pdf
HODCA1
 
Database management system normalization
AjitPatil801582
 
Security Issues Surrounding Data Manipulation in a Relational Database
David Murphy
 
Database AdministrationObjectivesDiscus.docx
whittemorelucilla
 
History Of Database Technology
Jacqueline Thomas
 
Ad

More from fika sweety (20)

PPTX
Query optimization and performance
fika sweety
 
PPT
Program design techniques
fika sweety
 
PPT
Plsql
fika sweety
 
PPT
Shift rotate
fika sweety
 
PPTX
Graphss
fika sweety
 
PPT
Modeling and simulation ch 1
fika sweety
 
PPTX
Macros...presentation
fika sweety
 
PPT
Pseudocode algorithim flowchart
fika sweety
 
PPT
Diversity (HRM)
fika sweety
 
PPT
Howtowriteamemo 090920105907-phpapp02
fika sweety
 
PPTX
Coal presentationt
fika sweety
 
PPTX
1 Computer Architecture
fika sweety
 
PPTX
3 Pipelining
fika sweety
 
PPT
19 primkruskal
fika sweety
 
PPT
Warehouse chapter3
fika sweety
 
PPTX
Storage memory
fika sweety
 
PPT
Quick sort
fika sweety
 
PPTX
Query optimization and performance
fika sweety
 
PDF
Master theorem
fika sweety
 
Query optimization and performance
fika sweety
 
Program design techniques
fika sweety
 
Shift rotate
fika sweety
 
Graphss
fika sweety
 
Modeling and simulation ch 1
fika sweety
 
Macros...presentation
fika sweety
 
Pseudocode algorithim flowchart
fika sweety
 
Diversity (HRM)
fika sweety
 
Howtowriteamemo 090920105907-phpapp02
fika sweety
 
Coal presentationt
fika sweety
 
1 Computer Architecture
fika sweety
 
3 Pipelining
fika sweety
 
19 primkruskal
fika sweety
 
Warehouse chapter3
fika sweety
 
Storage memory
fika sweety
 
Quick sort
fika sweety
 
Query optimization and performance
fika sweety
 
Master theorem
fika sweety
 
Ad

Recently uploaded (20)

PDF
The History of Phone Numbers in Stoke Newington by Billy Thomas
History of Stoke Newington
 
PPSX
HEALTH ASSESSMENT (Community Health Nursing) - GNM 1st Year
Priyanshu Anand
 
PDF
Stokey: A Jewish Village by Rachel Kolsky
History of Stoke Newington
 
PDF
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - GLOBAL SUCCESS - CẢ NĂM - NĂM 2024 (VOCABULARY, ...
Nguyen Thanh Tu Collection
 
PPTX
I AM MALALA The Girl Who Stood Up for Education and was Shot by the Taliban...
Beena E S
 
PPTX
ASRB NET 2023 PREVIOUS YEAR QUESTION PAPER GENETICS AND PLANT BREEDING BY SAT...
Krashi Coaching
 
PPTX
grade 5 lesson matatag ENGLISH 5_Q1_PPT_WEEK4.pptx
SireQuinn
 
PDF
LAW OF CONTRACT (5 YEAR LLB & UNITARY LLB )- MODULE - 1.& 2 - LEARN THROUGH P...
APARNA T SHAIL KUMAR
 
PDF
community health nursing question paper 2.pdf
Prince kumar
 
PDF
The Different Types of Non-Experimental Research
Thelma Villaflores
 
PDF
0725.WHITEPAPER-UNIQUEWAYSOFPROTOTYPINGANDUXNOW.pdf
Thomas GIRARD, MA, CDP
 
PDF
Isharyanti-2025-Cross Language Communication in Indonesian Language
Neny Isharyanti
 
PPTX
Stereochemistry-Optical Isomerism in organic compoundsptx
Tarannum Nadaf-Mansuri
 
PPTX
Cultivation practice of Litchi in Nepal.pptx
UmeshTimilsina1
 
PDF
Generative AI: it's STILL not a robot (CIJ Summer 2025)
Paul Bradshaw
 
PDF
Women's Health: Essential Tips for Every Stage.pdf
Iftikhar Ahmed
 
PPTX
A PPT on Alfred Lord Tennyson's Ulysses.
Beena E S
 
PDF
The-Ever-Evolving-World-of-Science (1).pdf/7TH CLASS CURIOSITY /1ST CHAPTER/B...
Sandeep Swamy
 
PPTX
How to Create a PDF Report in Odoo 18 - Odoo Slides
Celine George
 
PPTX
STAFF DEVELOPMENT AND WELFARE: MANAGEMENT
PRADEEP ABOTHU
 
The History of Phone Numbers in Stoke Newington by Billy Thomas
History of Stoke Newington
 
HEALTH ASSESSMENT (Community Health Nursing) - GNM 1st Year
Priyanshu Anand
 
Stokey: A Jewish Village by Rachel Kolsky
History of Stoke Newington
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - GLOBAL SUCCESS - CẢ NĂM - NĂM 2024 (VOCABULARY, ...
Nguyen Thanh Tu Collection
 
I AM MALALA The Girl Who Stood Up for Education and was Shot by the Taliban...
Beena E S
 
ASRB NET 2023 PREVIOUS YEAR QUESTION PAPER GENETICS AND PLANT BREEDING BY SAT...
Krashi Coaching
 
grade 5 lesson matatag ENGLISH 5_Q1_PPT_WEEK4.pptx
SireQuinn
 
LAW OF CONTRACT (5 YEAR LLB & UNITARY LLB )- MODULE - 1.& 2 - LEARN THROUGH P...
APARNA T SHAIL KUMAR
 
community health nursing question paper 2.pdf
Prince kumar
 
The Different Types of Non-Experimental Research
Thelma Villaflores
 
0725.WHITEPAPER-UNIQUEWAYSOFPROTOTYPINGANDUXNOW.pdf
Thomas GIRARD, MA, CDP
 
Isharyanti-2025-Cross Language Communication in Indonesian Language
Neny Isharyanti
 
Stereochemistry-Optical Isomerism in organic compoundsptx
Tarannum Nadaf-Mansuri
 
Cultivation practice of Litchi in Nepal.pptx
UmeshTimilsina1
 
Generative AI: it's STILL not a robot (CIJ Summer 2025)
Paul Bradshaw
 
Women's Health: Essential Tips for Every Stage.pdf
Iftikhar Ahmed
 
A PPT on Alfred Lord Tennyson's Ulysses.
Beena E S
 
The-Ever-Evolving-World-of-Science (1).pdf/7TH CLASS CURIOSITY /1ST CHAPTER/B...
Sandeep Swamy
 
How to Create a PDF Report in Odoo 18 - Odoo Slides
Celine George
 
STAFF DEVELOPMENT AND WELFARE: MANAGEMENT
PRADEEP ABOTHU
 

Database security copy

  • 1. DATABASE SECURITYDATABASE SECURITY By Oscar SuciadiBy Oscar Suciadi CS 157BCS 157B Prof. Sin-Min LeeProf. Sin-Min Lee
  • 2. DefinitionDefinition Database Security isDatabase Security is the mechanism that protect the databasethe mechanism that protect the database against intentional or accidental threats.against intentional or accidental threats. We consider database security in relation toWe consider database security in relation to the following situations:the following situations: - Theft and Fraud- Theft and Fraud - Loss of confidentiality- Loss of confidentiality
  • 3. IntroductionIntroduction – Loss of privacyLoss of privacy – Loss of integrityLoss of integrity – Loss of availabilityLoss of availability Threat isThreat is any intentional or accidental event thatany intentional or accidental event that may adversely affect the system.may adversely affect the system.
  • 4. Introduction (Cont)Introduction (Cont) Examples of threats:Examples of threats: - Using another person’s log-in name- Using another person’s log-in name toto access dataaccess data - Unauthorized copying data- Unauthorized copying data - Program/Data alteration- Program/Data alteration - Illegal entry by hacker- Illegal entry by hacker - Viruses- Viruses - Etc.- Etc.
  • 5. CountermeasuresCountermeasures Computer-Based Controls:Computer-Based Controls: - Authorization- Authorization - Views- Views - Backup and Recovery- Backup and Recovery - Integrity- Integrity - Encryption- Encryption - RAID Technology- RAID Technology
  • 6. AuthorizationAuthorization The granting of a privilege that enable aThe granting of a privilege that enable a user to have a legitimate access to auser to have a legitimate access to a system.system. They are sometimes referred as accessThey are sometimes referred as access controls.controls. The process of authorization involvesThe process of authorization involves authenticating the user requesting accessauthenticating the user requesting access to objects.to objects.
  • 7. AuthenticatingAuthenticating Means a mechanism that determinesMeans a mechanism that determines whether a user is who he/she claim to be.whether a user is who he/she claim to be. A system administrator is responsible forA system administrator is responsible for allowing users to have access to theallowing users to have access to the system by creating individual usersystem by creating individual user accounts.accounts.
  • 8. Closed Vs Open SystemsClosed Vs Open Systems Closed SystemsClosed Systems Some DBMS required authorization forSome DBMS required authorization for authorized DBMS users to access specificauthorized DBMS users to access specific objects.objects. Open SystemsOpen Systems Allow users to have complete access to allAllow users to have complete access to all objects within the database.objects within the database.
  • 9. A DBMS may permit both individual userA DBMS may permit both individual user identifiers and group identifiers to beidentifiers and group identifiers to be created.created. Certain privileges may be associated withCertain privileges may be associated with specific identifiers, which indicate whatspecific identifiers, which indicate what kind of privilege is allowed with certainkind of privilege is allowed with certain with certain database objects.with certain database objects.
  • 10. Each privileges has a binary valueEach privileges has a binary value associated with it. The binary values areassociated with it. The binary values are summed and the total value indicates whatsummed and the total value indicates what privileges are allowed for a specific user orprivileges are allowed for a specific user or group with a particular object.group with a particular object.
  • 11. User & Group IdentifierUser & Group Identifier UserUser IdentifierIdentifier TypeType GroupGroup MemberMember IdentifierIdentifier SG37SG37 UserUser SalesSales SG37SG37 SG14SG14 UserUser SalesSales SG14SG14 SG5SG5 UserUser SalesSales GroupGroup
  • 12. Access Control MatrixAccess Control Matrix UserUser IdentifierIdentifier Property#Property# TypeType PricePrice Owner#Owner# Staff#Staff# Branch#Branch# QueryQuery RowRow LimitLimit SalesSales 00010001 00010001 00010001 00000000 00000000 00000000 1515 SG37SG37 01010101 01010101 01110111 01010101 01110111 00000000 100100 SG5SG5 11111111 11111111 11111111 11111111 11111111 11111111 nonenone SELECTSELECT UPDATEUPDATE INSERTINSERT DELETEDELETE ALLALL 00010001 00100010 01000100 10001000 11111111
  • 13. ViewsViews Is the dynamic result of one or moreIs the dynamic result of one or more relational operations operating on therelational operations operating on the base relations to produce another relation.base relations to produce another relation. A view is a virtual relation that does notA view is a virtual relation that does not actually exist in the database, but isactually exist in the database, but is produced upon request by a particularproduced upon request by a particular user, at the time of request.user, at the time of request.
  • 14. Views (Cont)Views (Cont) The view mechanism provides a powerfulThe view mechanism provides a powerful and flexible security mechanism by hidingand flexible security mechanism by hiding parts of the database from certain users.parts of the database from certain users. The user is not aware of the existence ofThe user is not aware of the existence of any attributes or rows that are missingany attributes or rows that are missing from the view.from the view.
  • 15. Backup & RecoveryBackup & Recovery Is the process of periodically taking a copyIs the process of periodically taking a copy of the database and log file on to offlineof the database and log file on to offline storage media.storage media. DBMS should provide backup facilities toDBMS should provide backup facilities to assist with the recovery of a databaseassist with the recovery of a database failure.failure.
  • 16. IntegrityIntegrity Maintaining a secure database system byMaintaining a secure database system by preventing data from becoming invalid.preventing data from becoming invalid.
  • 17. EncryptionEncryption The encoding of data by a special algorithmThe encoding of data by a special algorithm that renders the data unreadable by anythat renders the data unreadable by any program without the decryption key.program without the decryption key. There will be degradation in performanceThere will be degradation in performance because of the time taken to decode it.because of the time taken to decode it. It also protects the data transmitted overIt also protects the data transmitted over communication lines.communication lines.
  • 18. RAIDRAID Redundant Array of Independent DisksRedundant Array of Independent Disks The hardware that the DBMS is running onThe hardware that the DBMS is running on must be fault-tolerant, meaning that themust be fault-tolerant, meaning that the DBMS should continue to operate even ifDBMS should continue to operate even if one of the hardware components fails.one of the hardware components fails. One solution is the use of RAID technology.One solution is the use of RAID technology.
  • 19. RAID (Cont)RAID (Cont) RAID works on having a large disk arrayRAID works on having a large disk array comprising an arrangement of severalcomprising an arrangement of several independent disks that are organized toindependent disks that are organized to improve reliability and at the same timeimprove reliability and at the same time increase performance.increase performance.