SlideShare a Scribd company logo
5
Most read
6
Most read
10
Most read
A Presentation by : Amir Khanzada 
Roll No: 2k11/SWE/24 
1
OUTLINE 
 Overview To Database Security. 
 What is Database Security 
 Why need of database security. 
 Concepts of Database Security. 
 Security Problems 
 Security Controls 
2
Mobile Computer 
Vehicles 
OVERVI 
EW 
In today’s world, we need everything secured whether it 
is your mobile phone , computer , vehicle or almost 
anything. 
3
What is database 
Database: security? 
It is a collection of information stored in a computer. 
Security: 
It is being free from danger. 
Database Security: 
It is the mechanisms that protect the database against intentional or 
accidental threats. 
4
Definition of Database Security 
Database Security is 
defined as the process by 
which “Confidentiality, 
Integrity and Availability” of 
the database can be 
protected 
5
Why need of database security? 
If there is no 
security to 
database what 
happens??? 
Data will be easily 
corrupted 
It is important to restrict access 
to the database from authorized 
users to protect sensitive data. 
6
Concepts of Database Security 
Three are 3 main aspects 
1. Secrecy or Confidentiality 
2. Integrity 
3. Availability 
7
SECRECY / 
 It is protecting the database from unauthorized users. 
Ensures that users are allowed to do the things they are 
trying to do. 
 Encryption is a technique or a process by which the data 
is encoded in such a way that only that authorized users 
are able to read the data. 
8
9 
INTEGRITY 
 Protecting the database from authorized users. 
Ensures that what users are trying to do is correct. 
For examples, 
 An employee should be able to modify his or her own 
information.
10 
AVAILABILITY 
 Database must have not unplanned downtime. 
 To ensure this ,following steps should be taken 
Restrict the amount of the storage space given to each user in the 
database. 
 Limit the number of concurrent sessions made available to each 
database user. 
Back up the data at periodic intervals to ensure data recovery in case of 
application users.
SECURITY 
PROBLEMS 
11
Any circumstance or event with the potential to adversely 
impact an IS through unauthorized access, destruction, 
disclosure, modification of data, and/or denial of service. 
There are two kinds of threat. 
Non-fraudulent Threat 
fraudulent Threat 
12
1. Non-fraudulent Threat 
 Natural or accidental disasters. 
 Errors or bugs in hardware or software. 
 Human errors. 
2. fraudulent Threat 
 Authorized users 
 Those who abuse their privileges and authority. 
 Hostile agents 
 Those improper users (outsider or insiders). 
 who attack the software and/or hardware system, or read or 
write data in a database. 
13
DATABASE PROTECTION 
REQUIREMENTS 
1. Protection from Improper Access 
2. Protection from Inference 
3. Integrity of the Database 
4. User Authentication 
5. Multilevel Protection 
6. Confinement 
7. Management and Protection of Sensitive Data 
14
SECURITY 
CONTROLS 
15
 Authorization - privileges, views. 
 Encryption - public key / private key, secure 
sockets. 
 Authentication – passwords. 
 Logical - firewalls, net proxies. 
16
A FIREWALL is dedicated software on another computer which 
inspects network traffic passing through it and denies (or) permits 
passage based on set of rules. Basically it is a piece of software that 
monitors all traffic that goes from your system to another via the 
Internet or network and Vice Versa 
Database Firewalls are a type ofWeb Application Firewalls that 
monitor databases to identify and protect against database specific 
attacks that mostly seek to access sensitive information stored in the 
databases. 
17
18
 Data encryption enables to encrypt sensitive data, such as credit 
card numbers, stored in table columns. 
 Encrypted data is decrypted for a database user who has access to 
the data. 
 Data encryption helps protect data stored on media in the event 
that the storage media or data file gets stolen. 
19
 As a security administrator, one can be sure that sensitive data is safe in 
case the storage media or data file gets stolen. 
 You do not need to create triggers or views to decrypt data. Data from 
tables is decrypted for the database user. 
 Database users need not be aware of the fact that the data they are 
accessing is stored in encrypted form. Data is transparently decrypted for 
the database users and does not require any action on their part. 
 Applications need not be modified to handle encrypted data. Data 
encryption/decryption is managed by the database. 
20
 Read authorization - allows reading, but not modification of data 
 Insert authorization - allows insertion of new data, but not 
modification of existing data. 
 Update authorization - allows modification, but not deletion of data. 
 Delete authorization - allows deletion of data 
21
select: allows read access to relation, or the ability to query using the view 
insert: the ability to insert tuples 
update: the ability to update using the SQL update statement 
delete: the ability to delete tuples. 
22
With grant option: 
allows a user who is 
granted a privilege to 
pass the privilege on 
to other users. 
Example: 
grant select on 
branch to U1 with 
grant option 
gives U1 the select 
privileges on branch and 
allows U1 to grant this 
privilege to others 
23
24

More Related Content

PPTX
Database security
PPTX
Database security
PPTX
Database Security
PPTX
Database security
PPT
Database Security
PPTX
Database security
PPT
DB security
PPT
Database security
 
Database security
Database security
Database Security
Database security
Database Security
Database security
DB security
Database security
 

What's hot (20)

PPTX
Symmetric and asymmetric key
PPTX
Cryptography and network security
PPTX
Data mining
PPTX
Introduction to Information Security
PPTX
User authentication
 
PPT
Network security
PPTX
Database recovery
PPTX
Network security (vulnerabilities, threats, and attacks)
PPTX
Key management and distribution
PPTX
Cia security model
PPTX
Cryptography
PPTX
Intrusion detection
 
PPTX
IPv4 Addressing
PPTX
SQL INJECTION
PPTX
Network security
PPT
Security models
PPT
Network Security
PPT
Data preprocessing
PPT
Information Security Principles - Access Control
PPTX
What is Cryptography and Types of attacks in it
Symmetric and asymmetric key
Cryptography and network security
Data mining
Introduction to Information Security
User authentication
 
Network security
Database recovery
Network security (vulnerabilities, threats, and attacks)
Key management and distribution
Cia security model
Cryptography
Intrusion detection
 
IPv4 Addressing
SQL INJECTION
Network security
Security models
Network Security
Data preprocessing
Information Security Principles - Access Control
What is Cryptography and Types of attacks in it
Ad

Viewers also liked (7)

PPTX
Database Design
PPTX
Methodology conceptual databases design roll no. 99 & 111
PPTX
Topic 4 database recovery
PPTX
Data recovery
PDF
Database backup and recovery
PPT
Data integrity
PPT
Data integrity
Database Design
Methodology conceptual databases design roll no. 99 & 111
Topic 4 database recovery
Data recovery
Database backup and recovery
Data integrity
Data integrity
Ad

Similar to Database security (20)

PDF
databasesecurit-phpapp01.pdf
PDF
uu (2).pdf
PPTX
Database Security Management
PPTX
Database Security, Threats & Countermeasures.pptx
PPT
UNIT 1 DBMS Security made by me it hrlps you to makr your future bright.ppt
PDF
Database security presentation in easy way
PPTX
Database security in database management.pptx
PPTX
203135 Muhammad Usama.pptx
PPTX
Database Security and analyzing information
PPT
Data base security
PPTX
3130703_DBMS_GTU_Study_Material_Presentations_Unit-8_16102020044754AM.pptx
PPTX
Database security and security in networks
PPTX
Database Security and Management Systems
PPTX
Database security and privacy
PPTX
Data base security & integrity
PPT
Database Security
PPTX
Database Security Methods, DAC, MAC,View
PPTX
Database Security Presentation Why database Security is important
PPTX
Security of the database
PPTX
Presentation on Database Security in DBMS
databasesecurit-phpapp01.pdf
uu (2).pdf
Database Security Management
Database Security, Threats & Countermeasures.pptx
UNIT 1 DBMS Security made by me it hrlps you to makr your future bright.ppt
Database security presentation in easy way
Database security in database management.pptx
203135 Muhammad Usama.pptx
Database Security and analyzing information
Data base security
3130703_DBMS_GTU_Study_Material_Presentations_Unit-8_16102020044754AM.pptx
Database security and security in networks
Database Security and Management Systems
Database security and privacy
Data base security & integrity
Database Security
Database Security Methods, DAC, MAC,View
Database Security Presentation Why database Security is important
Security of the database
Presentation on Database Security in DBMS

Recently uploaded (20)

PPTX
Reimagine Home Health with the Power of Agentic AI​
PDF
medical staffing services at VALiNTRY
PPTX
ai tools demonstartion for schools and inter college
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PDF
top salesforce developer skills in 2025.pdf
PDF
System and Network Administraation Chapter 3
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PDF
How Creative Agencies Leverage Project Management Software.pdf
PDF
Understanding Forklifts - TECH EHS Solution
PPTX
Essential Infomation Tech presentation.pptx
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PPTX
Introduction to Artificial Intelligence
Reimagine Home Health with the Power of Agentic AI​
medical staffing services at VALiNTRY
ai tools demonstartion for schools and inter college
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
Internet Downloader Manager (IDM) Crack 6.42 Build 41
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
top salesforce developer skills in 2025.pdf
System and Network Administraation Chapter 3
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
How Creative Agencies Leverage Project Management Software.pdf
Understanding Forklifts - TECH EHS Solution
Essential Infomation Tech presentation.pptx
Design an Analysis of Algorithms I-SECS-1021-03
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
Design an Analysis of Algorithms II-SECS-1021-03
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
Navsoft: AI-Powered Business Solutions & Custom Software Development
Introduction to Artificial Intelligence

Database security

  • 1. A Presentation by : Amir Khanzada Roll No: 2k11/SWE/24 1
  • 2. OUTLINE  Overview To Database Security.  What is Database Security  Why need of database security.  Concepts of Database Security.  Security Problems  Security Controls 2
  • 3. Mobile Computer Vehicles OVERVI EW In today’s world, we need everything secured whether it is your mobile phone , computer , vehicle or almost anything. 3
  • 4. What is database Database: security? It is a collection of information stored in a computer. Security: It is being free from danger. Database Security: It is the mechanisms that protect the database against intentional or accidental threats. 4
  • 5. Definition of Database Security Database Security is defined as the process by which “Confidentiality, Integrity and Availability” of the database can be protected 5
  • 6. Why need of database security? If there is no security to database what happens??? Data will be easily corrupted It is important to restrict access to the database from authorized users to protect sensitive data. 6
  • 7. Concepts of Database Security Three are 3 main aspects 1. Secrecy or Confidentiality 2. Integrity 3. Availability 7
  • 8. SECRECY /  It is protecting the database from unauthorized users. Ensures that users are allowed to do the things they are trying to do.  Encryption is a technique or a process by which the data is encoded in such a way that only that authorized users are able to read the data. 8
  • 9. 9 INTEGRITY  Protecting the database from authorized users. Ensures that what users are trying to do is correct. For examples,  An employee should be able to modify his or her own information.
  • 10. 10 AVAILABILITY  Database must have not unplanned downtime.  To ensure this ,following steps should be taken Restrict the amount of the storage space given to each user in the database.  Limit the number of concurrent sessions made available to each database user. Back up the data at periodic intervals to ensure data recovery in case of application users.
  • 12. Any circumstance or event with the potential to adversely impact an IS through unauthorized access, destruction, disclosure, modification of data, and/or denial of service. There are two kinds of threat. Non-fraudulent Threat fraudulent Threat 12
  • 13. 1. Non-fraudulent Threat  Natural or accidental disasters.  Errors or bugs in hardware or software.  Human errors. 2. fraudulent Threat  Authorized users  Those who abuse their privileges and authority.  Hostile agents  Those improper users (outsider or insiders).  who attack the software and/or hardware system, or read or write data in a database. 13
  • 14. DATABASE PROTECTION REQUIREMENTS 1. Protection from Improper Access 2. Protection from Inference 3. Integrity of the Database 4. User Authentication 5. Multilevel Protection 6. Confinement 7. Management and Protection of Sensitive Data 14
  • 16.  Authorization - privileges, views.  Encryption - public key / private key, secure sockets.  Authentication – passwords.  Logical - firewalls, net proxies. 16
  • 17. A FIREWALL is dedicated software on another computer which inspects network traffic passing through it and denies (or) permits passage based on set of rules. Basically it is a piece of software that monitors all traffic that goes from your system to another via the Internet or network and Vice Versa Database Firewalls are a type ofWeb Application Firewalls that monitor databases to identify and protect against database specific attacks that mostly seek to access sensitive information stored in the databases. 17
  • 18. 18
  • 19.  Data encryption enables to encrypt sensitive data, such as credit card numbers, stored in table columns.  Encrypted data is decrypted for a database user who has access to the data.  Data encryption helps protect data stored on media in the event that the storage media or data file gets stolen. 19
  • 20.  As a security administrator, one can be sure that sensitive data is safe in case the storage media or data file gets stolen.  You do not need to create triggers or views to decrypt data. Data from tables is decrypted for the database user.  Database users need not be aware of the fact that the data they are accessing is stored in encrypted form. Data is transparently decrypted for the database users and does not require any action on their part.  Applications need not be modified to handle encrypted data. Data encryption/decryption is managed by the database. 20
  • 21.  Read authorization - allows reading, but not modification of data  Insert authorization - allows insertion of new data, but not modification of existing data.  Update authorization - allows modification, but not deletion of data.  Delete authorization - allows deletion of data 21
  • 22. select: allows read access to relation, or the ability to query using the view insert: the ability to insert tuples update: the ability to update using the SQL update statement delete: the ability to delete tuples. 22
  • 23. With grant option: allows a user who is granted a privilege to pass the privilege on to other users. Example: grant select on branch to U1 with grant option gives U1 the select privileges on branch and allows U1 to grant this privilege to others 23
  • 24. 24