SlideShare a Scribd company logo
Use firewalls
• Firewalls can help to limit access to database.
• Either conventional firewall or a specialized SQL firewall can be used.
• In conventional firewall, only filter of IP addresses and ports therefore it can
only help with addresses that exist in the TCP/IP header
• SQL firewalls, can set policies that are based not only on IP addresses but also
on SQL commands, database users, application types, and database objects.
• More about SQL firewalls in Chapter 5.
• In an Oracle environment sometimes it redirects traffic—after the client
engages the listener, it may be told to redirect to another port on which the
rest of the session will occur.
• Choosing a firewall that supports SQL*Net/Net8/Net9 redirection resolves
the problem
– the firewall will inspect the packet payload and look for the port that the client is
being told to move to, and then will dynamically open that port for this client only.
Summary
• Focus on Database Security: The chapter emphasizes the importance of
securing a database, which is essentially a set of services open to the network,
waiting to respond to requests.
• Understanding Attacks: Hackers can exploit weaknesses in these services by
sending incorrect (malformed) requests to specific network "ports" (digital entry
points) where the database listens for incoming data.
• Reduce Exposure: By turning off any unused services and network options, you
reduce the chances of hackers exploiting them. If you’re not using something,
it’s best to disable it to keep it from becoming a security risk.
• Monitor and Analyze Continuously: It’s crucial to regularly monitor and analyze
all active ports, services, and security settings to prevent any potential misuse or
attack.
• Networking Layer Focus: This chapter specifically looked at the "networking
layer" of the database, which is the part that listens and responds to data
requests.
network access map for database
environment
• Networking and database teams might not communicate often:
– many companies, network engineers (who manage routers, firewalls, and VLANs)
and database administrators (DBAs) are different groups.
– the database owner, may not be familiar with how the network is set up (like
which VLANs or routing rules affect your database).
• Risk of mutual ignorance:
– Networking staff may not know exactly what your database needs, and you might
not understand network topologies (how everything is connected).
– This lack of communication can lead to security risks or performance issues if
something is misconfigured.
– To keep your database environment secure and running smoothly, you must
understand how the network is configured and what can access the database.
• Even if networks are complicated, both the network and database teams
need to work together to avoid security gaps and ensure everything works
properly.
network access map for database
environment
• Network diagram is extremely useful because it allows you to quickly verify that your database is
being accessed from appropriate applications and/or people.
• However, like network diagrams, they can become unwieldy when you try to cram too much
information on a single page
– Overcrowded Connections:If there are many lines showing connections between endpoints, the diagram
becomes cluttered. It’s hard to tell which devices connect to which database or how data flows.
– Too Many Endpoints:Ï'dIf every server, application, or user device is shown individually, the diagram
becomes too detailed. Readers can get lost trying to follow all the elements.
– Complex IP Address Listings:Ï'dShowing every IP address or subnet can overwhelm the viewer. Identifying
patterns or critical access points becomes challenging when too much technical detail is presented at once.
– Overlapping Information:Ï'dLines may cross or overlap, making it hard to trace connections correctly. You
might accidentally misread a connection or skip an important one.
– Lack of Focus:Ï'dWhen the diagram includes all connections at once, important details (like high-risk paths)
may get buried in the noise. This makes it difficult to identify critical areas that need attention.
• How It Impacts Usability:Ñ
– .Slower decision-making: It takes longer for administrators to find relevant information.Ò
– .Higher chance of errors: Misinterpreting connections or missing critical relationships can lead to mistakes.
– Ó.Hard to troubleshoot: Pinpointing a problem in a sea of connections becomes time-consumingÏ'd
• Solution is using tabular reports
Track tools and applications
• 1. Know What’s Accessing Your Data: Track which tools,
versions, and software are accessing your database to
keep things secure.Ï'dÒ.
• Separate Access Types: Different types of users and tools
(like developers vs. regular users) can be separated, so it’s
easier to spot unusual or unauthorized access.Ï'dÓ.
• Better Security Tracking: By tracking where people are
connecting from and what tools they’re using, you can
better understand who is doing what and where they are.
the importance of tracking and auditing
• . Tracking Actions, Not Just Connections: When auditing database
activity, it’s useful to go beyond just knowing who connected. You also
want to see what commands or actions were actually performed during
each session.Ï'dÒ
• Accessing Command History: To check what was done, you’ll need
access to specific database tables or views (like V$SQL in Oracle or dbcc
inputbuffer in SQL Server) that store records of the commands
executed.Ï'dÓ.
• Using Built-In Monitoring: For simpler cases where only connection info
is needed, most databases offer built-in tools for tracking connections,
events, and other activities.Ï'dÔ.
• Challenge with Internal Tables: These internal tables update frequently,
so capturing a snapshot of activity at any moment can be challenging.
Use port scanners
• 1. Closing Unnecessary Ports:
• Ï'dIt’s good practice to turn off any communication methods (protocols) and network ports
that aren’t needed. Each open port is a possible way for hackers to access the system, so
closing unnecessary ones helps make the system safer.Ò.
• Using Port Scanners:Ï'dJust as hackers use tools called port scanners to find open ports and
services on a network, administrators should also use them to see what’s open on their own
systems.Ï'dThis helps administrators know exactly what services are accessible and may need
to be secured or turned off.Ó. Examples of Common Database Ports:Ï'd
• For example, SQL Server uses port 1433 by default, but many administrators might not realize
that another port, 1434 (UDP), is also open and could be exploited if not secured.Ï'd4
• Oracle Database Ports:Ï'dThe table shown lists common ports for Oracle databases:
• Ï'dPort 1521: Used by the Oracle Listener, which manages incoming connections.
• Ï'dPorts 1522–1540: Often used for the same purpose if multiple listeners are configured.Ï'd
• Port 1575: Used by the Oracle Names Server, a service that helps in identifying database
locations.
• two tools you should know about.
– Netstat
– nmap
Secure services from known network
attacks
• many network services within databases are particularly
vulnerable because they often use networking modules
that hackers can exploit through network attacks. This is
why network security is a major focus in cybersecurity.
• Network techniques are common among hackers because
the network is relatively accessible and because many
software modules that interface to the network can be
attacked by sending data packets that are malformed, that
exploit a bug, or that use a built-in feature in a way that
was not ever considered.
• SQL Slammer
SQL slammer
• Aliases : SQL Slammer, sapphire, W32.SQLExp.Worm
• Released : Jan 2003
• Worm
– Fastest worm in history
– Spread world-wide in under 10 minutes
– Doubled infections every 8.5 sec
– 376 byte long
• Platform: Microsoft SQL Server 2000
• Vulnerability :
– Target port 1434(SQL monitor)
– Causes Buffer overflow
– Obtains windows API func generator
– Initialize pseudo random number generator
– Continuously sends itself via UDP packets to random IP addresses
• Infected 2 lacs systems, disabled SQL server databases on infected machines, saturated world
network with tfc and Disrupted internet contv world-wide
• Damages : 13000 bank of America ATMs stopped working, airport check in kiosk stopped
working
Data and network security the basic concept of firewall

More Related Content

PPTX
DBMS Vulnerabilities And Threats.pptx
PPTX
Network Troubleshooting.pptx
PDF
Dist sniffing & scanning project
PPT
cyber forensics-enum,sniffing,malware threat.ppt
PDF
Network Analysis Mini Project 2.pdf
PPTX
Network Analysis Mini Project 2.pptx
PDF
How we breach small and medium enterprises (SMEs)
PPTX
Network traffic analysis with cyber security
DBMS Vulnerabilities And Threats.pptx
Network Troubleshooting.pptx
Dist sniffing & scanning project
cyber forensics-enum,sniffing,malware threat.ppt
Network Analysis Mini Project 2.pdf
Network Analysis Mini Project 2.pptx
How we breach small and medium enterprises (SMEs)
Network traffic analysis with cyber security

Similar to Data and network security the basic concept of firewall (20)

PDF
Ccna sec 01
PPTX
windows server installation procedure or
PPTX
Tech talk microservices debugging
PPTX
Debugging Microservices - key challenges and techniques - Microservices Odesa...
PPT
network-management Web base.ppt
PPTX
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
PPT
Networking
PPTX
Going outside the application
PDF
OpenStack Infrastructure at any Scale - Simple is BEST!? - - OpenStack最新情報セミ...
PPTX
open port exploitation : risks, vulnerabilities and defenses.pptx
PDF
It nv51 instructor_ppt_ch11
PDF
Sonali Bank Network Design Project Report
PPTX
PPTX
98 366 mva slides lesson 8
PDF
SDN Security Talk - (ISC)2_3
PPTX
Chapter 2-Risk in IT Infrastructure- Overview
PPTX
Client Server Network and Peer to Peer.pptx
PDF
A firewall is an important and necessary part of that security, but cannot be...
PPTX
Know the advantages and disadvantages of peer-to-peer network and a server-ba...
PPTX
Application and Website Security -- Designer Edition: Using Formal Specificat...
Ccna sec 01
windows server installation procedure or
Tech talk microservices debugging
Debugging Microservices - key challenges and techniques - Microservices Odesa...
network-management Web base.ppt
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Networking
Going outside the application
OpenStack Infrastructure at any Scale - Simple is BEST!? - - OpenStack最新情報セミ...
open port exploitation : risks, vulnerabilities and defenses.pptx
It nv51 instructor_ppt_ch11
Sonali Bank Network Design Project Report
98 366 mva slides lesson 8
SDN Security Talk - (ISC)2_3
Chapter 2-Risk in IT Infrastructure- Overview
Client Server Network and Peer to Peer.pptx
A firewall is an important and necessary part of that security, but cannot be...
Know the advantages and disadvantages of peer-to-peer network and a server-ba...
Application and Website Security -- Designer Edition: Using Formal Specificat...
Ad

Recently uploaded (20)

PDF
Empathic Computing: Creating Shared Understanding
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Electronic commerce courselecture one. Pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
sap open course for s4hana steps from ECC to s4
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Spectroscopy.pptx food analysis technology
PDF
Machine learning based COVID-19 study performance prediction
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
Cloud computing and distributed systems.
Empathic Computing: Creating Shared Understanding
20250228 LYD VKU AI Blended-Learning.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
Mobile App Security Testing_ A Comprehensive Guide.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Electronic commerce courselecture one. Pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
sap open course for s4hana steps from ECC to s4
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Spectroscopy.pptx food analysis technology
Machine learning based COVID-19 study performance prediction
Spectral efficient network and resource selection model in 5G networks
Reach Out and Touch Someone: Haptics and Empathic Computing
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Programs and apps: productivity, graphics, security and other tools
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Cloud computing and distributed systems.
Ad

Data and network security the basic concept of firewall

  • 1. Use firewalls • Firewalls can help to limit access to database. • Either conventional firewall or a specialized SQL firewall can be used. • In conventional firewall, only filter of IP addresses and ports therefore it can only help with addresses that exist in the TCP/IP header • SQL firewalls, can set policies that are based not only on IP addresses but also on SQL commands, database users, application types, and database objects. • More about SQL firewalls in Chapter 5. • In an Oracle environment sometimes it redirects traffic—after the client engages the listener, it may be told to redirect to another port on which the rest of the session will occur. • Choosing a firewall that supports SQL*Net/Net8/Net9 redirection resolves the problem – the firewall will inspect the packet payload and look for the port that the client is being told to move to, and then will dynamically open that port for this client only.
  • 2. Summary • Focus on Database Security: The chapter emphasizes the importance of securing a database, which is essentially a set of services open to the network, waiting to respond to requests. • Understanding Attacks: Hackers can exploit weaknesses in these services by sending incorrect (malformed) requests to specific network "ports" (digital entry points) where the database listens for incoming data. • Reduce Exposure: By turning off any unused services and network options, you reduce the chances of hackers exploiting them. If you’re not using something, it’s best to disable it to keep it from becoming a security risk. • Monitor and Analyze Continuously: It’s crucial to regularly monitor and analyze all active ports, services, and security settings to prevent any potential misuse or attack. • Networking Layer Focus: This chapter specifically looked at the "networking layer" of the database, which is the part that listens and responds to data requests.
  • 3. network access map for database environment • Networking and database teams might not communicate often: – many companies, network engineers (who manage routers, firewalls, and VLANs) and database administrators (DBAs) are different groups. – the database owner, may not be familiar with how the network is set up (like which VLANs or routing rules affect your database). • Risk of mutual ignorance: – Networking staff may not know exactly what your database needs, and you might not understand network topologies (how everything is connected). – This lack of communication can lead to security risks or performance issues if something is misconfigured. – To keep your database environment secure and running smoothly, you must understand how the network is configured and what can access the database. • Even if networks are complicated, both the network and database teams need to work together to avoid security gaps and ensure everything works properly.
  • 4. network access map for database environment • Network diagram is extremely useful because it allows you to quickly verify that your database is being accessed from appropriate applications and/or people. • However, like network diagrams, they can become unwieldy when you try to cram too much information on a single page – Overcrowded Connections:If there are many lines showing connections between endpoints, the diagram becomes cluttered. It’s hard to tell which devices connect to which database or how data flows. – Too Many Endpoints:Ï'dIf every server, application, or user device is shown individually, the diagram becomes too detailed. Readers can get lost trying to follow all the elements. – Complex IP Address Listings:Ï'dShowing every IP address or subnet can overwhelm the viewer. Identifying patterns or critical access points becomes challenging when too much technical detail is presented at once. – Overlapping Information:Ï'dLines may cross or overlap, making it hard to trace connections correctly. You might accidentally misread a connection or skip an important one. – Lack of Focus:Ï'dWhen the diagram includes all connections at once, important details (like high-risk paths) may get buried in the noise. This makes it difficult to identify critical areas that need attention. • How It Impacts Usability:Ñ – .Slower decision-making: It takes longer for administrators to find relevant information.Ò – .Higher chance of errors: Misinterpreting connections or missing critical relationships can lead to mistakes. – Ó.Hard to troubleshoot: Pinpointing a problem in a sea of connections becomes time-consumingÏ'd • Solution is using tabular reports
  • 5. Track tools and applications • 1. Know What’s Accessing Your Data: Track which tools, versions, and software are accessing your database to keep things secure.Ï'dÒ. • Separate Access Types: Different types of users and tools (like developers vs. regular users) can be separated, so it’s easier to spot unusual or unauthorized access.Ï'dÓ. • Better Security Tracking: By tracking where people are connecting from and what tools they’re using, you can better understand who is doing what and where they are.
  • 6. the importance of tracking and auditing • . Tracking Actions, Not Just Connections: When auditing database activity, it’s useful to go beyond just knowing who connected. You also want to see what commands or actions were actually performed during each session.Ï'dÒ • Accessing Command History: To check what was done, you’ll need access to specific database tables or views (like V$SQL in Oracle or dbcc inputbuffer in SQL Server) that store records of the commands executed.Ï'dÓ. • Using Built-In Monitoring: For simpler cases where only connection info is needed, most databases offer built-in tools for tracking connections, events, and other activities.Ï'dÔ. • Challenge with Internal Tables: These internal tables update frequently, so capturing a snapshot of activity at any moment can be challenging.
  • 7. Use port scanners • 1. Closing Unnecessary Ports: • Ï'dIt’s good practice to turn off any communication methods (protocols) and network ports that aren’t needed. Each open port is a possible way for hackers to access the system, so closing unnecessary ones helps make the system safer.Ò. • Using Port Scanners:Ï'dJust as hackers use tools called port scanners to find open ports and services on a network, administrators should also use them to see what’s open on their own systems.Ï'dThis helps administrators know exactly what services are accessible and may need to be secured or turned off.Ó. Examples of Common Database Ports:Ï'd • For example, SQL Server uses port 1433 by default, but many administrators might not realize that another port, 1434 (UDP), is also open and could be exploited if not secured.Ï'd4 • Oracle Database Ports:Ï'dThe table shown lists common ports for Oracle databases: • Ï'dPort 1521: Used by the Oracle Listener, which manages incoming connections. • Ï'dPorts 1522–1540: Often used for the same purpose if multiple listeners are configured.Ï'd • Port 1575: Used by the Oracle Names Server, a service that helps in identifying database locations. • two tools you should know about. – Netstat – nmap
  • 8. Secure services from known network attacks • many network services within databases are particularly vulnerable because they often use networking modules that hackers can exploit through network attacks. This is why network security is a major focus in cybersecurity. • Network techniques are common among hackers because the network is relatively accessible and because many software modules that interface to the network can be attacked by sending data packets that are malformed, that exploit a bug, or that use a built-in feature in a way that was not ever considered. • SQL Slammer
  • 9. SQL slammer • Aliases : SQL Slammer, sapphire, W32.SQLExp.Worm • Released : Jan 2003 • Worm – Fastest worm in history – Spread world-wide in under 10 minutes – Doubled infections every 8.5 sec – 376 byte long • Platform: Microsoft SQL Server 2000 • Vulnerability : – Target port 1434(SQL monitor) – Causes Buffer overflow – Obtains windows API func generator – Initialize pseudo random number generator – Continuously sends itself via UDP packets to random IP addresses • Infected 2 lacs systems, disabled SQL server databases on infected machines, saturated world network with tfc and Disrupted internet contv world-wide • Damages : 13000 bank of America ATMs stopped working, airport check in kiosk stopped working

Editor's Notes

  • #1: On the other hand