SlideShare a Scribd company logo
Database & Data Security
 Every company needs places to store institutional knowledge and
data.
 Frequently that data contains proprietary information
› Personally Identifiable Data
› Employee HR Data
› Financial Data
 The security and confidentiality of this data is of critical importance.
 There are four key issues in the security of databases just as with
all security systems
› Availability
› Authenticity
› Integrity
› Confidentiality
 Data needs to be available at all necessary times
 Data needs to be available to only the appropriate users
 Need to be able to track who has access to and who has accessed
what data
 Need to ensure that the data has been edited by an authorized
source
 Need to confirm that users accessing the system are who they say
they are
 Need to verify that all report requests are from authorized users
 Need to verify that any outbound data is going to the expected
receiver
 Need to verify that any external data has the correct formatting and
other metadata
 Need to verify that all input data is accurate and verifiable
 Need to ensure that data is following the correct work flow rules for
your institution/corporation
 Need to be able to report on all data changes and who authored
them to ensure compliance with corporate rules and privacy laws.
 Need to ensure that confidential data is only available to correct
people
 Need to ensure that entire database is security from external and
internal system breaches
 Need to provide for reporting on who has accessed what data and
what they have done with it
 Mission critical and Legal sensitive data must be highly security at
the potential risk of lost business and litigation
 Although the 4 pillars are of equal importance we are focusing on
Confidentiality due to the prevalence of data loss in financial and
personal areas
 We are going to review solutions for
› Internal data loss
› External hacking
› Securing data if hardware stolen
› Unapproved Administrator Access
 Another set of security issues come from
middleware that sits between the user
and the data
 Single sign on authentication
› Allows users to just have one password to
access all systems but also means that the
theft of one password endangers all systems
 Most companies have several types of databases so to ensure total
security across databases they hire 3rd
party Database Security
 Those companies have solutions for Database Activity Monitoring
(DAM)
 Prices range from $20K to $1 Million
 Another option is data masking – buying a fake data set for
development and testing.
 Vendors such as Oracle, Microsoft and IBM know that security is a
big concern for data systems.
 They create built in solutions such as:
› Password Controls
› Data access based on roles and profiles
› IP restrictions for off site access
› Auditing capabilities of who has run what reports
› Security logging
Solution Description Pros Cons
Complex Passwords
(require numbers and
symbols) as well as
frequent password
changes
Makes passwords harder
to guess and harder to
crack
Users write them down
and keep them next to
computer or forget and
need multiple resets
Keep Internal and
External facing
databases separate
Makes it very hard to
hack one and then get
through to the other
Reduces functionality of
databases and restricts
flow of internal data
Restrict Downloading Keeps data in the
database and not loose
in excel, etc
Restricts reporting
capabilities and off line
functionality
Restrict Unwanted
Connections
Again makes it harder
to worm from one
system to another
Makes integration more
difficult and can reduce
user acceptance
SAML (Security Assertion
Markup Language)
SAML is the standard
that is used for Single
Sign On functionality
If not in use blocks the
usage of single sign on
Database & Data Security

More Related Content

PDF
Flash Friday: Data Quality & GDPR
DOCX
Data Security
PPTX
Compliant Email Solutions for HIPAA & SOX regulations
PDF
Enterprise Data Privacy Quiz
PPTX
Sensitive data
PDF
Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.
PDF
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
PDF
Cross border - off-shoring and outsourcing privacy sensitive data
Flash Friday: Data Quality & GDPR
Data Security
Compliant Email Solutions for HIPAA & SOX regulations
Enterprise Data Privacy Quiz
Sensitive data
Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Cross border - off-shoring and outsourcing privacy sensitive data

What's hot (20)

PPTX
what is data security full ppt
PPTX
Ivanti Threat Thursday for January 23
PPTX
Digital Rights Management One For Sharepoint
PPT
M014 Confluence Presentation 08 15 06
PPTX
Data lake protection ft 3119 -ver1.0
PPTX
Logs in Security and Compliance flare
PPT
Microsoft Rights Management
PDF
08. icv sastanak (microsoft) nikola office 2013
PPTX
General Data Protection Regulation (GDPR)
PDF
Data classification-policy
PPTX
GDPR & Your Cloud Provider - What You Need to Know
PPT
Enterprise Digital Rights Management (Persistent Security)
PDF
Get your Enterprise Ready for GDPR
PDF
Identity and Access Intelligence
PDF
CHINO poster IM/IFIP
PPTX
Secure Channels Financal Institution Presentation
PPT
Fasoo Company And Product Information
PPT
Securing Business: Strategic Enablement of Users
PPTX
EU's General Data Protection Regulation (GDPR)
what is data security full ppt
Ivanti Threat Thursday for January 23
Digital Rights Management One For Sharepoint
M014 Confluence Presentation 08 15 06
Data lake protection ft 3119 -ver1.0
Logs in Security and Compliance flare
Microsoft Rights Management
08. icv sastanak (microsoft) nikola office 2013
General Data Protection Regulation (GDPR)
Data classification-policy
GDPR & Your Cloud Provider - What You Need to Know
Enterprise Digital Rights Management (Persistent Security)
Get your Enterprise Ready for GDPR
Identity and Access Intelligence
CHINO poster IM/IFIP
Secure Channels Financal Institution Presentation
Fasoo Company And Product Information
Securing Business: Strategic Enablement of Users
EU's General Data Protection Regulation (GDPR)
Ad

Viewers also liked (9)

PDF
Dotnet datamining ieee projects 2012 @ Seabirds ( Chennai, Pondicherry, Vello...
PPT
Database security
PDF
Data and database security and controls
PPTX
Dfc2043 operating system; open & closed source systems
PPTX
Modern Data Security for the Enterprises – SQL Server & Azure SQL Database
PDF
Weka project - DataMining
PDF
Data- and database security & GDPR: end-to-end offer
PPT
006.itsecurity bcp v1
PPT
Database Security
Dotnet datamining ieee projects 2012 @ Seabirds ( Chennai, Pondicherry, Vello...
Database security
Data and database security and controls
Dfc2043 operating system; open & closed source systems
Modern Data Security for the Enterprises – SQL Server & Azure SQL Database
Weka project - DataMining
Data- and database security & GDPR: end-to-end offer
006.itsecurity bcp v1
Database Security
Ad

Similar to Database & Data Security (20)

PPTX
Data security
PPTX
Data security
PDF
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
PPTX
what is data security full ppt
PDF
Office 365 Security, Privacy and Compliance - SMB Nation 2015
PPTX
Identity and Security in the Cloud
PPTX
Database systems and cloud computing.pptx
PDF
Office 365 Security Features That Nonprofits Should Know and Use
PPT
Dstca
PDF
Data compliance - get it right the first time (Black/White printable PDF)
PDF
Bridging the Data Security Gap
PDF
Wp security-data-safe
PDF
Data compliance - get it right the first time (Full color PDF)
PPTX
GDPR Part 2: Quest Relevance
PPTX
Data protection and privacy in the world of database DevOps
PPTX
Data security
DOCX
Question 1Discuss why those in the human resource development po.docx
PPTX
Privacy Preserved Data Augmentation using Enterprise Data Fabric
PPTX
Understanding Database Encryption & Protecting Against the Insider Threat wit...
PPT
Data Classification Presentation
Data security
Data security
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
what is data security full ppt
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Identity and Security in the Cloud
Database systems and cloud computing.pptx
Office 365 Security Features That Nonprofits Should Know and Use
Dstca
Data compliance - get it right the first time (Black/White printable PDF)
Bridging the Data Security Gap
Wp security-data-safe
Data compliance - get it right the first time (Full color PDF)
GDPR Part 2: Quest Relevance
Data protection and privacy in the world of database DevOps
Data security
Question 1Discuss why those in the human resource development po.docx
Privacy Preserved Data Augmentation using Enterprise Data Fabric
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Data Classification Presentation

More from Cloudbells.com (10)

PPT
Operating-System Structures
PPT
Raid : Redundant Array of Inexpensive Disks
PPT
Internet
PPT
Introduction to Data Management
PPT
Introductin to Data Modeling.
PPT
Client-Server Computing
PPT
Data mining
PPT
Green datacenters
PPT
Big data : Coudbells.com
PPT
Introduction to Web Hosting.
Operating-System Structures
Raid : Redundant Array of Inexpensive Disks
Internet
Introduction to Data Management
Introductin to Data Modeling.
Client-Server Computing
Data mining
Green datacenters
Big data : Coudbells.com
Introduction to Web Hosting.

Recently uploaded (20)

PPT
Miokarditis (Inflamasi pada Otot Jantung)
PPTX
IBA_Chapter_11_Slides_Final_Accessible.pptx
PPTX
Microsoft-Fabric-Unifying-Analytics-for-the-Modern-Enterprise Solution.pptx
PPTX
oil_refinery_comprehensive_20250804084928 (1).pptx
PPTX
SAP 2 completion done . PRESENTATION.pptx
PDF
Mega Projects Data Mega Projects Data
PDF
Galatica Smart Energy Infrastructure Startup Pitch Deck
PPTX
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
PDF
[EN] Industrial Machine Downtime Prediction
PDF
Fluorescence-microscope_Botany_detailed content
PPTX
1_Introduction to advance data techniques.pptx
PPTX
ALIMENTARY AND BILIARY CONDITIONS 3-1.pptx
PPTX
Introduction to Knowledge Engineering Part 1
PPTX
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
PDF
Introduction to the R Programming Language
PPTX
01_intro xxxxxxxxxxfffffffffffaaaaaaaaaaafg
PPTX
Data_Analytics_and_PowerBI_Presentation.pptx
PDF
Recruitment and Placement PPT.pdfbjfibjdfbjfobj
PDF
Lecture1 pattern recognition............
PPTX
Market Analysis -202507- Wind-Solar+Hybrid+Street+Lights+for+the+North+Amer...
Miokarditis (Inflamasi pada Otot Jantung)
IBA_Chapter_11_Slides_Final_Accessible.pptx
Microsoft-Fabric-Unifying-Analytics-for-the-Modern-Enterprise Solution.pptx
oil_refinery_comprehensive_20250804084928 (1).pptx
SAP 2 completion done . PRESENTATION.pptx
Mega Projects Data Mega Projects Data
Galatica Smart Energy Infrastructure Startup Pitch Deck
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
[EN] Industrial Machine Downtime Prediction
Fluorescence-microscope_Botany_detailed content
1_Introduction to advance data techniques.pptx
ALIMENTARY AND BILIARY CONDITIONS 3-1.pptx
Introduction to Knowledge Engineering Part 1
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
Introduction to the R Programming Language
01_intro xxxxxxxxxxfffffffffffaaaaaaaaaaafg
Data_Analytics_and_PowerBI_Presentation.pptx
Recruitment and Placement PPT.pdfbjfibjdfbjfobj
Lecture1 pattern recognition............
Market Analysis -202507- Wind-Solar+Hybrid+Street+Lights+for+the+North+Amer...

Database & Data Security

  • 2.  Every company needs places to store institutional knowledge and data.  Frequently that data contains proprietary information › Personally Identifiable Data › Employee HR Data › Financial Data  The security and confidentiality of this data is of critical importance.
  • 3.  There are four key issues in the security of databases just as with all security systems › Availability › Authenticity › Integrity › Confidentiality
  • 4.  Data needs to be available at all necessary times  Data needs to be available to only the appropriate users  Need to be able to track who has access to and who has accessed what data
  • 5.  Need to ensure that the data has been edited by an authorized source  Need to confirm that users accessing the system are who they say they are  Need to verify that all report requests are from authorized users  Need to verify that any outbound data is going to the expected receiver
  • 6.  Need to verify that any external data has the correct formatting and other metadata  Need to verify that all input data is accurate and verifiable  Need to ensure that data is following the correct work flow rules for your institution/corporation  Need to be able to report on all data changes and who authored them to ensure compliance with corporate rules and privacy laws.
  • 7.  Need to ensure that confidential data is only available to correct people  Need to ensure that entire database is security from external and internal system breaches  Need to provide for reporting on who has accessed what data and what they have done with it  Mission critical and Legal sensitive data must be highly security at the potential risk of lost business and litigation
  • 8.  Although the 4 pillars are of equal importance we are focusing on Confidentiality due to the prevalence of data loss in financial and personal areas  We are going to review solutions for › Internal data loss › External hacking › Securing data if hardware stolen › Unapproved Administrator Access
  • 9.  Another set of security issues come from middleware that sits between the user and the data  Single sign on authentication › Allows users to just have one password to access all systems but also means that the theft of one password endangers all systems
  • 10.  Most companies have several types of databases so to ensure total security across databases they hire 3rd party Database Security  Those companies have solutions for Database Activity Monitoring (DAM)  Prices range from $20K to $1 Million  Another option is data masking – buying a fake data set for development and testing.
  • 11.  Vendors such as Oracle, Microsoft and IBM know that security is a big concern for data systems.  They create built in solutions such as: › Password Controls › Data access based on roles and profiles › IP restrictions for off site access › Auditing capabilities of who has run what reports › Security logging
  • 12. Solution Description Pros Cons Complex Passwords (require numbers and symbols) as well as frequent password changes Makes passwords harder to guess and harder to crack Users write them down and keep them next to computer or forget and need multiple resets Keep Internal and External facing databases separate Makes it very hard to hack one and then get through to the other Reduces functionality of databases and restricts flow of internal data Restrict Downloading Keeps data in the database and not loose in excel, etc Restricts reporting capabilities and off line functionality Restrict Unwanted Connections Again makes it harder to worm from one system to another Makes integration more difficult and can reduce user acceptance SAML (Security Assertion Markup Language) SAML is the standard that is used for Single Sign On functionality If not in use blocks the usage of single sign on