SlideShare a Scribd company logo
Security of the Database

A Presentation By_
Pratik Tamgadge
1/14/2014

1
Contents
• What is Database Security?

• Issues in Database security
• How to Secure?
–
–
–
–
–
–

Access Control Mechanism
Cryptography
Backup and Recovery
RAID Implementation
Views
Digital Signatures

• Security in Microsoft Access and Oracle DBMS

1/14/2014

2
What is Database Security?
• In today’s world, we need everything secured whether it is
your mobile phone , computer , vehicle or almost anything.
• So do your Database.

• As it stores your Personal, Confidential and Critical data.
• If we look at the definition part of Database Security , we may
say, It’s the mechanism that protects the database against
intentional or accidental threats.
1/14/2014

3
Issues in Database Security
• Unauthorized access to your Database.
• Managing large amount of data which belongs to
relatively large organization.
• Keeping track of all the authorized Users of the
Database.
• Physical Security.
• Network Security.
1/14/2014

4
Now How You’ll Secure it?
Well, these are some basic security measures which you can have to your Databases.

Access Control Mechanism
» As the name “Access Control” itself describes that this mechanism is all about
User’s Access to the Databases.
» In this mechanism, we have three kinds of Access Control.
1. Discretionary Access Control
2. Mandatory Access Control.
3. Role based Access Control.

1/14/2014

5
Discretionary Access Control
•

The word “Discretionary” means to act in a way to avoid the Revealing of Confidential
information.

•

In this method , we can GRANT and REVOKE privileges to different Users of the
Database.
Now you will think, what is this?
GRANT? REVOKE? Privileges?

Well, GRANT = “To allow” OR “To give some rights”,
REVOKE = “To cancel the GRANT” i.e. “Not to allow”
and Privileges = Permissions i.e. various commands like CREATE,UPDATE etc.
•
•

GRANT and REVOKE are Database Commands used to operate Database.
We will use these commands like this,

» GRANT [Privileges] ON [Database Objects] TO USER [With GRANT Option];
» REVOKE [Privileges] ON [Database Object] FROM USER;
1/14/2014

6
Mandatory Access Control
•
•
•

This method provides Multilevel Security by Classifying data and Users into
different SECURITY LEVELS.
Now in this, Security has its class or level.
Implementation of Mandatory Access Control is in,
– Government of Nations
– Military
– Business Intelligence

•

Mandatory Access Control provides Security for extreme Confidential Information.

•

Security Classes are like,
–
–
–
–

•
•

Top Security (TS)
Secret (S)
Confidential (C)
Unclassified (U)

Note : Intensity of Security is like,
TS > S > C > U

Now you will wonder how security is classified?
Well, it is classified using Bell-LaPadula Model.
1/14/2014

7
Role Based Access Control
• Roll based Access Control provides Security according to the
ROLE of the User who is accessing the Database.
• ROLE of the user is created using CREATE command.

• Role gives permissions to only authorized users to access the
data.
• Thus Roles provides security in a smart and simple way.

1/14/2014

8
Cryptography
• Cryptography is a way of enclosing the data called Encryption while Sending and
disclosing that data called Decryption while it is received.

• Have a look at this,

1/14/2014

9
Cryptography

contd.

• There are two types of Cryptography.
– Symmetric Key Cryptography
• In this , Both sender and receiver have the same key for
Encryption and Decryption.

– Asymmetric Key Cryptography
• In this , Sender uses Public Key for Encryption and
Receiver uses its own Private key for Decryption.
1/14/2014

10
Backup and Recovery
• Backup - The process of periodically taking a copy of
the database and log file on to offline storage media.
• Journaling - The process of keeping and maintaining
a log file (or journal) of all changes made to the
database to enable recovery to be undertaken
effectively in the event of a failure.

1/14/2014

11
RAID Implementation
RAID i.e. Redundant Array of Inexpensive Disks, is a category of disk drives that employ
two or more drives in combination for fault tolerance and Performance. This Array of
Disks have levels as follows,
•

Level 0: Provides data striping (spreading out blocks of each file across multiple disks) but no
redundancy. This improves performance but does not deliver fault tolerance.

•

Level 1: Provides disk mirroring.

•

Level 2: Error correcting Codes by using Parity Check.

•

Level 3: Same as Level 0, but also reserves one dedicated disk for error correction data. It
provides good performance and some level of fault tolerance.

•

Level 4: Uses Block level Stripping which keeps Parity block on a separate disk.

•

Level 5: Provides data striping at the byte level and also stripe error correction information.
This results in excellent performance and good fault tolerance.

•

Level 6: P+Q Redundancy Scheme i.e. Stores extra redundant information in case of disk
failures.
1/14/2014

12
Views
• A view is the dynamic result of one or more relational
operations operating on the base relations to produce
another relation. A view is a virtual relation that does not
actually exist in the database, but is produced upon request
by a particular user, at the time of request.
• The view mechanism provides a powerful and flexible security
mechanism by hiding parts of the database from certain
users.

1/14/2014

13
Message Digest Algorithms
and
Digital Signatures
• Message digest algorithm is the one-way hash function that
produces a fixed-length string (hash) from an arbitrary-sized
message. It’s computationally infeasible that there is another
message with the same digest, the digest does not reveal
anything about the message.
• Digital signature consist of two parts: a string of bits that is
computed from the message and the private key of
organization.
• Digital signature is used to verify that the message comes
from this organization.
1/14/2014

14
Security in Microsoft Access and Oracle DBMS
Microsoft Access
• System level security - password.
• User-level security - identification as a member of groups
(Administrators and Users), permissions are granted
(Open/Run, Read, Update, Delete, etc).

Oracle DBMS
• System level security - name, password.
• User-level security is based on a privilege, i.e a right to
execute a particular type of SQL statements or to access
another user’s object.
• System privileges and object privileges.
1/14/2014

15

End of the Presentation
Thank You!
1/14/2014

16

More Related Content

PPTX
Windows Server 2019.pptx
PPTX
Database Security
PDF
Chapter 5 database security
PPT
Database Security
PPTX
Introduction to Information Security
PPTX
Database security
PPTX
Database security and security in networks
PPTX
Operating system security
Windows Server 2019.pptx
Database Security
Chapter 5 database security
Database Security
Introduction to Information Security
Database security
Database security and security in networks
Operating system security

What's hot (20)

PDF
DNS Attacks
PDF
Network Security Fundamentals
PPTX
Database security
PPTX
Windows server
PPT
Data integrity
PPTX
Dns server
PPTX
Information Security Lecture #1 ppt
PPT
Secure Socket Layer
PPTX
Secure Socket Layer (SSL)
PPTX
Encryption
PPTX
Database security
PPTX
IP Security and its Components
PPTX
Backup and recovery
PPTX
Authentication, authorization, accounting(aaa) slides
PPT
Chapter07 Advanced File System Management
PPTX
Network Security
PPT
DB security
PPTX
Active directory domain service
PPTX
Sql injection
PPTX
Web application attacks
DNS Attacks
Network Security Fundamentals
Database security
Windows server
Data integrity
Dns server
Information Security Lecture #1 ppt
Secure Socket Layer
Secure Socket Layer (SSL)
Encryption
Database security
IP Security and its Components
Backup and recovery
Authentication, authorization, accounting(aaa) slides
Chapter07 Advanced File System Management
Network Security
DB security
Active directory domain service
Sql injection
Web application attacks
Ad

Viewers also liked (20)

PPTX
Database security
PDF
Database Security
PDF
Database security issues
PPT
Database Systems Security
PPT
Information Security Lesson 6 - Web Security - Eric Vanderburg
PPT
Database management system presentation
PPT
dos_security_final
PDF
Can Security Vulnerability Disclosure Processes Be Responsible, Rational and ...
PDF
An Overview of Security in Distributed Database Management System
PDF
نظام إدارة مؤسسات تعليم القران
PDF
Rfid tech for library | تحديد الهوية بموجات الراديو
PPSX
Information security presentation
PPTX
SSL/TLS Eavesdropping with Fullpath Control
PDF
Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses -- The...
PPTX
محاولة تأريخ لعلم الأجرام عبر الأنترنت
PPTX
حجية الدليل الرقمي وموقع المشروع اليبي
PDF
Truth and Consequences
PPTX
PDF
نظام إدارة المؤسسات التدربية التعليمية
PPTX
Data base testing
Database security
Database Security
Database security issues
Database Systems Security
Information Security Lesson 6 - Web Security - Eric Vanderburg
Database management system presentation
dos_security_final
Can Security Vulnerability Disclosure Processes Be Responsible, Rational and ...
An Overview of Security in Distributed Database Management System
نظام إدارة مؤسسات تعليم القران
Rfid tech for library | تحديد الهوية بموجات الراديو
Information security presentation
SSL/TLS Eavesdropping with Fullpath Control
Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses -- The...
محاولة تأريخ لعلم الأجرام عبر الأنترنت
حجية الدليل الرقمي وموقع المشروع اليبي
Truth and Consequences
نظام إدارة المؤسسات التدربية التعليمية
Data base testing
Ad

Similar to Security of the database (20)

PPTX
Database security and privacy
PPT
UNIT 1 DBMS Security made by me it hrlps you to makr your future bright.ppt
PDF
Data security and Integrity
PDF
uu (2).pdf
PPTX
ch20 Secuity & Admin Transparencies-6E.pptx
PPTX
Database security
PDF
databasesecurit-phpapp01.pdf
PPTX
Database Security and Management Systems
PPT
Dstca
PPTX
unit 5 in the database for master of Engineering
PPTX
01 database security ent-db
PPTX
Database modeling and security
PPTX
Database Security Methods, DAC, MAC,View
PPTX
Database security in database management.pptx
PPTX
Group 8 - Database Security Version 1.pptx
PPTX
Presentation on Database Security in DBMS
PPTX
MobileDBSecurity.pptx
PPTX
Database Security ppt on digital marketing
PPT
Security and Authorization introductory notes.ppt
PPT
Database security copy
Database security and privacy
UNIT 1 DBMS Security made by me it hrlps you to makr your future bright.ppt
Data security and Integrity
uu (2).pdf
ch20 Secuity & Admin Transparencies-6E.pptx
Database security
databasesecurit-phpapp01.pdf
Database Security and Management Systems
Dstca
unit 5 in the database for master of Engineering
01 database security ent-db
Database modeling and security
Database Security Methods, DAC, MAC,View
Database security in database management.pptx
Group 8 - Database Security Version 1.pptx
Presentation on Database Security in DBMS
MobileDBSecurity.pptx
Database Security ppt on digital marketing
Security and Authorization introductory notes.ppt
Database security copy

Recently uploaded (20)

PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
Cell Types and Its function , kingdom of life
PDF
01-Introduction-to-Information-Management.pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
Pharma ospi slides which help in ospi learning
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
Pre independence Education in Inndia.pdf
PDF
Basic Mud Logging Guide for educational purpose
PDF
Classroom Observation Tools for Teachers
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Supply Chain Operations Speaking Notes -ICLT Program
Anesthesia in Laparoscopic Surgery in India
Cell Types and Its function , kingdom of life
01-Introduction-to-Information-Management.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPH.pptx obstetrics and gynecology in nursing
Microbial diseases, their pathogenesis and prophylaxis
Pharma ospi slides which help in ospi learning
Abdominal Access Techniques with Prof. Dr. R K Mishra
TR - Agricultural Crops Production NC III.pdf
Pre independence Education in Inndia.pdf
Basic Mud Logging Guide for educational purpose
Classroom Observation Tools for Teachers
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
102 student loan defaulters named and shamed – Is someone you know on the list?
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Microbial disease of the cardiovascular and lymphatic systems
Chapter 2 Heredity, Prenatal Development, and Birth.pdf

Security of the database

  • 1. Security of the Database A Presentation By_ Pratik Tamgadge 1/14/2014 1
  • 2. Contents • What is Database Security? • Issues in Database security • How to Secure? – – – – – – Access Control Mechanism Cryptography Backup and Recovery RAID Implementation Views Digital Signatures • Security in Microsoft Access and Oracle DBMS 1/14/2014 2
  • 3. What is Database Security? • In today’s world, we need everything secured whether it is your mobile phone , computer , vehicle or almost anything. • So do your Database. • As it stores your Personal, Confidential and Critical data. • If we look at the definition part of Database Security , we may say, It’s the mechanism that protects the database against intentional or accidental threats. 1/14/2014 3
  • 4. Issues in Database Security • Unauthorized access to your Database. • Managing large amount of data which belongs to relatively large organization. • Keeping track of all the authorized Users of the Database. • Physical Security. • Network Security. 1/14/2014 4
  • 5. Now How You’ll Secure it? Well, these are some basic security measures which you can have to your Databases. Access Control Mechanism » As the name “Access Control” itself describes that this mechanism is all about User’s Access to the Databases. » In this mechanism, we have three kinds of Access Control. 1. Discretionary Access Control 2. Mandatory Access Control. 3. Role based Access Control. 1/14/2014 5
  • 6. Discretionary Access Control • The word “Discretionary” means to act in a way to avoid the Revealing of Confidential information. • In this method , we can GRANT and REVOKE privileges to different Users of the Database. Now you will think, what is this? GRANT? REVOKE? Privileges? Well, GRANT = “To allow” OR “To give some rights”, REVOKE = “To cancel the GRANT” i.e. “Not to allow” and Privileges = Permissions i.e. various commands like CREATE,UPDATE etc. • • GRANT and REVOKE are Database Commands used to operate Database. We will use these commands like this, » GRANT [Privileges] ON [Database Objects] TO USER [With GRANT Option]; » REVOKE [Privileges] ON [Database Object] FROM USER; 1/14/2014 6
  • 7. Mandatory Access Control • • • This method provides Multilevel Security by Classifying data and Users into different SECURITY LEVELS. Now in this, Security has its class or level. Implementation of Mandatory Access Control is in, – Government of Nations – Military – Business Intelligence • Mandatory Access Control provides Security for extreme Confidential Information. • Security Classes are like, – – – – • • Top Security (TS) Secret (S) Confidential (C) Unclassified (U) Note : Intensity of Security is like, TS > S > C > U Now you will wonder how security is classified? Well, it is classified using Bell-LaPadula Model. 1/14/2014 7
  • 8. Role Based Access Control • Roll based Access Control provides Security according to the ROLE of the User who is accessing the Database. • ROLE of the user is created using CREATE command. • Role gives permissions to only authorized users to access the data. • Thus Roles provides security in a smart and simple way. 1/14/2014 8
  • 9. Cryptography • Cryptography is a way of enclosing the data called Encryption while Sending and disclosing that data called Decryption while it is received. • Have a look at this, 1/14/2014 9
  • 10. Cryptography contd. • There are two types of Cryptography. – Symmetric Key Cryptography • In this , Both sender and receiver have the same key for Encryption and Decryption. – Asymmetric Key Cryptography • In this , Sender uses Public Key for Encryption and Receiver uses its own Private key for Decryption. 1/14/2014 10
  • 11. Backup and Recovery • Backup - The process of periodically taking a copy of the database and log file on to offline storage media. • Journaling - The process of keeping and maintaining a log file (or journal) of all changes made to the database to enable recovery to be undertaken effectively in the event of a failure. 1/14/2014 11
  • 12. RAID Implementation RAID i.e. Redundant Array of Inexpensive Disks, is a category of disk drives that employ two or more drives in combination for fault tolerance and Performance. This Array of Disks have levels as follows, • Level 0: Provides data striping (spreading out blocks of each file across multiple disks) but no redundancy. This improves performance but does not deliver fault tolerance. • Level 1: Provides disk mirroring. • Level 2: Error correcting Codes by using Parity Check. • Level 3: Same as Level 0, but also reserves one dedicated disk for error correction data. It provides good performance and some level of fault tolerance. • Level 4: Uses Block level Stripping which keeps Parity block on a separate disk. • Level 5: Provides data striping at the byte level and also stripe error correction information. This results in excellent performance and good fault tolerance. • Level 6: P+Q Redundancy Scheme i.e. Stores extra redundant information in case of disk failures. 1/14/2014 12
  • 13. Views • A view is the dynamic result of one or more relational operations operating on the base relations to produce another relation. A view is a virtual relation that does not actually exist in the database, but is produced upon request by a particular user, at the time of request. • The view mechanism provides a powerful and flexible security mechanism by hiding parts of the database from certain users. 1/14/2014 13
  • 14. Message Digest Algorithms and Digital Signatures • Message digest algorithm is the one-way hash function that produces a fixed-length string (hash) from an arbitrary-sized message. It’s computationally infeasible that there is another message with the same digest, the digest does not reveal anything about the message. • Digital signature consist of two parts: a string of bits that is computed from the message and the private key of organization. • Digital signature is used to verify that the message comes from this organization. 1/14/2014 14
  • 15. Security in Microsoft Access and Oracle DBMS Microsoft Access • System level security - password. • User-level security - identification as a member of groups (Administrators and Users), permissions are granted (Open/Run, Read, Update, Delete, etc). Oracle DBMS • System level security - name, password. • User-level security is based on a privilege, i.e a right to execute a particular type of SQL statements or to access another user’s object. • System privileges and object privileges. 1/14/2014 15 End of the Presentation