SlideShare a Scribd company logo
System Security
-Bharat P. Patil
-M. Sc. C.S. Part II
-64
Database Security
`
Introduction
• Database Security
`
What Is Database Security?
Database:
It is a collection of information stored in a computer.
Security:
It is being free from danger.
Database Security:
It is the mechanisms that protect the database against
intentional or accidental threats.
OR
Protection from malicious attempts to steal (view) or
modify data.
`
Three Main Aspects
1. Secrecy
2. Integrity
3. Availability
`
Secrecy
• It is protecting the database from
unauthorized users.
• Ensures that users are allowed to do the things
they are trying to do.
• For example:-
– The employees should not see the salaries of their
managers.
`
Integrity
• Protecting the database from authorized users.
• Ensures that what users are trying to do is
correct.
• For examples,
• An employee should be able to modify his or her
own information.
`
Availability
• Authorized users should be able to access data
for Legal purposes as necessary.
• For examples,
– Payment orders regarding taxes should be
made on time by the tax law.
`
Importance of Data
• Bank/Demat accounts
• Credit card, Salary, Income tax data
• University admissions, marks/grades
• Land records, licenses
• Data = crown jewels for organizations
`
Importance of Data (contd…)
• Recent headlines:
– Personal information of millions of credit card
users stolen
• Laws on privacy in the US
• Theft of US data in India
– Criminal gangs get into identity theft
– Earlier this year in Mumbai
• Hackers steal credit card data using card reader
and make fraudulent purchases
• Hacker creates fake Web site to phish for credit
card information
– Auto-rickshaw license fraud in New Delhi
`
Overview
• Levels of data security
• Authorization in databases
• Application Vulnerabilities
• Summary
`
Levels of Data Security
• Human level: Corrupt/careless User.
• Network/User Interface.
• Database application program.
• Database system.
• Operating System.
• Physical level.
`
Physical/OS Security
• Physical level
– Traditional lock-and-key security.
– Protection from floods, fire, etc.
• E.g. WTC (9/11), fires in IITM, WWW conf website, etc.
– Protection from administrator error
• E.g. delete critical files.
– Solution
• Remote backup for disaster recovery.
• Plus archival backup (e.g. DVDs/tapes).
• Operating system level
– Protection from virus/worm attacks critical.
`
Security at the Database/Application
Program
• Authentication and
authorization
mechanisms to allow
specific users access
only to required data
• Authentication: who are
you? Prove it!
• Authorization: what
you are allowed to do?
`
Database vs. Application
• Application authenticates/authorizes users
• Application itself authenticates itself to
database
– Database password
DatabaseApplication
Program
`
User Authentication
• Password
– Most users abuse passwords. For e.g.
• Easy to guess password
• Share passwords with others
• Smartcards
– Need smartcard
– + a PIN or password
Bill Gates
`
User Authentication
• Central authentication systems allow users to
be authenticated centrally
– LDAP or MS Active Directory often used for central
authentication and user management in
organizations
• Single sign-on: authenticate once, and access
multiple applications without fresh
authentication
– Microsoft passport, Pub Cookie etc
– Avoids plethora of passwords
– Password only given to central site, not to
applications.
`
Overview
• Levels of data security
• Authorization in databases
• Application Vulnerabilities
• Summary
`
Authorization
• Different
authorizations for
different users
– Accounts clerk vs.
– Accounts manager vs.
– End users
`
Database/Application Security
• Ensure that only authenticated users can
access the system.
• And can access (read/update) only
data/interfaces that they are authorized to
access.
`
Limitations of SQL Authorization
• SQL does not support authorization at a tuple
level
– E.g. we cannot restrict students to see only (the
tuples storing) their own grades.
• Web applications are dominant users of
databases
– Application end users don't have database user
ids, they are all mapped to the same database user
id.
– Database access control provides only a very
coarse application-level access control.
`
Access Control in Application Layer
• Authorization in application layer vs. database
layer
– Benefits
• fine grained authorizations, such as to individual
tuples, can be implemented by the application.
• authorizations based on business logic easier to code at
application level
– Drawback:
• Authorization must be done in application code, and
may be dispersed all over an application
• Hard to check or modify authorizations
• Checking for absence of authorization loopholes
becomes very difficult since it requires reading large
amounts of application code
– Need a good via-media.
`
Privacy
• Aggregate information about private information
can be very valuable
– E.g. identification of epidemics, mining for
patterns (e.g. disease causes) etc.
• Privacy preserving data release
– E.g. in US, many organizations released
“anonymized” medical data, with names
removed, but zip code (= pin code), sex and
date of birth retained
• Turns out above (zip code, sex, date of birth)
uniquely identify most people!
–Correlate anonymized data with (say)
electoral data with same information
`
Privacy (contd…)
– Recent problems at America Online
• Released search history, apparently
anonymized, but users could be easily
identified in several cases
–Several top officials were fired
– Earlier problems revealed medical history of
Massachusetts state governor.
• Not yet a criminal issue, but lawsuits have
happened
• Conflict with Right To Information Act
– Many issues still to be resolved.
`
Overview
• Levels of data security
• Authorization in databases
• Application Vulnerabilities
• Summary
`
Application Security
• Applications are often the biggest source
of insecurity
–Poor coding of application may allow
unauthorized access.
–Application code may be very big, easy to
make mistakes and leave security holes.
–Very large surface area.
• Used in fewer places
– Some security by obfuscation.
– Lots of holes due to poor/hasty programming.
`
OWASP Top 10 Web Security
Vulnerabilities
1. Invalidated input.
2. Broken access control.
3. Broken account/session management.
4. Cross-site scripting (XSS) flaws.
5. Buffer overflows.
6. (SQL) Injection flaws.
7. Improper error handling.
8. Insecure storage.
9. Denial-of-service.
10.Insecure configuration management.
`
Passwords in Scripts
• E.g.: file1.jsp (or java or other source file) located in
publicly accessible area of web server
– Intruder looks for http://<urlpath>/file1.jsp~
• or .jsp. swp, etc
– If jsp has database user id/password in clear text, big
trouble
• Happened at IITB
• Morals
– Never store scripts (java/jsp) in an area accessible to http
– Never store passwords in scripts, keep them in config files
– Never store config files in any web-accessible areas
– Restrict database access to only trusted clients
• At port level, or using database provided functionality
`
Overview
• Levels of data security
• Authorization in databases
• Application Vulnerabilities
• Summary
`
Summary
• Data security is critical.
• Requires security at different levels.
• Several technical solutions .
• But human training is essential.

More Related Content

PPTX
Network security
PPTX
Cybersecurity Audit
PPTX
Malware & Anti-Malware
PPTX
Packet sniffers
PPTX
Cyber Threat Simulation
PDF
Penetration testing
PDF
Defence in Depth Architectural Decisions
PDF
Overview of Data Loss Prevention (DLP) Technology
Network security
Cybersecurity Audit
Malware & Anti-Malware
Packet sniffers
Cyber Threat Simulation
Penetration testing
Defence in Depth Architectural Decisions
Overview of Data Loss Prevention (DLP) Technology

What's hot (20)

PPSX
Security Awareness Training
PPTX
Cybersecurity in Oil Gas Industry
PPTX
Vulnerability assessment &amp; Penetration testing Basics
PPT
3 Most Common Threats Of Information Security
PPTX
Data Loss Prevention
DOCX
What is zero trust model of information security?
PPT
Web Application Security
PPTX
Web Security Attacks
PPTX
Vulnerability assessment and penetration testing
PDF
Broken access control
PDF
OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...
PDF
Information Security Lecture Notes
PPTX
Malicious software
 
PDF
Introduction IDS
PDF
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
PDF
Information Security Awareness
PDF
Cybersecurity & Project Management
PPTX
Social Engineering new.pptx
PPTX
Identity and Access Management (IAM): Benefits and Best Practices 
PPTX
Chapter 11: Information Security Incident Management
Security Awareness Training
Cybersecurity in Oil Gas Industry
Vulnerability assessment &amp; Penetration testing Basics
3 Most Common Threats Of Information Security
Data Loss Prevention
What is zero trust model of information security?
Web Application Security
Web Security Attacks
Vulnerability assessment and penetration testing
Broken access control
OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...
Information Security Lecture Notes
Malicious software
 
Introduction IDS
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Information Security Awareness
Cybersecurity & Project Management
Social Engineering new.pptx
Identity and Access Management (IAM): Benefits and Best Practices 
Chapter 11: Information Security Incident Management
Ad

Viewers also liked (20)

PPTX
System security
PPTX
Operating system security
PPTX
Security & protection in operating system
PPTX
Operating system security
PPTX
System protection in Operating System
PPTX
Operating system security
PPT
Network security
PPT
Chapter 14 - Protection
PPT
PPT FOR SECURITY
PPTX
INFORMATION SECURITY
PDF
Privacy preserving detection of sensitive data exposure
PPTX
COMPUTER SECURITY AND OPERATING SYSTEM
PPTX
Operating System Security
PPTX
Cryptography.ppt
PDF
Network Security Presentation
PPT
Web Security
DOCX
Security System Design for an Intelligent Building
PPTX
System Analysis Desing: Innovation
PPT
Analysis & Design of Business System - 6
PPTX
P2 Project
System security
Operating system security
Security & protection in operating system
Operating system security
System protection in Operating System
Operating system security
Network security
Chapter 14 - Protection
PPT FOR SECURITY
INFORMATION SECURITY
Privacy preserving detection of sensitive data exposure
COMPUTER SECURITY AND OPERATING SYSTEM
Operating System Security
Cryptography.ppt
Network Security Presentation
Web Security
Security System Design for an Intelligent Building
System Analysis Desing: Innovation
Analysis & Design of Business System - 6
P2 Project
Ad

Similar to System security (20)

PPTX
INFORMATION AND CYBER SECURITY
PPT
Threats of Database in ECommerce
PPT
PPTX
Week-09-10-11-12 Fundamentals of Cybersecurity.pptx
PPTX
MobileDBSecurity.pptx
PPTX
47890finalpresentation-180407201958.pptx
PPTX
Database Security And Authentication
PPTX
Unit 2 - Chapter 7 (Database Security).pptx
PPTX
Database Security, Threats & Countermeasures.pptx
PPTX
Computer security concepts
PPT
Security Design Principles.ppt
PPTX
Database security
PPTX
Database security in database management.pptx
PDF
OWASP Top Ten in Practice
PDF
Data security and Integrity
PPTX
DBMS Vulnerabilities And Threats.pptx
PPTX
203135 Muhammad Usama.pptx
DOCX
Database security
PPT
Software security (vulnerabilities) and physical security
PPT
Software Security (Vulnerabilities) And Physical Security
INFORMATION AND CYBER SECURITY
Threats of Database in ECommerce
Week-09-10-11-12 Fundamentals of Cybersecurity.pptx
MobileDBSecurity.pptx
47890finalpresentation-180407201958.pptx
Database Security And Authentication
Unit 2 - Chapter 7 (Database Security).pptx
Database Security, Threats & Countermeasures.pptx
Computer security concepts
Security Design Principles.ppt
Database security
Database security in database management.pptx
OWASP Top Ten in Practice
Data security and Integrity
DBMS Vulnerabilities And Threats.pptx
203135 Muhammad Usama.pptx
Database security
Software security (vulnerabilities) and physical security
Software Security (Vulnerabilities) And Physical Security

More from ReachLocal Services India (12)

PPTX
Virtual reality
PPTX
Digital signatures
PPTX
Artificial intelligence
PPTX
Distributed database
PPT
Loop invariant computation
PPTX
Distributed dbms
PPT
Sexual harresment on women
PPTX
Digital signal processing
PPTX
Mobile network layer (mobile comm.)
PPTX
Regular expression (compiler)
PPT
Temporal data mining
Virtual reality
Digital signatures
Artificial intelligence
Distributed database
Loop invariant computation
Distributed dbms
Sexual harresment on women
Digital signal processing
Mobile network layer (mobile comm.)
Regular expression (compiler)
Temporal data mining

Recently uploaded (20)

PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
Cell Types and Its function , kingdom of life
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Basic Mud Logging Guide for educational purpose
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PPTX
Cell Structure & Organelles in detailed.
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PPTX
master seminar digital applications in india
PDF
Complications of Minimal Access Surgery at WLH
PPTX
Pharma ospi slides which help in ospi learning
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PDF
Business Ethics Teaching Materials for college
PDF
01-Introduction-to-Information-Management.pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
O7-L3 Supply Chain Operations - ICLT Program
Microbial diseases, their pathogenesis and prophylaxis
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Cell Types and Its function , kingdom of life
Pharmacology of Heart Failure /Pharmacotherapy of CHF
human mycosis Human fungal infections are called human mycosis..pptx
Basic Mud Logging Guide for educational purpose
PPH.pptx obstetrics and gynecology in nursing
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
Cell Structure & Organelles in detailed.
Supply Chain Operations Speaking Notes -ICLT Program
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
master seminar digital applications in india
Complications of Minimal Access Surgery at WLH
Pharma ospi slides which help in ospi learning
Week 4 Term 3 Study Techniques revisited.pptx
Business Ethics Teaching Materials for college
01-Introduction-to-Information-Management.pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
O7-L3 Supply Chain Operations - ICLT Program

System security

  • 1. System Security -Bharat P. Patil -M. Sc. C.S. Part II -64 Database Security
  • 3. ` What Is Database Security? Database: It is a collection of information stored in a computer. Security: It is being free from danger. Database Security: It is the mechanisms that protect the database against intentional or accidental threats. OR Protection from malicious attempts to steal (view) or modify data.
  • 4. ` Three Main Aspects 1. Secrecy 2. Integrity 3. Availability
  • 5. ` Secrecy • It is protecting the database from unauthorized users. • Ensures that users are allowed to do the things they are trying to do. • For example:- – The employees should not see the salaries of their managers.
  • 6. ` Integrity • Protecting the database from authorized users. • Ensures that what users are trying to do is correct. • For examples, • An employee should be able to modify his or her own information.
  • 7. ` Availability • Authorized users should be able to access data for Legal purposes as necessary. • For examples, – Payment orders regarding taxes should be made on time by the tax law.
  • 8. ` Importance of Data • Bank/Demat accounts • Credit card, Salary, Income tax data • University admissions, marks/grades • Land records, licenses • Data = crown jewels for organizations
  • 9. ` Importance of Data (contd…) • Recent headlines: – Personal information of millions of credit card users stolen • Laws on privacy in the US • Theft of US data in India – Criminal gangs get into identity theft – Earlier this year in Mumbai • Hackers steal credit card data using card reader and make fraudulent purchases • Hacker creates fake Web site to phish for credit card information – Auto-rickshaw license fraud in New Delhi
  • 10. ` Overview • Levels of data security • Authorization in databases • Application Vulnerabilities • Summary
  • 11. ` Levels of Data Security • Human level: Corrupt/careless User. • Network/User Interface. • Database application program. • Database system. • Operating System. • Physical level.
  • 12. ` Physical/OS Security • Physical level – Traditional lock-and-key security. – Protection from floods, fire, etc. • E.g. WTC (9/11), fires in IITM, WWW conf website, etc. – Protection from administrator error • E.g. delete critical files. – Solution • Remote backup for disaster recovery. • Plus archival backup (e.g. DVDs/tapes). • Operating system level – Protection from virus/worm attacks critical.
  • 13. ` Security at the Database/Application Program • Authentication and authorization mechanisms to allow specific users access only to required data • Authentication: who are you? Prove it! • Authorization: what you are allowed to do?
  • 14. ` Database vs. Application • Application authenticates/authorizes users • Application itself authenticates itself to database – Database password DatabaseApplication Program
  • 15. ` User Authentication • Password – Most users abuse passwords. For e.g. • Easy to guess password • Share passwords with others • Smartcards – Need smartcard – + a PIN or password Bill Gates
  • 16. ` User Authentication • Central authentication systems allow users to be authenticated centrally – LDAP or MS Active Directory often used for central authentication and user management in organizations • Single sign-on: authenticate once, and access multiple applications without fresh authentication – Microsoft passport, Pub Cookie etc – Avoids plethora of passwords – Password only given to central site, not to applications.
  • 17. ` Overview • Levels of data security • Authorization in databases • Application Vulnerabilities • Summary
  • 18. ` Authorization • Different authorizations for different users – Accounts clerk vs. – Accounts manager vs. – End users
  • 19. ` Database/Application Security • Ensure that only authenticated users can access the system. • And can access (read/update) only data/interfaces that they are authorized to access.
  • 20. ` Limitations of SQL Authorization • SQL does not support authorization at a tuple level – E.g. we cannot restrict students to see only (the tuples storing) their own grades. • Web applications are dominant users of databases – Application end users don't have database user ids, they are all mapped to the same database user id. – Database access control provides only a very coarse application-level access control.
  • 21. ` Access Control in Application Layer • Authorization in application layer vs. database layer – Benefits • fine grained authorizations, such as to individual tuples, can be implemented by the application. • authorizations based on business logic easier to code at application level – Drawback: • Authorization must be done in application code, and may be dispersed all over an application • Hard to check or modify authorizations • Checking for absence of authorization loopholes becomes very difficult since it requires reading large amounts of application code – Need a good via-media.
  • 22. ` Privacy • Aggregate information about private information can be very valuable – E.g. identification of epidemics, mining for patterns (e.g. disease causes) etc. • Privacy preserving data release – E.g. in US, many organizations released “anonymized” medical data, with names removed, but zip code (= pin code), sex and date of birth retained • Turns out above (zip code, sex, date of birth) uniquely identify most people! –Correlate anonymized data with (say) electoral data with same information
  • 23. ` Privacy (contd…) – Recent problems at America Online • Released search history, apparently anonymized, but users could be easily identified in several cases –Several top officials were fired – Earlier problems revealed medical history of Massachusetts state governor. • Not yet a criminal issue, but lawsuits have happened • Conflict with Right To Information Act – Many issues still to be resolved.
  • 24. ` Overview • Levels of data security • Authorization in databases • Application Vulnerabilities • Summary
  • 25. ` Application Security • Applications are often the biggest source of insecurity –Poor coding of application may allow unauthorized access. –Application code may be very big, easy to make mistakes and leave security holes. –Very large surface area. • Used in fewer places – Some security by obfuscation. – Lots of holes due to poor/hasty programming.
  • 26. ` OWASP Top 10 Web Security Vulnerabilities 1. Invalidated input. 2. Broken access control. 3. Broken account/session management. 4. Cross-site scripting (XSS) flaws. 5. Buffer overflows. 6. (SQL) Injection flaws. 7. Improper error handling. 8. Insecure storage. 9. Denial-of-service. 10.Insecure configuration management.
  • 27. ` Passwords in Scripts • E.g.: file1.jsp (or java or other source file) located in publicly accessible area of web server – Intruder looks for http://<urlpath>/file1.jsp~ • or .jsp. swp, etc – If jsp has database user id/password in clear text, big trouble • Happened at IITB • Morals – Never store scripts (java/jsp) in an area accessible to http – Never store passwords in scripts, keep them in config files – Never store config files in any web-accessible areas – Restrict database access to only trusted clients • At port level, or using database provided functionality
  • 28. ` Overview • Levels of data security • Authorization in databases • Application Vulnerabilities • Summary
  • 29. ` Summary • Data security is critical. • Requires security at different levels. • Several technical solutions . • But human training is essential.