Академический Документы
Профессиональный Документы
Культура Документы
Contents
What is Database Security? Issues in Database security How to Secure?
Access Control Mechanism Cryptography Backup and Recovery RAID Implementation Views Digital Signatures
1/16/2014
1/16/2014
Well, GRANT = To allow OR To give some rights, REVOKE = To cancel the GRANT i.e. Not to allow and Privileges = Permissions i.e. various commands like CREATE,UPDATE etc.
GRANT and REVOKE are Database Commands used to operate Database. We will use these commands like this,
GRANT [Privileges] ON [Database Objects] TO USER [With GRANT Option]; REVOKE [Privileges] ON [Database Object] FROM USER;
1/16/2014 6
Now you will wonder how security is classified? Well, it is classified using Bell-LaPadula Model.
1/16/2014 7
Role gives permissions to only authorized users to access the data. Thus Roles provides security in a smart and simple way.
1/16/2014
Cryptography
Cryptography is a way of enclosing the data called Encryption while Sending and disclosing that data called Decryption while it is received. Have a look at this,
1/16/2014
Cryptography
contd.
1/16/2014
11
RAID Implementation
RAID i.e. Redundant Array of Inexpensive Disks, is a category of disk drives that employ two or more drives in combination for fault tolerance and Performance. This Array of Disks have levels as follows,
Level 0: Provides data striping (spreading out blocks of each file across multiple disks) but no redundancy. This improves performance but does not deliver fault tolerance. Level 1: Provides disk mirroring.
Level 5: Provides data striping at the byte level and also stripe error correction information. This results in excellent performance and good fault tolerance.
Level 6: P+Q Redundancy Scheme i.e. Stores extra redundant information in case of disk failures.
1/16/2014 12
Views
A view is the dynamic result of one or more relational operations operating on the base relations to produce another relation. A view is a virtual relation that does not actually exist in the database, but is produced upon request by a particular user, at the time of request. The view mechanism provides a powerful and flexible security mechanism by hiding parts of the database from certain users.
1/16/2014
13
Oracle DBMS
System level security - name, password. User-level security is based on a privilege, i.e a right to execute a particular type of SQL statements or to access another users object. System privileges and object privileges.
1/16/2014 15 End of the Presentation
Thank You!
1/16/2014 16