Академический Документы
Профессиональный Документы
Культура Документы
By
V. Bharath Kumar
R. Vinu Vishal
D
A
T
A
B
A
S
E
S
E
C
U
R
I
T
Y
Database Security:
and Fraud
Loss of confidentiality
Loss of privacy
Loss of integrity
Loss of availability
Threat:
Threat is any intentional or accidental event that may
adversely affect the system.
Examples of threats:
Using
Computer-Based Controls:
Authorization
Views
Backup and Recovery
Integrity
Encryption
RAID Technology
System Privileges:
Authenticating
Logical Backup:
In this type, only the data are extracted from database using
SQL statements.
Journaling:
The process of keeping and maintaining a log file of all
changes made to the database to enable recovery to be
undertaken effectively in the event of a failure.
Recovery:
Database recovery is a process of restoring a
database to the correct state in case of any failure.
The encoding of data by a special algorithm that renders the data unreadable by
any program without the decryption key.
There will be degradation in performance because of the time taken to decode it.
It also protects the data transmitted over communication lines.
Plain-data
Algorithm and
password
Encrypted
data
RAID is a category of disk drives that employ two or more drives in combination for fault
tolerance and performance. RAID disk drives are used frequently on servers running the
databases.
Level 0: Provides data striping.
Level 1: Provides disk mirroring.
Level 2: Hamming code parity
Level 3: Same as Level 0, but also reserves one dedicated disk for error correction data. It
provides good performance and some level of fault tolerance.
Level 5: Provides data striping at the byte level and also stripe error correction information. This
results in excellent performance and good fault tolerance.
Raid 5
Microsoft Access:
System level security : Password.
User-level security : Identification as a member of groups
(Administrators and Users), permissions are granted
(Open/Run, Read, Update, Delete, etc).
Oracle DBMS:
System level security : name, password.
User-level security is based on a privilege, that is a right to
execute a particular type of SQL statements or to access
another users object. System privileges and
object privileges.
Proxy servers
Firewalls
Message Digest Algorithms and Digital
Signature
Digital Certificates
SSL and S-HTTP
Computer A
Proxy-server
Computer B
Internet
Firewall
Packet filter
Application gateway
Circuit-level gateway (TCP, UDP protocols)
Proxy server
Digital