A Database Security Course on a Shoestring
|
|
|
- Alexander James
- 10 years ago
- Views:
Transcription
1 A Database Security Course on a Shoestring ABSTRACT Binto George Computer Science Department Western Illinois University 1 University Circle Macomb, IL [email protected] Database security has paramount importance in industrial, civilian and government domains. Despite its importance, our search reveals that only a small number of database security courses are being offered. In this paper, we share our experience in developing and offering an undergraduate elective course on database security with limited resources. We believe that database security should be considered in its entirety rather than being component specific. Therefore, we emphasize that students develop and implement a database security plan for a typical real world application. In addition to the key theoretical concepts, students obtain hands-on experience with two popular database systems. We encourage students to learn independently making use of the documentation and technical resources freely available on the Internet. This way, our hope is that they will be able to adapt to emerging systems and application scenarios. Categories and Subject Descriptors H.2.7 [DATABASE MANAGEMENT]: Database Administration security, integrity, and protection; K.3.2 [COMPUTERS AND EDUCATION]: Computer and Information Science Education curriculum. General Terms Security. Keywords Undergraduate Database Security Course, Database Security, Laboratory/Active Learning, Statistical Security. 1. INTRODUCTION Database systems are designed to provide efficient access to large volumes of data. However, many application domains require that the data access be restricted for security reasons. For example, an unauthorized access to Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. SIGCSE 06, March 1 5, 2006, Houston, Texas, USA. Copyright 2006 ACM /06/ $5.00. Anna Valeva Department of Mathematics Western Illinois University 1 University Circle Macomb, IL [email protected] a bank database can potentially cost millions of dollars. The federal Health Insurance Portability and Accountability Act (HIPAA) regulates the disclosure of information from a patient database, allowing access to health care providers, health plans, and health care clearinghouses, simultaneously protecting the privacy of patients. For obvious reasons, a Department of Defense (DoD) database needs to be protected from unauthorized access. Since many organizations increasingly entrust their information resources with database systems, in today s highly networked environment, the sensitive information can be at high risk unless there are security mechanisms in place to protect the data at the source itself. However, a large number of databases are incorrectly installed, configured, and maintained. This, in part, may be attributed to the lack of database security education in our computer science programs. We feel that a new undergraduate course on database security will help our students face the ever increasing challenges in this field. Our search shows that, despite the importance, only a handful database security courses are being offered. Most of the courses we found are graduate courses and are highly theoretical. We also found a few extension program courses, which are product specific. Although a large number of database courses exist at both undergraduate and graduate levels, we feel that, one reason for not offering database security courses may be the scarcity of textbooks, reference materials, and other resources. Realizing the importance of database security in computer science curriculum, [8] proposes adding a new module to the basic database course. Since the basic database course has already many topics to cover, we feel that the addition of new material will not completely serve the purpose. Further, we find it difficult to incorporate hands-on component to such a course. Similarly, a computer security course is too broad in scope, and rarely includes database security topics. Therefore, we decided to develop a new undergraduate level elective on database security. This paper is based on our experience of offering a database security course in Spring We have adjusted the contents and assignments in response to the feedback and course outcome. The modified version is presented here. Since many of our students seek industrial positions after graduation, we have designed our course to meet their needs with the right blend of theory and practice. The course objective is to develop an understanding of security aspects of databases, database administration, and database supported applications. We collected information from alumni as well as potential employers before finalizing the contents. 7
2 Although students were expected to gain hands-on experience with some popular databases in our course, we tried to focus on concepts rather than just syntax or product specific features. Often, students were asked to learn software packages on their own by reading the product documentation. We also offered an online feedback page for receiving anonymous student comments, which helped us know if students needed additional assistance. By encouraging students to learn and experiment on their own, we hope that they can easily apply the learned concepts to emerging application scenarios. This is particularly needed since today s work environment expects agility from employees to quickly master and develop software systems. To facilitate participation further, we asked students to research and make presentations choosing from a set of specified topics. Most importantly, since many of our educational institutions are cash strapped, we designed our course to execute with a small budget. In the next section, we detail topics, which may be included in a database security course, with references that, we hope, will be useful for other instructors. We also discuss labs and assignments in detail. Finally, we conclude the paper with an account of lessons learned and future possibilities. 2. DATABASE SECURITY TOPICS Although a large number of topics can be included, we try to focus on a few important ones that, in our judgment, are likely to be immediately useful after graduation. We also include topics on securing the data within a database, as well as the security of database systems and operating systems as suggested in [8]. Our position is that database security should be considered in whole rather than adopting a piecemeal approach. However, we recognize that, in practice, it is often easy to overlook some aspects of database security. Therefore, we recommend that students develop a database security plan. We also include other relevant topics such as statistical database security, and security and privacy issues of data mining. Table 1 shows the schedule of topics for a typical sixteen week semester course on database security. Major labs and assignments are given in Table 2. The course begins with an Introduction to database security, where the objective is to highlight the importance of database security and to motivate students to learn the rest of the topics. 2.1 Introducing Database Security One way to emphasize the importance of database security would be to reflect on the impact of not having security at all in application domains such as military, medical, financial, credit card, credit file, driving records, and insurance databases. Students may survey the incidents of database security breaches and evaluate the efforts to ensure database security by industry and government. Since database security is a combination of database technology and computer security, basics of both will be helpful. A discussion on security properties such as confidentiality, integrity, availability and non-repudiation should be included. Although an in-depth study of cryptography is not within the scope of this course, basics of secret key cryptography and public key cryptography will benefit students. A good reference book we found is Data Security and Cryptogra- Week Topic 1 Course Overview and Introduction to Database Security, Basics of Data Security and Cryptography 2 Overview of Security Models 3 Access Control Models, Covert Channels and Inference Channels 4 MySQL Security 5 Oracle Security 6 Oracle Label Security 7 Developing a Database Security Plan 8 Spring Break 9 SQL Server Security 10 Security of Statistical Databases 11 Security and privacy issues of Data Mining 12 Database Applications Security, SQL Injection, Defensive Programming 13 Database Intrusion Prevention, Audit, Fault Tolerance and Recovery 14 Hippocratic Databases, XML Security 15 Network Security, Biometrics 16 Final Examination Week Table 1: Course Schedule phy by Dorothy Denning [5]. Digital signatures, digital certificates and Public Key Infrastructure (PKI) [21] are other topics to consider. An overview of security and integrity models [4] will also be helpful at this point. This is the best time to introduce the computer security lingo such as subjects and objects. The difference between widely used access control techniques may also be highlighted. 2.2 Access Control Discretionary Access Control (DAC) mechanisms such as capabilities, profiles, access control lists, passwords, and permission bits may be discussed. Here we also introduce the operating system security aspects (using Windows R and Linux environments), and how they impact database security in general. Although details are not required until we introduce Oracle security, overview of Role-Based Access Control (RBAC) [6, 18] may be discussed. Unlike the above access control techniques, in Mandatory Access Control (MAC) the security is enforced by the system as dictated in the security policy, not by the owner of an object. Although there are many security models suggested for providing Mandatory security, Bell-LaPadula [2] model is probably the simplest to learn. Even when a system enforces Mandatory Access Control, information leakage through covert channels [11] and inference channels [13] may still be possible. A few examples will help students understand how the information leakage can take place through such means. Databases enforcing MAC often assign security classification levels for objects and security clearance levels for subjects. Access control is performed by the system based on these levels. A lab may be developed, where students 8
3 simulate a multilevel database on an ordinary database system. This means students will have to modify the schema to add additional fields for storing security classification levels. They also develop views for users having different clearance levels. Further, to support poly-instantiation, the primary key will have to be redefined to include security level to accommodate the possibility of the same key values existing at multiple security levels. Another topic of interest would be to explore how the Discretionary Access Control and the Mandatory Access Control can be combined and applied in some scenarios. 2.3 Securing Real Life Databases The candidate database systems we chose for hands-on experience were MySQL TM,Oracle R, and Microsoft R SQL Server TM. Because of time constraints, students were able to focus only on the first two databases, but an overview of SQL server security was also provided MySQL Security With more than six million installations worldwide [14], the simplicity and open source architecture make MySQL, probably, the first database to study. The primary source of information would be the MySQL manual itself (available from MySQL site [14]), particularly the section on MySQL Access Privilege System. Another source, MySQL Security Handbook [22], explains MySQL security system and provides a few practical examples. Labs/Assignments 1 Multilevel Security Poly-instantiation 2 MySQL Grant Privilege System 3SQLInjection 4OracleSecurity BasicLab 5 Database Security Plan Development 6 Backend Development for B2C Application 7 Probability Distributions, Sampling 8 Statistical Databases - Breach of Security 9 Statistical Databases - Inference Protection Techniques 10 Data Mining Security - Reading and Presentation Table 2: Major Labs/Assignments MySQL Access Privilege System authenticates a user based on user name, host name, and password. Further, it ensures that users perform only permitted operations based on the privileges specified in the grant tables (namely, user, db, and host). The format and contents of these tables, therefore, are of particular importance. Since most of the critical information including the grant tables are stored on a default database named mysql, thesecurityofmysql database is also crucial. Students should learn to apply the principle of least privilege when granting privileges in order to perform the task at hand. Each student was given a MySQL instance with root level access. Students were asked to create users and assign privileges while monitoring the privilege tables for changes. Students also experimented with the privilege system by manually modifying privilege tables. We created two person administrator-user teams for enabling the students to experience the system from both perspectives. Users were assigned certain tasks to perform. Some of the tasks given were specifically designed to understand the limitations of the MySQL privilege system. The role of the administrators was to grant privileges just sufficient for users to perform the task. Users could access the system in any manner they wish in fact, users will be encouraged to expose the weaknesses in the privilege assignments. The administrators, on the other hand, controlled access based on need-to-know, at the same time trying not to be too restrictive for users to perform the required tasks. We found the users very excited to expose security weaknesses in the privilege assignment. Although administrators were a little embarrassed, they too were motivated by the exercise. For the the next lab session, students switched roles, i.e., those who were administrators became users and vice versa. MySQL supports data security by providing functions such as ENCRYPT, DES ENCRYPT, AES ENCRYPT, PASS- WORD, OLD PASSWORD and ENCODE. Since these functions may not be safe under all circumstances, it would be useful to highlight the unsafe scenarios. Students may also learn how to use SSL for security, and simultaneously make sure that the system performance is not significantly impacted. Also useful would be to study how the authentication requirements may vary when using options such as REQUIRE SSL, REQUIRE ISSUER and REQUIRE X509. Even when using SSL, the data security can depend on the type of cipher and the key lengths used. Therefore, students may learn how to specify these parameters using the REQUIRE CIPHER option. Some privileges in MySQL, if not carefully used, can expose the system to high security risk. For example, FILE privilege may be misused to gain access to the system. Hence, a comprehensive study of unsafe privileges will be extremely useful. Even when the privilege system is correctly set up and maintained the entire privilege system can be circumvented using a MySQL startup option like --skip-grant-tables. On the other hand, some startup options make the server safer. Therefore, MySQL startup options and their security consequences must be discussed. Many web applications have MySQL database server deployed as the backend, and HTML based form acting as the front end. Since user input is used to generate SQL queries to interact with the database, if unchecked, malicious users or programs can inject unsafe SQL queries. Basic concepts of preventing SQL injection may also be discussed. Students may be asked to analyze a number of SQL queries for potential vulnerability. Other topics, which can be included are: using MySQL network scanner to detect MySQL servers on the network with default passwords, MySQL resource control, data backup and recovery, auditing, and firewalls Planning Database Security Since enforcing database security is extremely complex task with a large number of factors affecting the security of a database, the best way to approach the problem would be to systematically develop and implement a comprehensive database security plan. Therefore, in our course, we required that students develop a database security plan for a small Business-to-Consumer (B2C) E-Commerce application. See [19] Ch7 (available online) for detailed exposition on database security planning. Although the text is on Oracle security, the concepts can be applied to any database. 9
4 2.3.3 Oracle Security For security reasons, the computer science department was reluctant to grant administrative privileges to students on our Oracle server. Therefore, we ended up creating a separate Oracle instance for the course. For each student, we created one administrative account with DBA privileges, and then the students were allowed to create user accounts as needed, provided they follow a naming convention to avoid conflicting names. In addition to Oracle Security Handbook [12], we found the Oracle Database Administrators Guide [15] also useful. The guide is available online from the Oracle Database Documentation Library. First, we had an Oracle Security Basics Lab. Students were introduced to the Oracle security system through a series of tasks. The next lab was more advanced, and built up on the database security plan developed in a previous assignment. The task was to develop the backend for a small B2C E-Commerce application. Students were asked to create user accounts, roles, tables, views and triggers as required. The privileges were to be assigned by observing the principle of least privilege, as per the security plan. Further, students may also be trained to perform some standard checks for security such as checking for default user accounts, default passwords, users having excessive privileges (e.g., DBA, ALTER SYSTEM, CREATE LIBRARY, CREATE ANY TRIGGER), security impact of WITH AD- MIN and WITH GRANT options on privileges, EXTER- NALLY authenticated users, and the existence of database links. Students may also learn how to display information on items such as triggers, views and externally authenticated users. A section on security issues of using default Oracle supplied roles will be useful. Other topics to include are: Transparent Network Substrate (TNS) security and listener management from remote machines and setting up listener passwords, buffer overflow attacks and prevention, auditing, and undocumented Oracle features. Students may also be introduced to reading security advisories and obtaining Oracle Critical Patch Updates (CPU). Recently, a large number of security breaches have been reported. Interestingly, however, many of these breaches were incidents of missing or stolen backup storage devices. Therefore, we feel appropriate to include a session on security and protection needs of exports, cold backups, hot backups, and disaster recovery sites Oracle Label Security Oracle Label Security provides built-in row level access control for high security applications. Essentially, Oracle adds a new field to each row for storing the row s sensitivity labels. Row access is granted or denied by comparing the user s identity and security clearance label with the row s sensitivity labels. Earlier, in Assignment 1, students have simulated a multilevel database. Therefore, the above concepts should be easy to learn at this point. As a source of information on Oracle Label Security Architecture, we used Oracle Label Security Administrator s Guide [16]. We covered levels, compartments, groups, session and row labels, label security algorithm, and management of label security using Oracle Internet Dictionary Microsoft SQL Server Security As we mentioned earlier at the beginning of this section, due to time constraints, we could not provide an extensive coverage of Microsoft SQL Server. We briefly discussed SQL Server security model, authentication mechanisms, authentication modes, and good security practices for SQL servers. Students presented information they gathered on SQL server vulnerabilities, security breaches, and prevention techniques. We found a few excellent articles on SQLServer- Central.com, an online community of DBAs, developers, and SQL server users. We also found SQL Server Developer Center ( useful in providing a large number of resources in this area. 2.4 Statistical Security As for the rest of the course, this section is application oriented, giving the students the gist of the concepts they need to know and then putting them to work in the context of a real database. Thus, the first lab is a simulation based assignment designed as an introduction to probability distributions, expectation, spread, sampling methods, and sampling distributions of relevant statistics. We find that, even for students with prior coursework in probability and statistics, an assignment of this type is very beneficial. The second lab presents the task of setting up a sequence of queries, so that students can extract from a database what should have been secure information. At this point we introduce the main conceptual techniques for inference protection such as the lattice model and partitioning the database entities into populations. See [4], Ch 5 for details. The third major assignment aims at teaching inference protection techniques. Given a database, the students are asked to answer queries without disclosing sensitive information by applying restriction, perturbation, and combined techniques. 2.5 Security Issues of Data Mining Data mining may be misused to obtain confidential information from a database. So we believe, a course on database security should include an overview of security and privacy concerns of data mining. Organizations would like to share the data for operational convenience, at the same time prevent the mining of data for information they do not want to disclose. Likewise, private individuals would like to submit their personal information for data mining without compromising their privacy while keeping the key association rules intact. Secure data mining techniques appear similar to statistical security methods, however, their computational efficiency is a major concern. We found a number of interesting papers [3, 17, 20] that can be used for reading assignments and group discussions. 2.6 Other Topics Malicious users may bypass security mechanisms provided by an application by directly connecting to the database. Therefore, whenever possible stored procedures, and views must be used for providing data access. Database application security and defensive programming was briefly covered. Semi-structured nature of Extensible Markup Language (XML) documents make them ideal candidates for use in many applications including E-Business. Therefore, XML [7] security was also discussed. 10
5 Other topics of interest are: database intrusion detection and prevention [17], database fault tolerance and recovery, Hippocratic databases [1], network security [10], and biometrics [9]. 3. RELATED COURSES Department of Computer Science at University of Alberta has offered an independent study on database security with topics such as security models, security mechanisms, intrusion detection systems, and statistical database protection. University of Maryland University College has a graduate level course on database security with theory and applications, including frameworks for discretionary and mandatory access control, data integrity, availability and performance, secure database design, data aggregation, data inference, secure concurrency control, and secure transaction processing. University of South Carolina and George Mason University offer graduate level elective courses on Database Security. Similar courses are offered at a few other institutions, but we do not discuss them here due to space constraints. Among the undergraduate courses we found, the closest one to what we offered is taught at University of Arkansas Little Rock. It provides database security theory and background on Oracle security environment. 4. CONCLUSIONS Our new undergraduate elective course on database security covers basic concepts and provides practical experience on two popular databases. We emphasized that students develop a database security plan that, we hope, will encourage them to view the problem of ensuring database security as a task that needs to be carefully planned in whole rather than something that can be addressed in parts. The initial offering of the course had Data Structures as the only pre-requisite, because we wanted to keep the course open to a larger audience. Students, in general, were found be more motivated to follow through on course work than other courses we have taught. We received excellent numerical score as well as comments from students in the departmental student evaluations. We had a good mixture of students. All were computer science majors, and forty seven percent were honors students. Sixty seven percent of the class completed the course with an overall score of 80% or higher with all honors students falling into this category. However, it was felt that a few students lacked basics to fully grasp the material. Therefore, having a basic database technology course as the pre-requisite will help cover more of the suggested topics in depth. In closing, we hope that our experience shared herein will help other instructors develop and offer a similar course on database security with limited resources. 5. REFERENCES [1] R.Agrawal,J.Kiernan,R.Srikant,andY.Xu. Hippocratic Databases. In Proc. of the Very Large Data Bases (VLDB) Conference, Hong Kong, China, August [2] D. Bell and L. LaPadula. Secure Computer Systems: Mathematical Foundations. Technical Report ESD-TR , MITRE Corporation, [3] C. Clifton and D. Marks. Security and Privacy Implications of Data Mining. In Workshop on Data Mining and Knowledge Discovery, Montreal, Canada, February [4] S. Castano, M. G. Fugini, G. Martella, and P. Samarati. Database Security. Addison-Wesley & ACM Press, [5] D. E. Denning. Cryptography and Data Security. Addison-Wesley, [6] D. Ferraiolo and R. Kuhn. Role-Based Access Controls. In Proc. 15th NIST-NCSC National Computer Security Conference, Baltimore,MD, October [7] B. Dournaee. XML Security. RSA Press, Berkeley, CA, USA, [8] M. Guimaraes, H. Mattord, and R. Austin. Incorporating Security Components into Database Courses. In Proc. of the InfoSecCD Conference 04, Kennesaw, GA, September [9] A. Jain, L. Hong, and S. Pankanti. Biometric Identification. Commun. ACM, 43(2), [10] C. Kaufman, R. Perlman, and M. Speciner. Network Security: Private Communication in a Public World, Second Edition. Prentice-Hall, [11] B. W. Lampson. A Note on the Confinement Problem. Commun. ACM, 16(10), October [12] M. Theriault and A. Newman. Oracle Security Handbook : Implement a Sound Security Plan in Your Oracle Environment. Osborne McGraw-Hill, [13] M. Morgenstern. Security and Inference in Multi-Level Database and Knowledge-Base Systems. In ACM SIGMOD Conf. on the Management of Data, San Francisco, CA, May [14] [15] Oracle Database Administrator s Guide. Oracle Corporation, [16] Oracle Label Security Administrator s Guide. Oracle Corporation, [17] R. Agrawal and R. Srikant. Privacy-preserving Data Mining. In Proc. of the ACM SIGMOD Conference on Management of Data, Dallas, TX, May [18] R. Sandhu and Q. Munawer. How to do Discretionary Access Control Using Roles. In RBAC 98: Proceedings of the third ACM workshop on Role-based access control, Fairfax, VA, [19] M. Theriault and W. Heney. Oracle Security. O Reilly & Associates, Inc., [20] V. Verykios, E. Bertino, I. Fovino, L. Provenza, Y. Saygin and Y. Theodoridis. State-of-the-art in Privacy Preserving Data Mining. SIGMOD Record, 33(1), [21] W. Ford and M. S. Baum. Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption. Prentice Hall, [22] Wrox Author Team. MySQL Security Handbook. Wrox Press,
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
Weighted Total Mark. Weighted Exam Mark
CMP4103 Computer Systems and Network Security Period per Week Contact Hour per Semester Weighted Total Mark Weighted Exam Mark Weighted Continuous Assessment Mark Credit Units LH PH TH CH WTM WEM WCM CU
Oracle Database Security. Nathan Aaron ICTN 4040 Spring 2006
Oracle Database Security Nathan Aaron ICTN 4040 Spring 2006 Introduction It is important to understand the concepts of a database before one can grasp database security. A generic database definition is
BM482E Introduction to Computer Security
BM482E Introduction to Computer Security Lecture 7 Database and Operating System Security Mehmet Demirci 1 Summary of Lecture 6 User Authentication Passwords Password storage Password selection Token-based
MySQL Security: Best Practices
MySQL Security: Best Practices Sastry Vedantam [email protected] Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
Oracle Database 11g: Security. What you will learn:
Oracle Database 11g: Security What you will learn: In Oracle Database 11g: Security course students learn how they can use Oracle database features to meet the security, privacy and compliance requirements
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
Oracle Database 11g: Security Release 2. Course Topics. Introduction to Database Security. Choosing Security Solutions
Oracle Database 11g: Security Release 2 In this course, students learn how they can use Oracle Database features to meet the security, privacy and compliance requirements of their organization. The current
Welcome to Information Systems Security (503009)
Welcome to (503009) Nguyen Thi Ai Thao Faculty of Computer Science & Engineering HCMC University of Technology [email protected] Course Outline Week Lectures 1 Information systems security: basic
Making Database Security an IT Security Priority
Sponsored by Oracle Making Database Security an IT Security Priority A SANS Whitepaper November 2009 Written by Tanya Baccam Security Strategy Overview Why a Database Security Strategy? Making Databases
Oracle Database 11g: Security Release 2
Oracle University Contact Us: 1.800.529.0165 Oracle Database 11g: Security Release 2 Duration: 5 Days What you will learn In this course, you'll learn how to use Oracle Database features to meet the security,
Information and Communications Technology Courses at a Glance
Information and Communications Technology Courses at a Glance Level 1 Courses ICT121 Introduction to Computer Systems Architecture This is an introductory course on the architecture of modern computer
ITM661 Database Systems. Database Security and Administration
ITM661 Database Systems Database Security and Administration Outline Introduction to Database Security Issues Types of Security Threats to databases Database Security and DBA Access Protection, User Accounts,
Chapter 8 A secure virtual web database environment
Chapter 8 Information security with special reference to database interconnectivity Page 146 8.1 Introduction The previous three chapters investigated current state-of-the-art database security services
Oracle Database 11g: Security
Oracle University Contact Us: +27 (0)11 319-4111 Oracle Database 11g: Security Duration: 5 Days What you will learn In Oracle Database 11g: Security course students learn how to use Oracle database features
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
D50323GC20 Oracle Database 11g: Security Release 2
D50323GC20 Oracle Database 11g: Security Release 2 What you will learn In this course, you'll learn how to use Oracle Database features to meet the security, privacy and compliance requirements of their
Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification
1. Module Title Information Security 2. Module Code: CS403INS 3. Module Level - Forth Stage 4. Module Leader Safwan M. 5. Teaching Semester 7 and 8 Soran University Faculty of Science and Engineering Computer
Information Security Policy
Information Security Policy Steve R. Hutchens, CISSP EDS, Global Leader, Homeland Security Agenda Security Architecture Threats and Vulnerabilities Design Considerations Information Security Policy Current
Introduction to IT Security
Marek Rychly [email protected] Strathmore University, @ilabafrica & Brno University of Technology, Faculty of Information Technology Enterprise Security 30 November 2015 Marek Rychly ES, 30 November
International Journal on Recent and Innovation Trends in Computing and Communication ISSN 2321 8169. Volume: 1 Issue: 1 23 28 DATABASE SECURITY
DATABASE SECURITY Kamaljeet Kaur Computer Science & Engineering Department Guru Nanak Dev Engg. College, Ludhiana. Punjab-India [email protected] Abstract Ensuring the security of databases is a complex
DESIGNING WEB LABS FOR TEACHING SECURITY CONCEPTS ABSTRACT
DESIGNING WEB LABS FOR TEACHING SECURITY CONCEPTS ABSTRACT Security education is critical in today s cyber threat environment. Many schools have investigated different approaches to teaching fundamental
Transparent Data Encryption: New Technologies and Best Practices for Database Encryption
Sponsored by Oracle : New Technologies and Best Practices for Database Encryption A SANS Whitepaper April 2010 Written by Tanya Baccam, SANS senior instructor and course author for SEC509: Oracle Database
THREAT MODELLING FOR SQL SERVERS Designing a Secure Database in a Web Application
THREAT MODELLING FOR SQL SERVERS Designing a Secure Database in a Web Application E.Bertino 1, D.Bruschi 2, S.Franzoni 2, I.Nai-Fovino 2, S.Valtolina 2 1 CERIAS, Purdue University, West Lafayette, IN,
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
MS-55096: Securing Data on Microsoft SQL Server 2012
MS-55096: Securing Data on Microsoft SQL Server 2012 Description The goal of this two-day instructor-led course is to provide students with the database and SQL server security knowledge and skills necessary
OCTOBER 2015 TAULIA SUPPLIER ARCHITECTURE OVERVIEW TAULIA 201 MISSION STREET SAN FRANCISCO CA 94105
OCTOBER 2015 TAULIA SUPPLIER ARCHITECTURE OVERVIEW TAULIA 201 MISSION STREET SAN FRANCISCO CA 94105 CONTENTS OVERVIEW 3 SOFTWARE DESIGN 3 CUSTOMER ARCHITECTURE.. 4 DATA CENTERS. 4 RELIABILITY. 5 OPERATIONS
Copyright 2013, Oracle and/or its affiliates. All rights reserved.
1 Security Inside-Out with Oracle Database 12c Denise Mallin, CISSP Oracle Enterprise Architect - Security The following is intended to outline our general product direction. It is intended for information
Curran, K. Tutorials. Independent study (including assessment) N/A
MODULE TITLE: MODULE CODE: Systems Security COM535 YEAR OF REVISION: 2013/14 MODULE LEVEL: 6 CREDIT POINTS: 20 MODULE STATUS: SEMESTER: 1 LOCATION: E-LEARNING: PREREQUISITE(S): CO-REQUISITE(S): MODULE
DATABASE SECURITY MECHANISMS AND IMPLEMENTATIONS
DATABASE SECURITY MECHANISMS AND IMPLEMENTATIONS Manying Qiu, Virginia State University, [email protected] Steve Davis, Clemson University, [email protected] ABSTRACT People considering improvements in database
CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS
70 CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS 4.1 INTRODUCTION In this research work, a new enhanced SGC-PKC has been proposed for improving the electronic commerce and
Security Controls for the Autodesk 360 Managed Services
Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013
City University of Hong Kong Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 01/013 Part I Course Title: Course Code: Course Duration: Cryptography
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis
CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems
Comprehensive Approach to Database Security
Comprehensive Approach to Database Security [email protected] NYOUG 2008 1 What will I discuss today Identify Threats, Vulnerabilities and Risk to Databases Analyze the drivers for Database Security Identify
How To Achieve Pca Compliance With Redhat Enterprise Linux
Achieving PCI Compliance with Red Hat Enterprise Linux June 2009 CONTENTS EXECUTIVE SUMMARY...2 OVERVIEW OF PCI...3 1.1. What is PCI DSS?... 3 1.2. Who is impacted by PCI?... 3 1.3. Requirements for achieving
Database Security and Authorization
Database Security and Authorization 1 Database Security and Authorization 1.1 Introduction to Database Security Issues 1.2 Types of Security 1.3 Database Security and DBA 1.4 Access Protection, User Accounts,
Threat Modelling for Web Application Deployment. Ivan Ristic [email protected] (Thinking Stone)
Threat Modelling for Web Application Deployment Ivan Ristic [email protected] (Thinking Stone) Talk Overview 1. Introducing Threat Modelling 2. Real-world Example 3. Questions Who Am I? Developer /
PRIME IDENTITY MANAGEMENT CORE
PRIME IDENTITY MANAGEMENT CORE For secure enrollment applications processing and workflow management. PRIME Identity Management Core provides the foundation for any biometric identification platform. It
Chapter 24. Database Security. Copyright 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley
Chapter 24 Database Security Copyright 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1 Introduction to Database Security Issues Types of Security Legal and ethical issues: privacy issues
What IT Auditors Need to Know About Secure Shell. SSH Communications Security
What IT Auditors Need to Know About Secure Shell SSH Communications Security Agenda Secure Shell Basics Security Risks Compliance Requirements Methods, Tools, Resources What is Secure Shell? A cryptographic
nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.
CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such
Threat Modeling. Frank Piessens ([email protected] ) KATHOLIEKE UNIVERSITEIT LEUVEN
Threat Modeling Frank Piessens ([email protected] ) Secappdev 2007 1 Overview Introduction Key Concepts Threats, Vulnerabilities, Countermeasures Example Microsoft s Threat Modeling Process
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
IS TEST 3 - TIPS FOUR (4) levels of detective controls offered by intrusion detection system (IDS) methodologies. First layer is typically responsible for monitoring the network and network devices. NIDS
SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014
SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014 Table of Contents Introduction AMI Communication Architecture Security Threats Security
Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
Department of Information Systems and Cyber Security
The University of Texas at San Antonio 1 Department of Information Systems and Cyber Security All graduate programs in Information Systems and Cyber Security are accredited by AACSB International The Association
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
Securing Data on Microsoft SQL Server 2012
Securing Data on Microsoft SQL Server 2012 Course 55096 The goal of this two-day instructor-led course is to provide students with the database and SQL server security knowledge and skills necessary to
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
Database Security. Soon M. Chung Department of Computer Science and Engineering Wright State University [email protected].
Database Security Soon M. Chung Department of Computer Science and Engineering Wright State University [email protected] 937-775-5119 Goals of DB Security Integrity: Only authorized users should be
Master of Science in Information Systems & Security Management. Courses Descriptions
Master of Science in Information Systems & Security Management Security Related Courses Courses Descriptions ISSM 530. Information Security. 1 st Semester. Lect. 3, 3 credits. This is an introductory course
MatriXay Database Vulnerability Scanner V3.0
MatriXay Database Vulnerability Scanner V3.0 (DAS- DBScan) - - - The best database security assessment tool 1. Overview MatriXay Database Vulnerability Scanner (DAS- DBScan) is a professional tool with
ORACLE DATABASE SECURITY. Keywords: data security, password administration, Oracle HTTP Server, OracleAS, access control.
ORACLE DATABASE SECURITY Cristina-Maria Titrade 1 Abstract This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource
Administering the Web Server (IIS) Role of Windows Server
Course 10972B: Administering the Web Server (IIS) Role of Windows Server Page 1 of 7 Administering the Web Server (IIS) Role of Windows Server Course 10972B: 4 days; Instructor-Led Introduction This course
Fortinet Solutions for Compliance Requirements
s for Compliance Requirements Sarbanes Oxley (SOX / SARBOX) Section / Reference Technical Control Requirement SOX references ISO 17799 for Firewall FortiGate implementation specifics IDS / IPS Centralized
FBLA Cyber Security aligned with Common Core 6.14. FBLA: Cyber Security RST.9-10.4 RST.11-12.4 RST.9-10.4 RST.11-12.4 WHST.9-10.4 WHST.11-12.
Competency: Defend and Attack (virus, spam, spyware, Trojans, hijackers, worms) 1. Identify basic security risks and issues to computer hardware, software, and data. 2. Define the various virus types and
BUY ONLINE FROM: http://www.itgovernance.co.uk/products/497
CISSP EXAM CRAM 2 1. The CISSP Certification Exam. Assessing Exam Readiness. Taking the Exam. Multiple-Choice Question Format. Exam Strategy. Question-Handling Strategies. Mastering the Inner Game. 2.
Introduction to Cyber Security / Information Security
Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be
The Masters of Science in Information Systems & Technology
The Masters of Science in Information Systems & Technology College of Engineering and Computer Science University of Michigan-Dearborn A Rackham School of Graduate Studies Program PH: 313-593-5361; FAX:
Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings
Computer Security Principles and Practice Second Edition William Stailings Lawrie Brown University ofnew South Wales, Australian Defence Force Academy With Contributions by Mick Bauer Security Editor,
Security Goals Services
1 2 Lecture #8 2008 Freedom from danger, risk, etc.; safety. Something that secures or makes safe; protection; defense. Precautions taken to guard against crime, attack, sabotage, espionage, etc. An assurance;
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
Microsoft Systems Architecture 2.0 (MSA 2.0) Security Review An analysis by Foundstone, Inc.
Microsoft Systems Architecture 2.0 (MSA 2.0) Security Review An analysis by Foundstone, Inc. Foundstone Labs October, 2003 Table of Contents Table of Contents...2 Introduction...3 Scope and Approach...3
Rights Management Services
www.css-security.com 425.216.0720 WHITE PAPER Microsoft Windows (RMS) provides authors and owners the ability to control how they use and distribute their digital content when using rights-enabled applications,
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
Cryptography and network security CNET4523
1. Name of Course 2. Course Code 3. Name(s) of academic staff 4. Rationale for the inclusion of the course/module in the programme Cryptography and network security CNET4523 Major The Great use of local
Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75
Plain English Guide To Common Criteria Requirements In The Field Device Protection Profile Version 0.75 Prepared For: Process Control Security Requirements Forum (PCSRF) Prepared By: Digital Bond, Inc.
CESG Certification of Cyber Security Training Courses
CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security
CS377: Database Systems Data Security and Privacy. Li Xiong Department of Mathematics and Computer Science Emory University
CS377: Database Systems Data Security and Privacy Li Xiong Department of Mathematics and Computer Science Emory University 1 Principles of Data Security CIA Confidentiality Triad Prevent the disclosure
White Paper Secure Reverse Proxy Server and Web Application Firewall
White Paper Secure Reverse Proxy Server and Web Application Firewall 2 Contents 3 3 4 4 8 Losing control Online accessibility means vulnerability Regain control with a central access point Strategic security
Implementation of Mandatory Access Control in Role-based Security System with Oracle Snapshot Skill
Implementation of Mandatory Access Control in Role-based Security System with Oracle Snapshot Skill CSE 367 Independent Study Final Project Report Prof. Steve Demurjian December, 13 2001 Hui Wang Lisa
Security Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
Networking: EC Council Network Security Administrator NSA
coursemonster.com/uk Networking: EC Council Network Security Administrator NSA View training dates» Overview The EC-Council's NSA certification looks at network security from a defensive view. The NSA
Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting
Network Security: 30 Questions Every Manager Should Ask Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting Network Security: 30 Questions Every Manager/Executive Must Answer in Order
Database Security & Auditing
Database Security & Auditing Jeff Paddock Manager, Enterprise Solutions September 17, 2009 1 Verizon 2009 Data Breach Investigations Report: 285 million records were compromised in 2008 2 Agenda The Threat
6231A - Maintaining a Microsoft SQL Server 2008 Database
6231A - Maintaining a Microsoft SQL Server 2008 Database Course Number: 6231A Course Length: 5 Days Certification Exam This course will help you prepare for the following Microsoft Certified Professional
Information Security Policy
Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems
REGULATIONS FOR THE SECURITY OF INTERNET BANKING
REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY
Components- Based Access Control Architecture
Issue s in Informing Science and Information Technology Volume 6, 2009 Components- Based Access Control Architecture Adesina S. Sodiya and Adebukola S. Onashoga Department of Computer Science, University
Microsoft SQL Server for Oracle DBAs Course 40045; 4 Days, Instructor-led
Microsoft SQL Server for Oracle DBAs Course 40045; 4 Days, Instructor-led Course Description This four-day instructor-led course provides students with the knowledge and skills to capitalize on their skills
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information Proteggere i dati direttamente nel database Una proposta tecnologica Angelo Maria Bosis Sales Consulting Senior Manager
MatriXay WEB Application Vulnerability Scanner V 5.0. 1. Overview. (DAS- WEBScan ) - - - - - The best WEB application assessment tool
MatriXay DAS-WEBScan MatriXay WEB Application Vulnerability Scanner V 5.0 (DAS- WEBScan ) - - - - - The best WEB application assessment tool 1. Overview MatriXay DAS- Webscan is a specific application
Developing the Corporate Security Architecture. www.avient.ca Alex Woda July 22, 2009
Developing the Corporate Security Architecture www.avient.ca Alex Woda July 22, 2009 Avient Solutions Group Avient Solutions Group is based in Markham and is a professional services firm specializing in
Oracle Database Security
Oracle Database Security Paul Needham, Senior Director, Product Management, Database Security Target of Data Breaches 2010 Data Breach Investigations Report Type Category % Breaches
