DATABASE SECURITY, INTEGRITY AND RECOVERY



Similar documents
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

Concepts of Database Management Seventh Edition. Chapter 7 DBMS Functions

4. Identify the security measures provided by Microsoft Office Access. 5. Identify the methods for securing a DBMS on the Web.

Cyber Liability Insurance Data Security, Privacy and Multimedia Protection

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Data Security Incident Response Plan. [Insert Organization Name]

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

HIPAA Security Alert

Chapter 7 Information System Security and Control

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Oracle Database Security

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Chap. 1: Introduction

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

HIPAA Information Security Overview

Web Security School Final Exam

California State University, Sacramento INFORMATION SECURITY PROGRAM

DBMS Questions. 3.) For which two constraints are indexes created when the constraint is added?

B.Sc (Computer Science) Database Management Systems UNIT-V

1 File Processing Systems

Circular to All Licensed Corporations on Information Technology Management

BM482E Introduction to Computer Security

External Supplier Control Requirements

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

Management Standards for Information Security Measures for the Central Government Computer Systems

Cyber Liability Insurance Data Security, Privacy and Multimedia Protection

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

HIPAA Security COMPLIANCE Checklist For Employers

ITM661 Database Systems. Database Security and Administration

HIPAA Security. assistance with implementation of the. security standards. This series aims to

Responsible Access and Use of Information Technology Resources and Services Policy

Certified Information Systems Auditor (CISA)

Computers and Society: Security and Privacy

COB 302 Management Information System (Lesson 8)

TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6. TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4

Brainloop Cloud Security

Enterprise PrivaProtector 9.0

Chapter 8 A secure virtual web database environment

DEVELOPING A NETWORK SECURITY PLAN

Network Security and the Small Business

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

COSC 472 Network Security

Cybersecurity Health Check At A Glance

The supplier shall have appropriate policies and procedures in place to ensure compliance with

Content Teaching Academy at James Madison University

Chapter 11 Computers and Society, Security, Privacy, and Ethics

Data Processing Agreement for Oracle Cloud Services

B2.2-R3: INTRODUCTION TO DATABASE MANAGEMENT SYSTEMS

Transactions and Recovery. Database Systems Lecture 15 Natasha Alechina

Risk Assessment Guide

ACE Advantage PRIVACY & NETWORK SECURITY

Security in Database Systems

Procedure Title: TennDent HIPAA Security Awareness and Training

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

Projectplace: A Secure Project Collaboration Solution

How To Secure Wireless Networks

INFORMATION SECURITY PROGRAM

Information Security Awareness Training Gramm-Leach-Bliley Act (GLB Act)

Computer Security: Principles and Practice

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Information Security Basic Concepts

Client Security Risk Assessment Questionnaire

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

Database and Data Mining Security

CyberEdge. Desired Coverages. Application Form. Covers Required. Financial Information. Company or Trading Name: Address: Post Code: Telephone:

Technical Information

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

Internal Control Guide & Resources

B.Com(Computers) II Year DATABASE MANAGEMENT SYSTEM UNIT- V

Application Intrusion Detection

EXIN Information Security Foundation based on ISO/IEC Sample Exam

ICTN Enterprise Database Security Issues and Solutions

Information Security Policy

Chapter 23. Database Security. Security Issues. Database Security

BKDconnect Security Overview

Risks of Hosting Practice Data on the Cloud Vs. Locally

Penetration Testing. Presented by

VMware vcloud Air HIPAA Matrix

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

University of Pittsburgh Security Assessment Questionnaire (v1.5)

Best Practices For Department Server and Enterprise System Checklist

Information Security Policy Manual

The Ministry of Information & Communication Technology MICT

C. Author(s): David Millar (ISC Information Security) and Lauren Steinfeld (Chief Privacy Officer)

1B1 SECURITY RESPONSIBILITY

IRONSHORE SPECIALTY INSURANCE COMPANY 75 Federal St. Boston, MA Toll Free: (877) IRON411

Security Policy JUNE 1, SalesNOW. Security Policy v v

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

HIPAA Security. 4 Security Standards: Technical Safeguards. Security Topics

Transcription:

DATABASE SECURITY, INTEGRITY AND RECOVERY

DATABASE SECURITY, INTEGRITY AND RECOVERY

Database Security and Integrity Definitions Threats to security and integrity Resolution of problems

DEFINITIONS SECURITY: Protecting the database from unauthorized access, alteration or deletion. INTEGRITY: It refers to accuracy or validation of the data.

THREATS to security and integrity A threat is any situation, event or personnel that will adversely effect the database security and smooth and efficient functioning of the organization. Threat to a database may be intentional or accidental. Given below are some database security threats. Data tampering Eavesdropping and data theft Falsifying User s identities Password related threats Unauthorized access to data Lack of accountability

DEFENCE MECHANISMS Generally four levels of defence are recognized for a database security: Physical security Human factors Operating system Database system

Data Security RECQUIREMENTS The basic security standards which technologies can assure are : CONFIDENTIALITY Access control - Access to data is controlled by means of privileges, roles and user accounts. Authenticated users Authentication is a way of implementing decisions of whom to trust. It can be employ passwords, finger prints etc. Secure storage of sensitive data It is required to prevent data from hackers who could damage the sensitive data. Privacy of communication - The DBMS should be capable of controlling the spread of confidential personal information from unauthorized people such as credit cards etc.

INTEGRITY Integrity contributes to maintaining a secure database by preventing the data from becoming invalid and giving misleading results. It consists of following aspects : System and object privileges control access to applications tables and system commands so that only authorized users can change the data. Integrity constraints are applied to maintain the correctness and validity of the data in the database. Database must be protected from viruses so firewalls and anti-viruses should be used. Ensures that access to the network is controlled and data is not vulnerable to attacks during transmission across network.

AVAILABILITY Data should always be made available for the authorized user by the secure system without any delays. Availability is often thought of as a continuity of service assuring that database is available. Denial of service attacks are attempts to block authorized users ability to access and use the system when needed. It has number of aspects. Ease of use Resources managed by users for working with databases should be effectively managed so that it is available all the time to valid users. Flexibility Administrators must have all the relevant tools for managing user population. Scalability - System performance should not get affected by the increase in number of users or processes which require services from system. Resistance User profiles must be defined and the resource used by any user should be limited.

IMPORTANT SECURITY FEATURES Views Authorization and controls User defined procedures or privileges Encryption procedures

AUTHORIZATION is a PROCESS OF PERMITTING USERS to perform certain operations on certain data objects in a shared database. For example: Let us consider the authorization that a salesperson undertakes; AUTHORIZATION CUSTOMER RECORDS ORDER RECORDS READ Y Y INSERT Y Y MODIFY Y N DELETE N N Where N stands for NO and Y stands for YES to authorization for salesperson

To explain the concept of view, let us consider the example of a bank clerk who needs to know the names of customers of each branch but is not authorized to see specific loan information. The view is defined as follows: CREATE VIEW CUST_LOAN AS SELECT BRANCHNAME, CUSTOMER_NAME FROM BORROWER, LOAN Where BORROWER.LOAN_NO = LOAN.LOAN_NO; since the clerk is authorized to see this view so clerk can execute a query to see the result. SELECT * from CUST_LOAN; When the query processor translates the result into a query on actual base table in the database we obtain a query on BORROWER and LOAN tables. This permission must be checked on clerk s query processor begins.

DATABASE INTEGRITY Constraints : It can be defined in 3 ways- 1) Business constraints 2) Entity constraints 3) Referential constraints

BUSINESS CONSTRAINTS A value in one column may be constrained by value of some another or by some calculation or formulae. ENTITY CONSTRAINTS Individual columns of a table may be constrained eg. Not null. REFRENTIAL CONSTRAINTS Sometimes referred to as key constraints. Eg. Table two depends upon table one.

BENEFITS OF USING CONSTRAINTS Guaranteed integrity and consistency Defined as a part of table definition Applies across all applications Cannot be circumvented Application development and productivity Requires no special programming Easy to specify and maintain Defined once only

CONCURRENCY CONTROL What is it? The coordination of simultaneous requests for the same data, from multiple users. Why is it important? Simultaneous execution of transactions over a shared database may create a several data integrity and consistency problems.

THREE MAIN INTEGRITY PROBLEMS ARE Lost updates Uncommitted data Inconsistent retrievals

DATABASE RECOVERY The process of restoring database to a correct state in the case of failure. E.g. system crashes Media failures Application software errors Natural physical disasters carelessness

BASIC RECOVERY CONCEPTS Backup mechanism it makes periodic backup copies of the database. Logging concept that keeps the track of current state of transaction and the changes made in the database. Check pointing mechanism that enables update to be made permanent.

The choice of the best possible strategy depends upon the Extent of damage that had occurred to the database. If there has been a physical damage like disk crash then the last backup copy of the data is restored. However if database has become inconsistent but not physically damaged then changes caused inconsistency must be undone. It may also be required to redo some transactions so as to ensure that the updates are reflected in the database.

THANK YOU