32
8/22/2019 0619215593_lores_ch01 http://slidepdf.com/reader/full/0619215593loresch01 1/32 1 Security Architecture 1 LEARNING OBJECTIVES: Upon completion of this material, you should be able to: s Define security s Describe an information system and its components s Define database management system functionalities s Outline the concept of information security s Identify the major components of information security architecture s Define database security s List types of information assets and their values s Describe security methods PART ONE

0619215593_lores_ch01

Embed Size (px)

Citation preview

Page 1: 0619215593_lores_ch01

8/22/2019 0619215593_lores_ch01

http://slidepdf.com/reader/full/0619215593loresch01 1/32

1

Security Architecture1

LEARNING OBJECTIVES:Upon completion of this material, you should be able to:

s Define security 

s

Describe an information system and its componentss Define database management system functionalities

s Outline the concept of information security 

s Identify the major components of information security architecture

s Define database security s List types of information assets and their valuess Describe security methods

PART ONE

Page 2: 0619215593_lores_ch01

8/22/2019 0619215593_lores_ch01

http://slidepdf.com/reader/full/0619215593loresch01 2/32

2 C H A P TE R 1

IntroductionA quick look at security statistics reveals that security violations and attacks are increasingglobally at an annual average rate of 20%. Statistics show that virus alerts, e-mail spam-ming, identity theft, data theft, and other types of security breaches are also on the rise.

Rising at a faster rate are the related costs for preventive and protective measures. Inresponse to this situation, organizations are focusing more heavily on the security of theirinformation. This book places you in the role of a database administrator who is respond-ing to this increasing focus on security by strengthening the security of your organization’sdatabase. The first part of this book deals with topics that enable you to implement secu-rity measures on your database to protect your data from a variety of violations. To pre-pare for the technical discussions in the chapters to follow, this chapter presents an intro-duction to concepts such as general security, information systems, database managementsystems, and information security—all of which act as the basis for database security.

To gain an understanding of the issues you would face as a database administratortrying to implement increased security, consider the following scenarios. They give you afeeling for the types of security topics covered by the first half of this book.

s A prominent institution hires you to manage a team of skillful database developers,architects, and administrators. Your first challenge on the job is to design and implementa new database security policy to secure data and prevent data integrity violations.

s You are a database administrator for a small startup company. Your company justwon a contract from a large, reputable organization to implement a new databaseapplication. One of the requirements is to enforce a stringent security policy, whichwas never before a priority for your company.

s You are a database developer assigned to a new project, which involves the latesttechnology. As you read the functional specification of the module you are to build,

 you discover that the data to be stored must be encrypted.

These are a few of the many scenarios you’re likely to encounter as you progressthrough the world of work. This chapter covers both security principles and implementa-tion, in general, and database security, more specifically.

Not long ago, most companies protected their data simply by preventing physicalaccess to the servers where the data resided. This practice was sufficient until several inci-dents occurred in which data was jeopardized, compromised, and hijacked. Corporationsquickly moved to enforcing security measures via operating systems, which preventeddata violations by requiring the authentication of the identity of computer users. Thisapproach was successful until new vulnerabilities and new threats brought different typesof risks to database systems and applications.

Database management systems that depend on operating systems cannot survivewithout the implementation of security models that enforce strict security measures. Mostdatabase management systems did not have a secure mechanism for authentication andencryption until recently, when serious research and development was initiated to addsecurity components that enable database administrators to implement security policies.

Yesterday’s DBA was equipped with all sorts of technical skills that empowered himor her to manage a database efficiently. Today’s DBA is required to have an additionalskill—that of implementing security policies that protect one of the most valuable assetsof a company—its data.

Page 3: 0619215593_lores_ch01

8/22/2019 0619215593_lores_ch01

http://slidepdf.com/reader/full/0619215593loresch01 3/32

SE C UR I TY A R C H I TE C TUR E 3

Regardless of your job title, as a team member of a corporation that employs databaseapplications, you must be prepared to protect your company from a variety of security threats. This chapter is designed to increase your expertise and knowledge so that you will beprepared for your database security responsibilities. The chapter presents an overview of sev-eral fundamental concepts essential to implementing the security of a database environment.

SecurityYou have just arrived at your office after a restful vacation. The minute you open theoffice door, you are shocked to see that all the locked drawers are open, your work filesare missing, and your computer has disappeared. You immediately start to list in yourhead the most sensitive confidential files that are missing. You begin to panic as you con-sider what would happen if the information within these files were leaked to the public.You remind yourself that the new project you have spent months developing is gone andsomeone could be selling it to other vendors. Your anxiety rises when you consider whatcould have happened to you personally if the incident had happened while you wereworking late in your office. A few minutes later, your manager steps into your office to tell

 you that the company had been forced to conduct an unexpected audit, and that all thesensitive information in your office had been temporarily moved to an area where theauditors were working. This scenario involves the sense of personal security, which is bestdescribed as the level and degree of being free of danger and threats.

The subject of this book is database security. As you begin this book, it is importantto know just what that is. Database security is the degree to which all data is fully pro-tected from tampering or unauthorized acts. However, this definition is not entirely com-plete. To fully understand the definition, you need to take a quick tour of various infor-mation systems and information security concepts. The following sections dip into thesetopics to build a foundation for defining and understanding database security.

Information SystemsIn today’s global market, corporations all over the world are competing to gain a portionof market share. In some cases, corporations are striving to dominate a sector of the mar-ket, and in other cases they are just trying to stay afloat and survive. Regardless of thegoals of these businesses, their success is usually attributed to the wise decisions of theCEOs. Wise decisions are not made without accurate and timely information. At thesame time, the integrity of that information depends on the integrity of its source data

and the reliable processing of that data. Data is processed or transformed by a collectionof components working together to produce and generate accurate information. Thesecomponents are known as an information system.

An information system can be the backbone of the day-to-day operations of a com-pany as well as the beacon of long-term strategies and vision. Information systems can becategorized based on usage. Figure 1-1 illustrates the typical management pyramid show-ing the category of information system used in each level of management. For example,lower-level management uses information systems that assist management and employ-ees with operational tasks, such as inventory systems or point-of-sale (POS) systems.

Page 4: 0619215593_lores_ch01

8/22/2019 0619215593_lores_ch01

http://slidepdf.com/reader/full/0619215593loresch01 4/32

Middle-level management uses systems that deal with midterm goals, such as a forecast-ing systems that project sales for the following quarter. Upper-level management workswith systems that assist with long-term goals, such as business model simulation andreasoning.

As illustrated in Figure 1-1, information systems are classified mainly into threedistinct categories: transaction-processing systems, decision support systems, andexpert systems. Table 1-1 describes the characteristics and typical applications for eachtype of system.

TABLE 1-1 Characteristics of information system categories

Category Acronym Characteristics TypicalApplication System

Transaction- TPS s Also known as online s Order trackingprocessing transaction processing (OLTP) s Customer servicesystem s Used for operational tasks s Payroll

s Provides solutions for s Accountingstructured problems s Student

s Includes business transactions registrations Logical component of TPS s Car sales

applications (derived frombusiness procedures, businessrules, and policies)

FIGURE 1-1 Typical use of system applications at various management levels

Transaction-processing

systems(TPSs)

Decisionsupportsystems(DSSs)

Expertsystems

(ESs)

Managementinformation

systems(MISs)

Upper-levelmanagement

Middle-level management

Lower-level management

Information Long-term goals Strategic

Data Short-term goals Operational

4 C H A P TE R 1

Page 5: 0619215593_lores_ch01

8/22/2019 0619215593_lores_ch01

http://slidepdf.com/reader/full/0619215593loresch01 5/32

SE C UR I TY A R C H I TE C TUR E 5

TABLE 1-1 Characteristics of information system categories (continued)

Category Acronym Characteristics TypicalApplication System

Decision DSS s Deals with nonstructured s Risk managementsupport problems and provide s Fraud detection

system recommendations or answerss

Sales forecastingto solve these problems s Case resolutions Is capable of performing

“What-if?” analysiss Contains a collection of 

business modelss Is used for tactical

management tasks

Expert system ES s Captures reasoning of human s Virtualexperts university 

s Executive expert systems (ESSs) simulationare a type of expert system used s Financial

by top-level management for enterprisestrategic management goals s Statistical

s A branch of artificial tradingintelligence within the field of  s Loan expertcomputer science studies s Market analysis

s Software consists of:s Knowledge bases Inference engines Rules

s People consist of:s Domain expertss Knowledge engineers

s Power users

Regardless of the type of information system and purpose, an information systemconsists of the following components (see Figure 1-2 for an illustration of a typicalinformation system):

s Data—Collected data and facts used as input for system processing, and data storedin the database for future reference or processing

s Procedures—Includes manual procedures, guidelines, business rules, and policiesimplemented in the system or used as part of the system

s Hardware—Computer systems and devices such as disks, chips, faxes, scanners, and

printerss Software—Application code, languages used to develop code, database management

system, operating system used, and any other utilities or toolss Network—A communication infrastructure to connect client processes to the systems People—Users, managers, business analysts, programmers, system analysts, database

administrators, and system administrators

Page 6: 0619215593_lores_ch01

8/22/2019 0619215593_lores_ch01

http://slidepdf.com/reader/full/0619215593loresch01 6/32

Figure 1-2 shows that data is entered into the system to be processed immedi-ately or to be stored in a database to be processed later when needed. The database isa core component in today’s most commonly used system architecture, which is aform of the client/server architecture that was introduced in mid-1990s. The successof client/server architecture is due to the flexibility and scalability that it offers to sys-tem architects.

The concept behind a client/server application is based on the business model of a

customer ordering a service or product and the representative of a business grantingthat request. In the client/server environment, you can think of the client as the cus-tomer and the server as the representative of a business granting the client’s request. Theclient/server architecture can be implemented as one-tier, two-tier, and n-tier designs. Atier is a logical or physical platform. From a physical point of view, single-tier architec-ture is characterized by the client and server components residing on the same hardwareplatform. From a logical perspective, single-tier architecture is characterized by theclient and the server coexisting as one component. A component is a logical (software)module such as a function, process, or a program. Figure 1-3 illustrates one-tier, two-tier, and three-tier client/server architecture. For example, a two-tier architecture can becomposed of a front-end module used to validate data and to submit requests to the

database server that processes and responds to the client-submitted requests.

FIGURE 1-2 Information system components

Data InformationDatabase

Network

P     r    o   c    e    d     u    

r    e    s    

    P   e   o   p      l   e

S   o  f    t   w   a  r   e  

   H  a  r  d   w  a  r  e

Client name Page 1 of 1 8-27-2004

Process form Approved by 8-27-2004

6 C H A P TE R 1

Page 7: 0619215593_lores_ch01

8/22/2019 0619215593_lores_ch01

http://slidepdf.com/reader/full/0619215593loresch01 7/32

SE C UR I TY A R C H I TE C TUR E 7

The client/server architecture is composed of three layers: the first is the userinterface, which is typically the client; the second is the network layer, which is thebackbone of the application architecture; and the third is the core of the client/serverarchitecture, which responds to all requests submitted by the client (this third is thedatabase server layer). In other words, all applications use some sort of a database

server. The database is managed by a collection of programs whose main purpose is toallow users to store, manipulate, and retrieve data efficiently. The collection of pro-grams that manage the database is known as a database management system (DBMS).The next section presents an overview of the architecture and functions of databasemanagement systems.

Database Management SystemsAs the database is an integral part of an information system, the need for reliable and effi-cient programs to manage the database becomes essential to the success of the information

system. Although many corporations develop DBMSs in which each DBMS has a distinctimplementation and architecture, they all have the following basic common functionalities:

s Allow developers and administrators to organize data in an orderly fashion.s Allow users to store and retrieve data efficiently.

s Allow users to manipulate data (update and delete).

s Enable developers and administrators to enforce data referential integrity and con-sistency. Data is considered to have referential integrity when a relationship betweentwo tables is always maintained (never broken).

FIGURE 1-3 Examples of different client/server tier design

Mainframe

Client

Server

Client

Applicationserver

Server

     R      e       s      u

          l        t       s

R  e  q  u   e    

s     t      

       R       e         s       u

                        l

            t          s

R     e        q      

u      e        s          t             

R  e    q   

u    e     s       t          

    R     e      s      u    l      t      s

Page 8: 0619215593_lores_ch01

8/22/2019 0619215593_lores_ch01

http://slidepdf.com/reader/full/0619215593loresch01 8/32

s Allow administrators to enforce and implement data security policies and proce-dures on all database levels.

s Allow administrators to back up data in case of a failure and provide a mechanism torecover and restore data.

Here is a brief example of how data can lose its integrity and consistency. Anemployee, Tom, who is in the Employee table, is assigned to the Engineering departmentin the Department table (Employee and Department tables from a data modeling pointof view are related 1 to 1. This means that one employee is assigned to only one depart-ment). If the Engineering department record is deleted, Tom’s record loses reference tothe department. This means you do not know Tom’s department, and the data for Tomhas lost its integrity. Now examine the concept of data consistency. When differentaddresses for the same employee exist in different places in the database, you do notknow which is correct, and therefore the data has lost its consistency.

Of course, a DBMS can offer more advanced functions such as distributed transac-tions, replication, and parallel processing. Figure 1-4 provides a view of the database andDBMS environment that illustrates the similarity between those environments and infor-mation systems. Both consist of the same components—data, hardware, software, net-works, procedures, and database servers.

FIGURE 1-4 Database and DBMS environment

Data

Data

Data

Database

Database managementsystem (DBMS)

System architect/developer

Databaseadministrators

Users

8 C H A P TE R 1

Page 9: 0619215593_lores_ch01

8/22/2019 0619215593_lores_ch01

http://slidepdf.com/reader/full/0619215593loresch01 9/32

SE C UR I TY A R C H I TE C TUR E 9

By this point, the chapter has presented a quick overview of security, informationsystems, and database management systems. Now that you have some understandingof those topics, it is time to tie the topics together.

Information SecuritySecurity, as defined earlier, is the sense of feeling safe or protected from deliberate or acci-dental threats. So what about information security? Information is one of an organiza-tion’s most valuable assets, and many companies have an Information Security depart-ment that protects the information and assures employees and managers that theinformation is safe. Information is safe if it is protected from access by unauthorizedusers. At the same time, to be useful, information must be accessible at all times toauthorized users. Information security consists of the procedures and measures taken toprotect each component of the information systems involved in producing information.This means protecting data, hardware, software, networks, procedures, and people—allthe components of the information system.

According to the National Security Telecommunications and Information SystemsSecurity Committee (NSTISSC), the concept of information security is based on theC.I.A. triangle, in which “C” stands for Confidentiality, “I” for Integrity, and “A” for Avail-ability. The C.I.A. triangle is a framework for protecting information. The C.I.A triangleshould guide your efforts to enforce information integrity and shield data from beingtampered with by unauthorized persons, being modified accidentally by employees, orlosing consistency because of the incorrect coding of business requirements and rules.Ensuring that the information system is available when it is needed and at the same timeprotected from downtime caused by external or internal attacks or threats can be a diffi-cult balancing act. To achieve this balance, you must establish security policies that arenot so stringent as to make data inaccessible. Finally, you should not lose sight of confi-

dentiality. Sensitive data and information should be kept secret and only divulged basedon data and classification. Figure 1-5 illustrates the C.I.A. triangle.

FIGURE 1-5 Information security C.I.A triangle

Information

security   C  o   n   f

   i  d  e   n

   t   i  a   l   i   t   y A   

v   a  i   l   i   a  b  i   l   i   t    y   

Integrity

• System is available at all times

only for authorized and

authenticated persons.

• System is protected from being

shut down due to external or

internal threats or attacks.

  • Data and information is

accurate and protected from

tampering by unauthorized

persons.

  • Data and information is

consistent and validated.

  • Data and information is

classified into different levels of

confidentiality to ensure that

only authorized users access

the information.

Page 10: 0619215593_lores_ch01

8/22/2019 0619215593_lores_ch01

http://slidepdf.com/reader/full/0619215593loresch01 10/32

ConfidentialityAs indicated in the previous section, confidentiality is one of the three principles of theC.I.A. triangle. Confidentiality addresses two aspects of security that have subtle differ-ences. The first aspect is the prevention of unauthorized individuals from knowing oraccessing secret information. The second aspect is the process of safeguarding confiden-tial information and disclosing secret information only to authorized individuals by means of classifying information. If either of these two factors is violated, the confiden-tiality principle of the C.I.A. triangle is breached and information security is at risk.

From this discussion, you may conclude that this balancing act is hard to achieve, if not impossible. It is difficult to implement but not impossible if you properly classify 

 your information and design a process to implement and enforce confidentiality. Youshould classify your company’s information into different levels—each level having itsown security measures. To devise an effective classification system, you need to under-stand that classification schemes vary with different companies, government agencies,and other institutions. What determines classification is the type of business and its poli-cies and procedures. However, companies usually classify information based on thedegree of confidentiality necessary to protect that information. Figure 1-6 presents amodel that can be adapted to implement controls for each level.

IntegrityIntegrity is the second principle of the C.I.A. triangle. For information integrity to exist,the data upon which it is based must be consistent and accurate throughout the system.You’ve probably heard the old expression “Garbage in, garbage out.” For security, thismeans that consistent and valid data, if processed correctly, yields accurate information.The integrity aspect of information security is vital, because it focuses your attention onthe most valuable asset, data, which in turn becomes information. Data is considered tohave integrity if it is accurate and has not been tampered with intentionally or acciden-tally. Data must be protected at all levels to achieve full integrity.

Consider the following example. Employee A learns that his adversarial coworker inthe next cubicle is earning a higher salary than he is. Somehow, employee A accesses an

FIGURE 1-6 Confidentiality classification

   C  o   n   t   r

  o    l

More

Less

Few

Many

P   e  o   p  l    e  

Classified

Restricted

Internal in-confidence

External in-confidence

Unclassified

10 C H A P TE R 1

Page 11: 0619215593_lores_ch01

8/22/2019 0619215593_lores_ch01

http://slidepdf.com/reader/full/0619215593loresch01 11/32

SE C UR I TY A R C H I TE C TUR E 11

application program used by the Accounting department and manipulates the vacationhours and overtime hours of his colleague. Two security violations have occurred. First,sensitive data (salary), which is supposed to be confidential, was disclosed or obtainedinappropriately. This is a violation of the confidentiality principle. Second, the disgrun-tled employee gained access to an application that allowed him to modify data. This is aviolation of data integrity. These violations are connected and also interconnected with

the third C.I.A. principle—availability. A security failure occurs when the application failsto detect this malicious act through an audit mechanism or other data controls thatshould be in place. An example of such a control in this case would be an application thatcross-checks overtime hours against actual time cards, computes vacation hours, and ver-ifies entered values. If the computed and entered values are different, the applicationshould require an approval override from another person.

The integrity of the information system is measured by the integrity of its data. Forthe integrity of the data to be considered valid, it must avoid the pitfalls summarized inTable 1-2. One of the pitfalls is losing read consistency. When working with data that hasread consistency, each user sees only his own changes and those that have been commit-ted by other users.

TABLE 1-2 Degradation of data integrity 

Type of Data Degradation Description Reasons for Data Losing Integrity  

Invalid data Indicates that not s User enters invalid data mistakenly all the entered and or intentionally.stored data is valid s Application code does notwithout exception; validate inputted data.checks and validationprocesses (known asdatabase constraints)that prevent invaliddata are missing.

Redundant data Occurs when the same s Faulty data design that does notdata is recorded and conform to the data normalizationstored in several places; process. (Normalization is athis can lead to data database design process used toinconsistency and data reduce and prevent data anomaliesanomalies. and inconsistencies.)

Inconsistent data Occurs when redundant s Faulty database design that doesdata, which resides in not conform to the dataseveral places, is not normalization process.identical.

Data anomalies Exists when there is s Faulty data design that does notredundant data caused conform to the data normalizationby unnormalized data process.design; in this case, dataanomalies occur whenone occurrence of therepeated data ischanged and the otheroccurrences are not.

Page 12: 0619215593_lores_ch01

8/22/2019 0619215593_lores_ch01

http://slidepdf.com/reader/full/0619215593loresch01 12/32

12 C H A P TE R 1

TABLE 1-2 Degradation of data integrity (continued)

Type of Data Degradation Description Reasons for Data Losing Integrity  

Data read inconsistency Indicates that a user s DBMS does not support or hasdoes not always read weak implementation of the readthe last committed data, consistency feature.

and data changes thatare made by the userare visible to othersbefore changes arecommitted.

Data nonconcurrency Means that multiple s DBMS does not support or hasusers can access and weak implementation of the readread data at the same consistency feature.time but they loseread consistency.

AvailabilitySuppose you are asked to write a prescription for a corporation’s success. You will proba-bly prescribe three treatments: technology innovation and implementation, high-quality products, and excellent customer care and service. When a corporation skips any of thesetreatments, it probably loses the competitive edge and thus loses market share.

You may be asking yourself, “How is availability related to security?” To answer thatquestion, consider this scenario. A prominent dot-com company sells a variety of prod-ucts over the Web. You want to purchase a product, but when you try to visit the Web site,

 you receive an error message saying the site is unavailable.You call the company’s cus-tomer service number to get more information about the product, but to your surprise,

the customer service representative informs you that their system is not available and that you should call back.If incidents such as these occur frequently, customers lose confidence in a company,

the company loses customers, and eventually loses market share as well. Regardless of thereasons that led to system unavailability, the result is unsatisfied customers. Now, put sys-tem design and implementation aside and explore why a system becomes unavailablefrom a security point of view. An organization’s information system can become unavail-able because of the following security issues:

s External attacks and lack of system protections Occurrence of system failure with no disaster recovery strategy 

s Overly stringent and obscure security procedures and policies

s Faulty implementation of authentication processes, which causes failure to authenti-cate customers properly 

The availability principle with respect to information security means that the sys-tem should be available (accessible) to individuals who are authorized to access theinformation, and the system should determine what an individual can do with thatinformation.

Page 13: 0619215593_lores_ch01

8/22/2019 0619215593_lores_ch01

http://slidepdf.com/reader/full/0619215593loresch01 13/32

SE C UR I TY A R C H I TE C TUR E 13

Information Security ArchitectureAn information system, as defined earlier, is a collection of components working togetherto solve a problem. Because data is processed into viable information by the informationsystem, security becomes an important aspect of the system. This means that the infor-mation system must protect data and the information produced from the data from hav-ing its confidentiality, integrity, and availability violated on any layer. This sectionexpands on the concept of information security by describing other aspects that make upthe infrastructure required to build security procedures and policies.

Figure 1-7 shows that information security architecture is a model for protecting log-ical and physical assets. Information security architecture is the overall design of a com-pany’s implementation of the C.I.A. triangle. The architecture’s components range fromphysical equipment to logical security tools and utilities. You can see in Figure 1-7 that if any of the principles of the C.I.A. triangle is violated, the information security model willfail to protect the company’s logical or physical assets.

The following list outlines the components of information security architecture:

s Policies and procedures—Documented procedures and company policies that elabo-rate on how security is to be carried out

s Security personnel and administrators—People who enforce and keep security in order

FIGURE 1-7 Information security architecture

Information security architecture

Logicaland

physical assets

Confidentiality

• Privacy laws• Confidential classification• Policies and procedures• Access rights• Customer concerns• Social and cultural issues

Integrity

• Security technology• Security model• Cryptography technology• DBMS technology• Database and data design• Application technology

Availability

• Threats and attacks• System vulnerabilities• Authorization methodology• Authentication technology• Network interfaces• Disaster and recovery strategy

Page 14: 0619215593_lores_ch01

8/22/2019 0619215593_lores_ch01

http://slidepdf.com/reader/full/0619215593loresch01 14/32

s Detection equipment —Devices that authenticate employees and detect equipmentthat is prohibited by the company 

s Security programs—Tools that protect computer systems’ servers from maliciouscode such as viruses

s Monitoring equipment —Devices that monitor physical properties, employees, andother important assets

s Monitoring applications—Utilities and applications used to monitor network trafficand Internet activities, downloads, uploads, and other network activities

s Auditing procedures and tools—Checks and controls put in place to ensure that secu-rity measures are working

Database SecurityBusiness corporations and government institutions depend more and more on informa-tion technology as the sole tool for processing and storing data. This increased relianceon information technology in general, and on information systems specifically, allows

organizations to become more productive and efficient. At the same time, use of infor-mation systems offers a competitive edge over companies that lag behind in technology.Reliance on information systems does not come without a cost. In fact, technology hasnot only introduced societal issues and problems, it has also created a vast range of secu-rity threats that could result in devastating situations.

Information is the foundation of knowledge, and information is not accurate if itssource—data—does not have consistency and integrity. For this specific reason, mostcorporations employ sophisticated information systems that have a databasecomponent.

One of the functions of database management systems is to empower the databaseadministrator to implement and enforce security at all levels of the database. In order for

 you as a database administrator to protect valuable data stored in the database, you mustknow the various security access points that can make your database vulnerable. A secu-

rity access point is a place where database security must be protected and applied—inother words implemented, enforced, and audited. This section presents a list of security access points that apply to most databases.

Figure 1-8 presents all the major access points within a database environment wheresecurity measures must be applied, enforced, and audited. Figure 1-8 represents all thecomponents of the database environment: people, applications, networks, operating sys-tem, database management system, data files, and data. Data is the most valuable asset of the database environment. Having said that, data requires the highest levels of protection,and therefore its data access point must be the smallest of all the components shown in

Figure 1-8.

14 C H A P TE R 1

Page 15: 0619215593_lores_ch01

8/22/2019 0619215593_lores_ch01

http://slidepdf.com/reader/full/0619215593loresch01 15/32

SE C UR I TY A R C H I TE C TUR E 15

The security access points illustrated in Figure 1-8 are:

s People—Individuals who have been granted privileges and permissions to accessapplications, networks, workstations, servers, databases, data files, and data. Thismeans that people represent a risk of database security violations. Therefore databasesecurity must entail all necessary measures to secure the data within the database

against potential violations caused by people.s Applications—Application design and implementation, which includes privileges and

permissions granted to people. If these permissions are too loose, individuals canaccess and violate data. If these permissions are too restrictive, they do not allow users to perform their responsibilities. When granting security privileges to applica-tions, be extremely cautious.

s Network—One of the most sensitive security access points. Be sure to use your bestefforts to protect the network and provide network access only to applications, oper-ating systems, and databases.

s Operating system—The operating system access point is defined as authentication tothe system—the gateway to the data. For example, to access the data residing in a sys-

tem, you must log on and your security credentials must be verified. The absence of good security measures at this access point is the cause of most security violations.

FIGURE 1-8 Database security access points

Operating system

Network

Applications

People

Data

DBMS

Data files

Database security

Page 16: 0619215593_lores_ch01

8/22/2019 0619215593_lores_ch01

http://slidepdf.com/reader/full/0619215593loresch01 16/32

s DBMS—The logical structure of the database, which includes memory, executables,and other binaries.

s Data files—Another access point that influences database security enforcement isaccess to data files where data resides. Through use of permissions and encryption,

 you must protect data files belonging to the database from being accessed by unau-thorized individuals.

s Data—This data access point deals with the data design needed to enforce dataintegrity, the application implementation needed to ensure data validity, and theprivileges necessary to access data.

Examining access points in more detail, you can see each access point as a compo-nent of the entire system. The people component is the largest area because there isoften a huge community of individuals who access data, including users, managers, visi-tors, outsiders, developers, and administrators. All these people increase the possibility of endangering the security of data. Therefore, security efforts and measures should bedirected at decreasing the risks at the people access points, thus decreasing threatsfrom people.

In Figure 1-8, the data file access point is smaller than any of the points above it,which means that the security risks for data files is not as high as at DBMS access points.Therefore reducing DBMS access points makes the data files access point even less acces-sible. Another point you may have noticed in Figure 1-8 is that the proximity of databasesecurity to the access point indicates how close you are to database security violations,and the area of the access point indicates the security risk. Having said that, Figure 1-8indicates that you must start securing the database with people access points, followed by applications, and so on.

To see the other side of the coin, examine Figure 1-9, which shows that when the areasize of the people access point is reduced, the only access to data is through all accesspoints (layers or levels) above. Reducing access point size reduces security risks, which inturn increases database security.

As defined earlier, a security access point is a point at which security measures areneeded to prevent access that can involve unauthorized actions. It is worth noting thatsecurity access points should not to be confused with security gaps or vulnerabilities.Security gaps are points at which security is missing, and thus the system is vulnerable.Vulnerabilities are kinks in the system that must be watched because they can becomethreats. In the world of information security, a threat is defined as a security risk that hasa high possibility of becoming a system breach. The breach can be caused by either inten-tional or unintentional actions. Figure 1-10 shows the process of a security gap eventually resulting in a security breach. To complete this picture you need to know the formal defi-nition of each security access point of the database environment, as defined earlier in thissection and illustrated in Figure 1-8.

16 C H A P TE R 1

Page 17: 0619215593_lores_ch01

8/22/2019 0619215593_lores_ch01

http://slidepdf.com/reader/full/0619215593loresch01 17/32

SE C UR I TY A R C H I TE C TUR E 17

Database Security Levels

As you know, a relational database is a collection of related data files; a data file is a col-lection of related tables; a table is a collection of related rows (records); and a row iscollection of related columns (fields), as shown in Figure 1-11. As you have noticed, the

FIGURE 1-10 Data integrity violation process

DataIntegrityviolation

Securitygap

Securityvulnerability

Securitythreat

Securityrisk

Securitybreach

SecurityAccesspoints

areunprotected

FIGURE 1-9 Database security enforcement

Data

Database security

People

Data files

Applications

DBMS

Network

Operating system

Page 18: 0619215593_lores_ch01

8/22/2019 0619215593_lores_ch01

http://slidepdf.com/reader/full/0619215593loresch01 18/32

structure of the database is organized in levels, and each level can be protected by a dif-ferent security mechanism. For instance, a column can be protected by using a VIEWdatabase object. A VIEW database object is a stored query that returns columns androws from the selected tables. The data provided by the view object is protected by thedatabase system functionality that allows schema owners to grant or revoke privileges.The data files in which the data resides are protected by the database and that protection

is enforced by operating system file permissions. Finally, the database is secured by thedatabase management system through the use of user accounts and password mecha-nisms as well as by the privileges and permissions of the main database functions—database shutdown, creating user accounts, and database backup and recovery, to namea few.

Menaces to DatabasesThe following sections describe the kinds of menaces to database security that arecommonly faced by today’s organizations. The sections describe database vulnerabilities,

FIGURE 1-11

Levels of database security 

DBMS

Grants

Views

Operatingsystem Data

fileDatafile

Datafile

Table Table Table

<=ROW=>

<=ROW=>

<=ROW=>

columncolumncolumn

Database

18 C H A P TE R 1

Page 19: 0619215593_lores_ch01

8/22/2019 0619215593_lores_ch01

http://slidepdf.com/reader/full/0619215593loresch01 19/32

threats, and risks. Although these terms have been used previously in this chapter, beforeproceeding with those descriptions, it is important that you understand the differencesamong these three terms, subtle as they may be:

s Security vulnerability—A weakness in any of the information system componentsthat can be exploited to violate the integrity, confidentiality, or accessibility of 

the systems Security threat—A security violation or attack that can happen any time because of a

security vulnerability s Security risk—A known security gap that a company intentionally leaves open

Types of VulnerabilitiesAccording to www.dictionary.com, vulnerability means “susceptible to attack.” Why is thisword important in security? The answer is simple—intruders, attackers, and assailersexploit vulnerabilities in your environment to prepare and start their attacks. From aninformation security perspective, hackers usually explore the weak points (design or codeflaws) of a system until they gain entry through a gap in protection. Once an intrusion

point is discovered, hackers unleash their array of attacks on the system, which could beviruses, worms, malicious code (code that could corrupt or adversely alter the state of yourcomputer system), or other types of unlawful violations. To protect your system fromthese attacks, you must understand the types of vulnerabilities that may be found in yourinformation security architecture. To conduct a review and examination of the differenttypes of database security vulnerabilities, you need to understand how vulnerabilities arecategorized. Vulnerability categorization is illustrated in Figure 1-12. A description of eachcategory is presented in Table 1-3 with examples.

FIGURE 1-12 Categories of database security vulnerablilities

Installationand

configuration

Design

andimplementation

User mistakes

Software

Databasesecurity

vulnerabilities

SE C UR I TY A R C H I TE C TUR E 19

Page 20: 0619215593_lores_ch01

8/22/2019 0619215593_lores_ch01

http://slidepdf.com/reader/full/0619215593loresch01 20/32

TABLE 1-3 Types of vulnerabilities with definitions and examples

Category Description Examples

Installation and This type of vulnerability results s Incorrect applicationconfiguration from using a default installation configuration that may  

and configuration that is known result in application

publicly and usually does not enforce malfunctionany security measures. Also, improper s Failure to change defaultconfiguration or installation may passwordsresult in security risks. s Failure to change default

permissions and privilegess Using default application

configuration that leads tosecurity vulnerability, asmost applications do notenforce high-security measures for thedefault setup.

User mistakes Although all security vulnerabilities s Lack of auditing controlsare tied to humans, vulnerabilities s Untested disasterlisted in this category are mainly recovery planrelated to carelessness in s Lack of activity monitoringimplementing procedures, failure to s Lack of protection againstfollow through, or accidental errors. malicious code

s Lack of applying patches asthey are released

s Bad authentication processor implementation

s Social engineering(pretending to be a

representative of a legitimateorganization to trick anindividual into providingsensitive information)

s A user’s lack of technicalinformation that leads touser susceptibility to varioushacker intrusions and fraudschemes

s Susceptibility to scams

Software This category relates to s Software patches are not

vulnerabilities found in commercial appliedsoftware for all types of programs s Software contains bugs(applications, operating systems, s System administrators dodatabase management systems, and not keep track of patchesother programs).

20 C H A P TE R 1

Page 21: 0619215593_lores_ch01

8/22/2019 0619215593_lores_ch01

http://slidepdf.com/reader/full/0619215593loresch01 21/32

TABLE 1-3 Types of vulnerabilities with definitions and examples (continued)

Category Description Examples

Design and Vulnerabilities of this category are s System design errorsimplementation related to improper software analysis s Exceptional conditions

and design as well as coding (special cases in which code

problems and deficiencies. fails to execute) and errorsare not handled in programdevelopment

s Input data is not validated

Type of ThreatsEarlier in the chapter, you were shown that in the data integrity violation process, vulner-abilities can escalate into threats. As database administrator, database manager, or infor-mation security administrator, you need to be aware of these vulnerabilities and threatsto protect your organization and its assets. As with the categorization of vulnerabilities,threats are categorized to ensure that everything that contributes to security risks is cov-

ered. Figure 1-13 presents threat categories.

As shown in Figure 1-13, four types of threats contribute to security risks.According to www.dictionary.com, a threat is defined as “An indication of impendingdanger or harm.”

Table 1-4 defines and offers examples of each type of threat category shown inFigure 1-13.

FIGURE 1-13 Categories of database security threats

Naturaldisasters

Maliciouscode

People

Technologicaldisasters

Databasesecuritythreats

SE C UR I TY A R C H I TE C TUR E 21

Page 22: 0619215593_lores_ch01

8/22/2019 0619215593_lores_ch01

http://slidepdf.com/reader/full/0619215593loresch01 22/32

TABLE 1-4 Threat types, definitions, and examples

Threat type Definition Examples

People People intentionally or s Employeesunintentionally inflict damage, s Government authorities orviolation, or destruction to all or persons who are in charge

any of the database environments

Contractorscomponents (people, applications, s Consultantsnetworks, operating systems, s Visitorsdatabase management systems, s Hackersdata files, or data). s Organized criminals

s Spiess Terroristss Social engineers

Malicious code Software code that in most cases is s Virusesintentionally written to damage or s Boot sector virusesviolate one or more of the database s Wormsenvironment components s Trojan horses

(applications, networks, operating s Spoofing codesystems, database management s Denial-of-service floodsystems, data files, or data). s Rootkits

s Botss Bugss E-mail spammings Macro codes Back door

Natural disasters Calamities caused by nature, which s Hurricanescan destroy any or all of the database s Tornadosenvironment components. s Earthquakes

s

Lightnings Floods Fire

Technological Often caused by some sort of  s Power failuredisasters malfunction in equipment or s Media failure

hardware, technological disasters s Hardware failurecan inflict damage to networks, s Network failureoperating systems, databasemanagement systems, data files,or data.

22 C H A P TE R 1

Page 23: 0619215593_lores_ch01

8/22/2019 0619215593_lores_ch01

http://slidepdf.com/reader/full/0619215593loresch01 23/32

Terms used in the table:

s Virus—Code that compromises the integrity and state of a systems Boot sector virus—Code that compromises the segment in the hard disk that con-

tains the program used to start the computers Worm—Code that disrupts the operation of a systems Back door—An intentional design element of some software that allows developers

of a system to gain access to the application for maintenance or technical problemss Trojan horse—Malicious code that penetrates a computer system or network by pre-

tending to be legitimate code

s Spoofing code—Malicious code that looks like legitimate code

s Denial-of-service-flood—The act of flooding a Web site or network system withmany requests with the intent of overloading the system and forcing it to deny serv-ice to legitimate requests

s Rootkits and bots—Malicious or legitimate software code that performs such func-tions as automatically retrieving and collecting information from computer systems

s Bugs—Software code that is faulty due to bad design, logic, or boths E-mail spamming—E-mail that is sent to many recipients without their permission

A threat can result in a security risk that requires you to employ and execute security measures to prevent or foil security breaches or damage. In the next section you look atthe security risks that can emerge from threats.

Types of RisksRisks are simply a part of doing business. Managers at all levels are constantly working toassess and mitigate risks to ensure the continuity of departmental operations. As part of this game, you need not only to understand your system weaknesses and threats, but towalk the extra mile to diminish the probability of these threats actually occurring. So whatare the risks to the security of the database environment? Simply put, the reliability of a

database at all levels is at risk, and most importantly the integrity of the data. Figure 1-14illustrates the categories of database security risks, and Table 1-5 defines those categories.

FIGURE 1-14 Categories of database security risks

Confidence

DataPeople

Hardware

Databasesecurity

risks

SE C UR I TY A R C H I TE C TUR E 23

Page 24: 0619215593_lores_ch01

8/22/2019 0619215593_lores_ch01

http://slidepdf.com/reader/full/0619215593loresch01 24/32

TABLE 1-5 Definition and examples of risk types

Risk Type Definition Example

People The loss of people who are vital s Loss of key personscomponents of the database (resignation, migration,environment and know critical health problems)

information about the environments

Key person downtime duecan create risks. to sickness, personal orfamily problems, or burnout

Hardware A risk that mainly results in hardware s Downtime due to hardwareunavailability or inoperability. failure, malfunction, or

inflicted damages Failure due to unreliable or

poor quality equipment

Data Data loss and data integrity loss is a s Data lossmajor concern of the database s Data corruptionadministrators and management s Data privacy loss

Confidence The loss of public confidence in the s Loss of procedural anddata produced by the company causes policy documentsa loss of public confidence in the s Database performancecompany itself. degradation

s Frauds Confusion and uncertainty 

about database information

If you were to rate vulnerabilities, threats, and risks according to most the com-mon and important factors, you would list three factors: people, software, and data.The remaining factors act as amplifiers or supporters. Figure 1-15 represents this inte-

gration. Figure 1-15 shows that database security involves the protection of the mainthree components—people, software, and data—from vulnerabilities, which canbecome threats to the integrity of the system and consequently become a risk to thebusiness operation.

24 C H A P TE R 1

Page 25: 0619215593_lores_ch01

8/22/2019 0619215593_lores_ch01

http://slidepdf.com/reader/full/0619215593loresch01 25/32

Asset Types and Their ValuePeople always tend to protect assets regardless of what they are. For example, you may keep a memorable picture of your parents in a safe place. However, the degree of protec-tion you provide is directly based on how much you value the assets. If you highly valuethe picture of your great-grandparents, you might take an extra measure of precaution by copying it and placing it in a fireproof safe where it is guarded from most natural disas-ters and from theft, or you may just put it in a frame because you have many similar pic-tures or because you can reproduce it.

Corporations treat their assets in the same way. Assets are the infrastructure of thecompany operation. Depending on the type of asset and how much the company valuesit, the company builds security policies and procedures and executes actions to protectthese assets. In this section you explore the types of assets that business entities own inorder to relate these concepts to database security. There are four main types of assets:

s Physical assets—Also known as tangible assets, these include buildings, cars, hard-ware, and so on

s Logical assets—Logical aspects of an information system, such as business applica-tions, in-house programs, purchased software, operating systems, databases, and data

s Intangible assets—Business reputation, quality, and public confidences Human assets—Human skills, knowledge, and expertise

Security measures are implemented based on the value of each asset. For instance, if a company employs a scientist working on an important invention, the company may take extra measures to avoid losing the intellectual asset she represents. Similarly, every component in the database environment is protected according to its value. Continuing

FIGURE 1-15 Integration of security vulnerabilities, threats, and risks in a databaseenvironment

Software

    R    i   s    k   s

T    h   r   e   

a   t    s   

Databasesecurity

Data People

Vulnerabilities

SE C UR I TY A R C H I TE C TUR E 25

Page 26: 0619215593_lores_ch01

8/22/2019 0619215593_lores_ch01

http://slidepdf.com/reader/full/0619215593loresch01 26/32

with the same example, the company may use no security measures to protect test-gener-ated data that developers and quality assurance engineers use as part of the databaseapplication development phases. However, if the information is part of production data,the company probably executes specific security procedures and polices to protect thatproduction data from all types of violations.

Security MethodsSecurity technology comprises a variety of methods that protect specific aspects of secu-rity architecture. In this section you explore the most common methods used to securethe database environment. Only methods that are data related are discussed in this book.Table 1-6 outlines the security methods that are used to protect the different componentsof a database environment.

TABLE 1-6 Security methods used to protect database environment components

Database Security MethodsComponentProtected

People s Physical limits on access to hardware and documentss Through the processes of identification and authentication, make

certain that the individual is who he or she claims to be through theuse of devices, such as ID cards, eye scans, and passwords

s Training courses on the importance of security and how to guard assetss Establishment of security policies and procedures

Applications s Authentication of users who access applicationss Business rules

s Single sign-on (a method for signing on once for differentapplications and Web sites)

Network  s Firewalls to block network intruderss Virtual private network (VPN) (a remote computer securely 

connected to a corporate network)s Authentication

Operating system s Authentications Intrusion detections Password policy s User accounts

Database s Authenticationmanagement s Audit mechanismsystem s Database resource limits

s Password policy 

Data files s File permissionss Access monitoring

26 C H A P TE R 1

Page 27: 0619215593_lores_ch01

8/22/2019 0619215593_lores_ch01

http://slidepdf.com/reader/full/0619215593loresch01 27/32

TABLE 1-6 Security methods used to protect database environment components (continued)

Database Security MethodsComponentProtected

Data s Data validations

Data constraintss Data encryptions Data access

A business rule is the implementation of a business procedure or policy through code writtenin an application.

Database Security MethodologyBy this point in this chapter, you have an overview of most of the essential aspects of security architecture. It is time to put the pieces of the database security jigsaw puzzletogether to compose a process that will assist you in building your database security. This

section presents an implementation process that can be used as a framework or method-ology to outline the security tasks required for each stage. As shown in Figure 1-16, thisprocess consists of phases similar to those of most software engineering methodologies,except the focus in each phase is security.

Figure 1-16 presents database security methodology side by side with the softwaredevelopment life cycle (SDLC) methodology. Notice that phases in the database secu-rity methodology correspond to those of the SDLC. For example, suppose your com-pany is carrying out a new inventory system project. Typically, your first phase in theSDLC is to plan for resources and devise a high-level project plan outlining majormilestones. As a security architect or administrator, at the planning phase you are exe-cuting tasks in the identification phase. One of the tasks in this phase is identifying the

FIGURE 1-16 Database security methodology 

Software development life cycle

Planning

Identification

Anaylsis

Assessment

Design

Design

Coding

Implementation

Testing

Evaluation

Maintenance

Auditing

Database security implementation methodology

SE C UR I TY A R C H I TE C TUR E 27

Page 28: 0619215593_lores_ch01

8/22/2019 0619215593_lores_ch01

http://slidepdf.com/reader/full/0619215593loresch01 28/32

28 C H A P TE R 1

security policy that will be adopted for this project. The following list presents the def-inition of each phase of the database security methodology.

s Identification—This phase entails the identification and investigation of resourcesrequired and policies to be adopted.

s Assessment —This phase includes analysis of vulnerabilities, threats, and risks forboth aspects of database security: physical (data files and data) and logical (memory and code). You analyze system specifications and requirements to devise a security policy and procedures for all database modules and application data.

s Design—This phase results in a blueprint of the adopted security model that is usedto enforce security. The blueprint shows how security measures are implemented toenforce data integrity and accessibility.

s Implementation—Code is developed or tools are purchased to implement the blue-print outlined in the previous phase.

s Evaluation—In this phase you evaluate the security implementation by testing yoursystem against typical software attacks, hardware failures, natural disasters, andhuman errors. The result of this phase is a determination of the system’s degree of security.

s Auditing —After the system goes into production, security audits should be per-formed periodically to ensure the security state of the system.

Database Security Definition RevisitedAt the start of this chapter database security was defined as the degree to which all data isfully protected from tampering or unauthorized acts.You were warned, however, that youneeded the chapter’s quick tour of various information systems and information security concepts before confronting a complete definition. Now that you’ve had that tour, thedefinition can be expanded as follows: Database security is a collection of security poli-cies and procedures, data constraints, security methods, and security tools blended

together to implement all necessary measures to secure the integrity, accessibility, andconfidentiality of every component of the database environment. These componentsinclude people, applications, networks, operating systems, database management systems,data files, and data.

Chapter Summarys Security is defined as the level and degree of being free from danger and threats.

s Database security can be briefly defined as the degree to which data is fully protected from unau-

thorized tampering.

s Information systems are the backbone of the day-to-day company operations as well as the guide

for long-term strategies.

s A typical information system consists of data, procedures, hardware, software, networks, and people.

Page 29: 0619215593_lores_ch01

8/22/2019 0619215593_lores_ch01

http://slidepdf.com/reader/full/0619215593loresch01 29/32

s A client/server application is based on the business relationship in which the customer requests an

order or service and the server responds to the request.

s A tier is a logical or physical platform in client/server architecture.

s DBMSs from different vendors vary in distinct implementation and architecture but they have close

to the same functionality.

s

The basic function of a DBMS is to enable developers and administrators to organize data; store,manipulate, and retrieve data efficiently; enforce data referential integrity; and provide a security

mechanism to protect the data.

s Most companies employ an Information Security department to protect data and information.

s The concept of information security is based on the C.I.A. triangle in which “C” stands for confi-

dentiality, “I” stands for integrity, and “A” stands for availability.

s There are two components to confidentiality: preventing unauthorized individuals from knowing or

accessing secretive information, and keeping confidential information secret by not disclosing it to

unauthorized individuals.

s Data is considered to have integrity if it is accurate and has not been intentionally or unintention-

ally tampered with.

s System availability is measured by how accessible the system is to individuals who are authorized

to access information and how free individuals are to manipulate data.

s Database environment components are people, applications, networks, operating systems, data-

base management systems, data files, and finally data.

s Data is the most valuable asset of the database environment.

s An access point is a gateway that requires measures to limit database security violations.

s A security access point is a point where security measures are needed to prevent access to unau-

thorized actions.

s Vulnerability is defined as being susceptible to attack.

s A threat is defined as an indication of impending danger or harm.

s A security risk is a result of a threat, which is a result of vulnerability.

s Information security architecture is a model for protecting logical and physical assets.

s Information security architecture is the overall design of a company’s implementation of the

C.I.A. triangle.

s Components of information security architecture include policies and procedures, security

personnel and administrators, detection equipment, security programs, monitoring equipment,

monitoring applications, and auditing procedures and tools.

s Database management systems empower the database administrator to implement and enforce

security at all levels of the database.

s The security access points are people, applications, networks, operating systems, DBMS, data files,

and data.

Review Questions

1. Security is best described as being totally free from danger. True or false?

2. Data is processed or transformed to become facts. True or false?

3. Data anomalies exist when there is redundant data caused by unnormalized data design.True or false?

SE C UR I TY A R C H I TE C TUR E 29

Page 30: 0619215593_lores_ch01

8/22/2019 0619215593_lores_ch01

http://slidepdf.com/reader/full/0619215593loresch01 30/32

4. Human error vulnerabilities are most often related to carelessness in implementing or following

through on procedures.True or false?

5. Malicious code is software code written by hobbyists to test their capabilities.True or false?

6. A power failure is a type of natural disaster threat. True or false?

7. A system can become unavailable because of bad implementation of an authentication process.

True or false?8. Which one of the following is not a component of an information system?

a. programmer

b. report

c. business procedure

d. physical asset

9. Which one of the following is not a functionality of database management systems?

a. allows users to validate data as it is entered

b. allows developers and administrators to organize data

c. enables developers and administrators to enforce data referential integrity and consistency

d. allows administrators to enforce and implement data security

10. Which one of the following administrator functions is enabled by a database management system?

a. Automatically back up data in case of a failure.

b. Back up data in case of theft.

c. Back up data in case of an intrusion.

d. Back up data for auditing purposes.

11. Which one of the following is part of the information security triangle?

a. intrusion

b. integrity

c. integral

d. internal

12. Which one of the following is not part of a typical information security architecture?a. policies and procedures

b. business rules

c. detection equipment

d. auditing procedures and tools

13. Data risk results in which of the following?

a. data performance

b. data access

c. data privileges

d. data corruption

14. Which of the following is not a logical asset?

a. information systemb. business application

c. in-house programs

d. purchased software

15. Outline the three components of the information security triangle and list one violation example

for each.

16. Provide an example of how you can prevent physical access to an application database server.

17. Name three methods to enforce data integrity and provide an example for each method.

30 C H A P TE R 1

Page 31: 0619215593_lores_ch01

8/22/2019 0619215593_lores_ch01

http://slidepdf.com/reader/full/0619215593loresch01 31/32

18. Provide three examples of people threats.

19. Explain how system vulnerabilities impact business.

20. Name three key measures that your business may adopt to protect data.

Hands-on Projects

Hands-on Project 1-1

Using the Web as a resource, conduct a survey to compile a list of the top ten security vulnerabilities.

Hands-on Project 1-2

Why is the CI.A. triangle important?

Hands-on Project 1-3

You are a security officer working for a medium-sized research company.You have been assigned to

guard a back entrance checkpoint. One day, a well-known manager walks out with a box of papers.

A day later you are summoned to the security office by your manager and the security director for

questioning about the manager who had been terminated the day before.The manager had walked

out with highly confidential information.

1. Outline briefly what types of security measures were violated and how to avoid those violations.

2. Describe how this incident may result in security violations.

Hands-on Project 1-4

You are an employee of a company responsible for the administration of ten production databases.Lately, you have noticed that your manager is asking you frequent questions about the data used

by one of the top researchers of the Engineering department. For two days, while conducting rou-

tine database tasks, you notice your manager exporting data from the database the top

researchers are using.

1. What type of security threat is the exportation of data? How can you prevent it?

2. To what type of security risk could exporting data lead?

3. Explain briefly how you would react to this incident.

Hands-on Project 1-5

You were just informed by your manager that you are assigned to a new project that deals with

financial data. Because you are the system analyst, your manager asked you to conduct a survey of 

users regarding what they require from the new project.After collecting all necessary data, you

determine that this project requires high security measures. Outline the steps you should take to

move forward.

SE C UR I TY A R C H I TE C TUR E 31

Page 32: 0619215593_lores_ch01

8/22/2019 0619215593_lores_ch01

http://slidepdf.com/reader/full/0619215593loresch01 32/32

Hands-on Project 1-6

For each type of malicious code listed in Table 1-4, provide two examples of real-life code.

Hands-on Project 1-7

Describe a situation that illustrates each type of human threat listed in Table 1-4.

Case ProjectYou are a database administrator working for a national bank institution. One day, a lead devel-

oper sends you an e-mail requesting that you perform a data change. In the e-mail, he stresses the

urgency and importance of this task. A minute later, you receive another e-mail but this is from the

lead developer’s manager to confirm the data change. This is the first time you have ever received

this type of request. Usually, all requests go through the change management process.

1. List the security issues involved in this incident.

2. Describe the type of risks involved if you comply with the request and the types of riskinvolved if you do not.

3. Explain briefly how you would react to this incident, outlining your reasoning and whether

you would comply or not.

32 C H A P TE R 1