20
Database Security By Bei Yuan

Database Security By Bei Yuan. Why do we need DB Security? Make data arranged and secret Secure other’s DB

Embed Size (px)

Citation preview

Page 1: Database Security By Bei Yuan. Why do we need DB Security? Make data arranged and secret Secure other’s DB

Database Security

By Bei Yuan

Page 2: Database Security By Bei Yuan. Why do we need DB Security? Make data arranged and secret Secure other’s DB

Why do we need DB Security?

• Make data arranged and secret

• Secure other’s DB

Page 3: Database Security By Bei Yuan. Why do we need DB Security? Make data arranged and secret Secure other’s DB

Security Issues:

• Security Policy

• Access Control

• Encryption

• Internet Security

• Threat Monitoring (Auditing)

Page 4: Database Security By Bei Yuan. Why do we need DB Security? Make data arranged and secret Secure other’s DB

Security Policy

• Exposures: A form of possible loss of a firm.

• Vulnerabilities: Weakness in an enterprise’s system.

• Threats: Specific, potential attack on the enterprise.

• Controls: Eliminate threats, vulnerabilities and

exposures

Page 5: Database Security By Bei Yuan. Why do we need DB Security? Make data arranged and secret Secure other’s DB

A security system is a system.

Page 6: Database Security By Bei Yuan. Why do we need DB Security? Make data arranged and secret Secure other’s DB

Access Control

♦ Access Control Models

♦ User Authentication

Page 7: Database Security By Bei Yuan. Why do we need DB Security? Make data arranged and secret Secure other’s DB

Access Control Models

• Discretionary Access Control (DAC) Model

• Mandatory Access Control (MAC) Model

• Role-Based Access Control (RABC) Model

Page 8: Database Security By Bei Yuan. Why do we need DB Security? Make data arranged and secret Secure other’s DB

Discretionary Access Control

• Ownership-based, flexible, most widely used, low assurance

• Privileged users: DBA and owners of the tables

Page 9: Database Security By Bei Yuan. Why do we need DB Security? Make data arranged and secret Secure other’s DB

Limitations of DAC

Page 10: Database Security By Bei Yuan. Why do we need DB Security? Make data arranged and secret Secure other’s DB

Mandatory Access Control

• Administration-based

• Data flow control rules

• High level of security, but less flexible

Page 11: Database Security By Bei Yuan. Why do we need DB Security? Make data arranged and secret Secure other’s DB

MAC Policy

Page 12: Database Security By Bei Yuan. Why do we need DB Security? Make data arranged and secret Secure other’s DB

Role-Based Access Control

• Flexible

• Separation of duty

• Able to express DAC, MAC, and user-specific policies using role constraints

• Easy to incorporated into current tech

Page 13: Database Security By Bei Yuan. Why do we need DB Security? Make data arranged and secret Secure other’s DB

User Authentication

• Password-Based Authentication

• Host-Based Authentication

• Third Party-Based Authentication

Page 14: Database Security By Bei Yuan. Why do we need DB Security? Make data arranged and secret Secure other’s DB

Encryption

• Full Database Encryption

• Partial Database Encryption

• Off-Line Database Encryption

Page 15: Database Security By Bei Yuan. Why do we need DB Security? Make data arranged and secret Secure other’s DB

Full Database Encryption

• Limit readability of DB files in the OS

• Redundance

• Time-consuming in changing encryption key

Page 16: Database Security By Bei Yuan. Why do we need DB Security? Make data arranged and secret Secure other’s DB

Off-line Database Encryption

A note of caution:

Organizations considering this should thoroughly

test that data which is encrypted before storage off-

line can be decrypted and re-imported successfully

before embarking on large-scale encryption of

backup data.

Page 17: Database Security By Bei Yuan. Why do we need DB Security? Make data arranged and secret Secure other’s DB

Internet Security

• Server Security

— Static Web Pages

— Dynamic Page Generation

• Session Security

Page 18: Database Security By Bei Yuan. Why do we need DB Security? Make data arranged and secret Secure other’s DB

Session Security

• Secret-key Security (Using single key)

• Public-key Security (Using two keys)

— SSL protocol

Page 19: Database Security By Bei Yuan. Why do we need DB Security? Make data arranged and secret Secure other’s DB

Auditing

• Audit via the database or operating system

• The DBA must be able to log every relevant user action in order to recreate a series of actions.

• The series of user actions is called the audit trail.

Page 20: Database Security By Bei Yuan. Why do we need DB Security? Make data arranged and secret Secure other’s DB

Conclusion

Database security will always be the critical

component of every information system.

“Security costs. Pay for it, or pay for not having it.”