Database Security
Database Security
(KEAMANAN BASIS
DATA)
Mukhlis, S.Kom., MT.
Agenda Kuliah
Sesi Materi
Tujuan
Overview Kuliah
II
Konsep Keamanan
Basis Data
III
Pengelolaan
Keamanan Basis
Data
Tujuan Kuliah
Memahami
Mampu
Mampu
Mengetahui
Materi Kuliah
Konsep,
Analisis
data.
Analisis
Perancangan
Implementasi
Model-model
Mekanisme
Statistik
Studi Kasus
Kajian Pustaka
Konsep, Prinsip
dan Konteks
Keamanan BD
Analisis Kebutuhan
dan Perancangan
Keamanan BD
Implementasi
Keamanan BD
Bagian I:
Bagian II:
jaringan
OS
aplikasi
Bagaimana menjaga
data yang disimpan
dalam basis data
terjamin keamanannya
basis
data
Setting Situasi
Sistem
Basis
Ada
Referensi
Fugini,
Caelli,
DBMS
Reference Manual:
MySQL
5.0
Oracle Oracle 10g atau yang lebih baru
MS-SQL
Referensi
DATABASE SECURITY
(KEAMANAN BASIS
DATA)
Konsep Keamanan Basis Data
Sekumpulan
11
Integrity:
Availability:
Interception:
Modification:
Fabrication:
14
Penangkalan
Pengamatan
Pencegahan
Penyusupan
Deteksi
Pelaksanaan
Pemberantasan,
Pemulihan
Penghilangan Jejak
Log System
15
16
in nature.
Incorrect
Databases
17
Evolving DB Threat
Environment
Physically secure
Housed in central data centers not distributed
External access mediated through customer service reps,
purchasing managers, etc.
Security issues rarely reported
18
of least privilege
Password security
Firewalling / access control
Remove / disable unneeded default accounts
Disable unneeded components
Running database processes under dedicated
non-privileged account.
19
protocol)
Port
access security
Virtual
private databases
Role-based
security
Grant-execute
security
20
DATABASE SECURITY
(KEAMANAN BASIS
DATA)
Database Security
Management
Security Plan
Database Security Requirements Analysis
Database Security Design
Database Security Implementation
Database Security Audit
22
23
Identifying
The
Current
Security Status
Recommendation
Accountability
Timetable
Continuing Attention
25
Security
System
Security Policy
Data Security Policy
User Security Policy
Password Management Policy
Auditing Policy
A Security Checklist
26
Security Policy
Database
User Management
User Authentication
Operating System Security
Data
Security Policy
Includes the mechanisms that control the
access to and use of the database at the
object level.
27
Account Locking
Password Aging and Expiration
Password History
Password Complexity Verification
28
Monitor
Policy
Security Checklist
Provides guidance on configuring DBMS in a
secure manner for operational database
deployments.
29
Status
A
includes:
30
Database Security
Recommendation
Recommendations
and Responsibility
Resources and Their Vulnerabilities
Threats
Solutions
Security Measures
Guidelines to Personnel
31
Database Security
Accountability
A
It
32
Also
33
Periodically
The
34
Also
35
steps:
Identification
36
User
Programmer
Pihak luar
DBMS
Aplikasi
Database
Administrat
or
Basis
Data
2
Akses basis data
melalui DBMS
37
/ Pihak Luar
Mengakses
haknya.
Menggunakan
Melihat
Programmer
Membuat
Membuat
account sendiri
Menyimpan
Database
administrator
Menyalahgunakan
Threats
Security Needs
User
User menyalahgunakan
otoritas yang dimilikinya
Pemberian password
Pembatasan otoritas
Basis data
Access grant
39
Identification
Translate
40
Security Types
Tabel Rekening
PIC
Database
Administrator
(DBA)
41
User Authorization
Userid
Password
Discretionary Security
GRANT statements
REVOKE statements
Mandetory Security
Security level
42
Creating a User
CREATE USER cs IDENTIFIED BY sohib;
CREATE USER teller IDENTIFIED BY kobam;
CREATE USER finance IDENTIFIED BY doku;
43
Granting Privileges
Using Roles
level
The
45
Eksplorasi,
Kajian Pustaka
Analisis &
Perancangan
Sistem yang
Dipilih
DB Security
Management
yang Diacu
Analisis &
Perancangan DB
Security untuk
Sistem yang
Dipilih
DB Security pada
DBMS Tertentu
Implementasi
Implementasi DB
Security dengan
DBMS tertentu
untuk Sistem yang
Dipilih
Studi Kasus
Contoh
Penanganan
Kasus DB
Security dengan
DBMS untuk
Sistem yang
Dipilih
46
TERIMAKASIH
47