Database Security Assignment
Database Security Assignment
THREATS OF DATABASE
Accidental loss
Theft & fraud
Loss of privacy or confidentiality
Loss of data integrity
Loss of availability
1. Accidental loss
By,
User authorization
Uniform software installation procedure
Hardware maintenance schedule
Example,
3. Loss of privacy
Privacy means:
Confidently means:
If data is not secured then this can be hampered someone may. Alter the data due
to which it becomes invalid. So recovery and backup procedures should be used.
5. Loss of availability
Destructive hardware , networks, applications may cause the data to
become unavailable.
Server Security
Network security
Web security
Web privacy
1. Server security
2. Network security
3. Web security
4. Web privacy
Subset of database that is presented to one or more users view is a virtual table.
INTEGRITY CONTROLS
Once a domain is defined any field can be assigned that domain as its data.
Authorization rules
Authorization rules are controlled incorporated in the data management
system. That restrict access to data and also restrict the actions that people
may take when they access data. For example, a person who can supply a
particular password may be authorized to read any record in a database but
cannot necessarily modify any of those records.
Customer Order
record record
Read Y Y
Insert Y Y
Modify Y N
Delete N N
ENCRYPTION
AUTHENTICATION SCHEMES
In an electronic environment, a user can provide his or her identity
by supplying one or more of the fallowing factors.
Personal controls
Physical controls
Maintenance controls
Data privacy controls
USER-DEFINES PROCEDURES
Some DBMS products provide user exists (or interface ) that allow
system designers or users to create their own user-defined procedures for
security, in addition to the authorization rules we have just described. For
example, a user procedure might be designed to provide positive user
identification. In attempting to log on to the computer, the user might be
required to supply a procedure name are supplied, the systems then calls the
procedure, which ask the user a series of questions whose answers should be
known only to that password holder.