5-Database Security
5-Database Security
1
09/06/1439
Lecture Contents
Database Security
Protection
2
09/06/1439
• Accidental losses:
3
09/06/1439
4
09/06/1439
DB Security Features
Features
Views or subschemas
Integrity controls
Authorization rules
Encryption
Authentication schemes
Views or subschemas
• Subset of the database that is presented to one or more users
• User can be given access privilege to view without allowing
access privilege to underlying tables
5
09/06/1439
Access Privilege
Reduce complexity
Complex query
6
09/06/1439
Reduce complexity
Simple query
Integrity Controls
• Protect data from unauthorized use
FK1 FK2
SID Code ass Mid Final
1 CS122 18 20 55
1 CS123 20 17 57
1 CS152 17 20 54
Referential Integrity 2
2
CS122
CS123
19
17
20
19
49
59
7 CS152 17 20 54
7
09/06/1439
Integrity Controls
• Domains (set allowable values)
Male Female
Entity Integrity
(PK is Not Null)
PK
PK
SID SName Gender Phone Email
1 Ahmed M 771287654 [email protected] Code Cname
2 Ali M [email protected] CS122 Into to database
3 Said M 771287423 CS123 Database design
4 Sarah F 776578435 [email protected] CS152 DBA
5 Nizar M 771282345 [email protected]
FK1 FK2
SID Code ass Mid Final
1 CS122 18 20 55
1 CS123 20 17 57
1 CS152 17 20 54
2 CS122 19 20 49
2 CS123 17 19 59
Integrity Controls
• Assertions – enforce database conditions
Default value
Null Null
Not Null
PK
PK
SID SName Gender Phone Email
1 Ahmed M 771287654 [email protected] Code Cname
2 Ali M [email protected] CS122 Into to database
3 Said M 771287423 CS123 Database design
4 Sarah F 776578435 [email protected] CS152 DBA
5 Nizar M 771282345 [email protected]
FK1 FK2
SID Code ass Mid Final
1 CS122 18 20 55
1 CS123 20 17 57
1 CS152 17 20 54
Delete
Referential Integrity 2 CS122 19 20 49 Cascade Constraint
2 CS123 17 19 59
7 CS152 17 20 54
8
09/06/1439
Authorization Rules
Encryption
9
09/06/1439
Authentication Schemes
• Goal – obtain a positive identification of the user
Strong Authentication
10
09/06/1439
Possible solutions
Possible solutions
• Personnel controls
11
09/06/1439
Possible solutions
Equipment check-out
locking procedures
12
09/06/1439
Authenticating Users
• Authentication means verifying the identity of someone or
something (a user, device, or other entity) that wants to use
data, resources, or applications.
13
09/06/1439
Authentication method
• The most common authentication method is a password.
Method
password
external
global
Unique username
• Usernames cannot exceed 30 bytes.
• Cannot contain special characters.
• Must start with a letter.
Abduallah AliSaidMohmm……..
Wa$$ee#@&
Abduallah Wadee2017
2017Wadee
14
09/06/1439
External Authentication
• Is authentication by a method outside the database (operating
system, Kerberos, or Radius).
• Users can connect to the Oracle database
without specifying a username or password.
OS_AUTHENT_PREFIX
Parameter file
Global Authentication
Kerberos Radius
Self Study
15
09/06/1439
Administrator Authentication
As SYSDBA
As SYSOPER
Remote database Local database As SYSTEM
administration administration
No No
Use a password
16
09/06/1439
Mind Map
Subjects Constraints Biometric
Smart card
Privacy Confidentiality
Loss Loss Objects Physical access
Assertions Domains Actions controls
q Improper a Decoding
devices Personnel
data access
Coding controls
Reduce Protect Access 1-key
Access 2-key
data DES
Privilege complexity Actions
Passwords
Availability Integrity solutions
Loss Restrict Authorization
Loss
matrix Algorithm Key
Theft Accidental
fraud losses
Views or Integrity Authorization Encryption Authentication
subschemas controls rules algorithm schemes
DB Security
17
09/06/1439
References
18