Itdsa2 1.1 Block 2
Itdsa2 1.1 Block 2
ITDSA2-12 (2024)
1.1. Notes [ ± 60 min ]
1. Learning outcomes
Next
Database security is the mechanisms that protect the database against intentional or accidental threats.
Database security is concerned with avoiding the following situations: theft and fraud, loss of
confidentiality (secrecy), loss of privacy, loss of integrity, and loss of availability.
A threat is any situation or event, whether intentional or accidental, that will adversely affect a system
and consequently an organization.
Computer-based security controls for the multi-user environment include authorization, access controls,
views, backup and recovery, integrity, encryption, and RAID technology.
Authorization is the granting of a right or privilege that enables a subject to have legitimate access to a
system or a system’s object. Authentication is a mechanism that determines whether a user is who he or
she claims to be.
Backup is the process of periodically taking a copy of the database and log file (and possibly programs)
on to offline storage media. Journaling is the process of keeping and maintaining a log file (or journal) of
all changes made to the database to enable recovery to be undertaken effectively in the event of a failure.
Integrity constraints also contribute to maintaining a secure database system by preventing data from
becoming invalid, and hence giving misleading or incorrect results.
Encryption is the encoding of the data by a special algorithm that renders the data unreadable by any
program without the decryption key.
Cloud computing is the use of computing software or hardware resources that are delivered over a
network and accessed typically from a Web browser or mobile application.
Impact of Data Quality on Company Assets and Competitive Position:
Data quality refers to the accuracy, completeness, consistency, relevance, and timeliness of data.
Poor data quality can negatively impact a company's assets and competitive position in several ways,
such as:
Inaccurate data can lead to wrong decisions and actions, which can result in financial losses and
damage to reputation.
Incomplete data can cause missed opportunities and hinder innovation and growth.
Inconsistent data can lead to confusion and conflicts among different stakeholders.
Irrelevant data can waste resources and distract from essential insights.
Untimely data can cause delays and missed deadlines, resulting in lost opportunities and customer
dissatisfaction.
On the other hand, high-quality data can provide a competitive advantage by enabling better decision-
making, innovation, customer satisfaction, and cost-effectiveness.
Stolen Laptops
Forgetful or careless laptop owners whose equipment is taken expose data on that laptop to persons not
authorized to have access to the data. This can also happen if a laptop is replaced and the hard drive on
the original machine is not properly erased or destroyed.
Weak Authentication
A legitimate database user typically is required to submit an ID and password in order to gain access to a
protected database. Authentication is the process (internal to the database program itself) by which the
credentials of the user are verified and access may be granted. If the process of authentication is weak,
an attacker can assume the identity of a legitimate user by stealing or obtaining login credentials.
Credentials may be illegitimately obtained by various means:
Credential theft. The attacker accesses password files or finds a paper on which the legitimate user
has written down the ID and password.
Social engineering. The attacker deceives someone into providing the login ID and password by posing
as a supervisor, IT maintenance personnel, or other authority.
Brute-force attacks.
In the business environment, it is critical that a thorough risk assessment takes place and be periodically
reviewed. The assessment should address:
who has access to what data
the circumstances under which access to the database may need to change
who maintains the passwords needed to access the database
who uses the company's computers for access to the internet, e-mail programs, etc., and how
employees access those resources
what type of firewalls and anti-malware solutions to put in place
the training of the staff
who has responsibility for enforcement procedures related to data security
3. Access Control
Access control refers to the mechanisms and policies put in
place to regulate who can access what data within a database
system and what actions they can perform on that data. Access
control ensures that only authorized users or processes are
granted access to the database, thereby protecting sensitive
information from unauthorized access, modification, or
disclosure. A typical way to control access to a database
system is based on granting and revoking privileges. A privilege
allows a user to create, to drop, or to access in read or
write mode some database objects like relational tables,
relational views, index, etc or to perform certain operations.
The privileges are granted to a user to accomplish their
task. The excessive privileges can compromise security. A user
who creates a database object becomes an owner of the
object and he/she automatically gets all privileges on the
object. The DBMS keeps track of all granted privileges to
ensure that only selected user can access and can perform
operations on the database objects.
3.3. Authorization
3.4. Encryption
Disabling Roles
Roles can be disabled in a database session either en masse or
by exception. Use the SET ROLE NONE statement to disable all
roles. Use the SET ROLE ALL EXCEPT role_list statement
to enable all roles except those in the comma-delimited
role_list.
There is no way to selectively disable a single role. Also, you
cannot disable roles that you inherit by way of another role
without disabling the parent role.
Revoking A Role
A ROLE can be removed from a user (a database object) by
using the REVOKE keyword and following the format below:
REVOKE {<role_Name>}
ON <object or table_name>
FROM {<user 1>[, <user 2>, <user n>] }