DBA Security
DBA Security
SECURITY
2
© Pearson Education Limited, 2004
OBJECTIVES
• Why database security is a serious concern
for an organization.
• The type of threats that can affect a database
system.
• How to protect a computer system using
computer-based controls.
3
© Pearson Education Limited, 2004
DATA ADMINISTRATION AND DATABASE
ADMINISTRATION
4
© Pearson Education Limited, 2004
DATA ADMINISTRATION
5
© Pearson Education Limited, 2004
DATA ADMINISTRATION TASKS
7
© Pearson Education Limited, 2004
DATABASE ADMINISTRATION TASKS
10
© Pearson Education Limited, 2004
DATABASE SECURITY
• Includes hardware, software, people, and
data.
• Growing importance of security is the
increasing amounts of crucial corporate data
being stored on computer.
11
© Pearson Education Limited, 2004
DATABASE SECURITY
• Outcomes to avoid:
– theft and fraud
– loss of confidentiality (secrecy)
– loss of privacy
– loss of integrity
– loss of availability
12
© Pearson Education Limited, 2004
DATABASE SECURITY
• Threat
– Any situation or event, whether intentional or
unintentional, that may adversely affect a system
and consequently the organization.
13
© Pearson Education Limited, 2004
EXAMPLES OF THREATS AND POSSIBLE OUTCOMES
14
© Pearson Education Limited, 2004
SUMMARY OF THREATS TO COMPUTER SYSTEMS
15
© Pearson Education Limited, 2004
TYPICAL MULTI-USER COMPUTER ENVIRONMENT
16
© Pearson Education Limited, 2004
COUNTERMEASURES – COMPUTER-
BASED CONTROLS
• Authorization
• Views
• Backup And Recovery
• Integrity
• Encryption
• Redundant array of independent disks
(RAID)
17
© Pearson Education Limited, 2004
COUNTERMEASURES – COMPUTER-BASED
CONTROLS
• Authorization
– The granting of a right or privilege that enables a
subject to have legitimate access to a database
system or a database system’s object.
• Authentication
– A mechanism that determines whether a user is,
who he or she claims to be.
18
© Pearson Education Limited, 2004
COUNTERMEASURES – COMPUTER-BASED
CONTROLS
• View
– A view is a virtual table that does not necessarily
exist in the database but can be produced upon
request by a particular user, at the time of
request.
19
© Pearson Education Limited, 2004
COUNTERMEASURES – COMPUTER-BASED
CONTROLS
• Backup
– Process of periodically taking a copy of the
database and log file (and possibly programs) onto
offline storage media.
• Journaling
– Process of keeping and maintaining a log file (or
journal) of all changes made to database to enable
recovery to be undertaken effectively in the event
of failure.
20
© Pearson Education Limited, 2004
COUNTERMEASURES – COMPUTER-
BASED CONTROLS
• Integrity
– Prevents data from becoming invalid, and hence
giving misleading or incorrect results.
• Encryption
– Encoding the data by a special algorithm that
renders the data unreadable by any program
without the decryption key.
21
© Pearson Education Limited, 2004
REDUNDANT ARRAY OF INDEPENDENT DISKS
(RAID)
• Hardware that the DBMS runs on must be
fault-tolerant, meaning that the DBMS should
continue to operate even if one of the
hardware components fails.
• Suggests having redundant components that
can be seamlessly integrated into the working
system whenever there are failures.
22
© Pearson Education Limited, 2004
REDUNDANT ARRAY OF INDEPENDENT DISKS
(RAID)
• The main hardware components that should be fault-
tolerant include disk drives, disk controllers, CPU,
power supplies, and cooling fans.
• Disk drives are the most vulnerable components with
the shortest times between failure of any of the
hardware components.
• One solution is to provide a large disk array
comprising an arrangement of several independent
disks that are organized to improve reliability and at
the same time increase performance.
23
© Pearson Education Limited, 2004
LINKS
• http://en.wikipedia.org/wiki/Database_security
• http://www.dbta.com/Categories/Database-
Security_332.aspx
• http://www.craigsmullins.com/dbta_035.htm &
http://www.craigsmullins.com/dbta_056.htm
• http://iase.disa.mil/stigs/checklist/index.html
Lähde: http://xkcd.com/327/