Security in Database Systems
Security in Database Systems
Introduction
This chapter highlights the importance of protecting the data against any risks, threats
and vulnerabilities,
Terminology
Security: protection of data from accidental or deliberate threats, which might cause
unauthorized modification disclosure or destruction of data and the protection of the Information
System from the degradation of non-availability of services.
Data integrity: Applies when data are the same as in source documents and have not been
accidentally
or intentionally altered, destroyed or disclosed.
System Integrity: Refers to the system operation conforming to the design specifications despite
attempts to make it behave incorrectly
Risks: Various dangers to information systems, the people, hardware, software, data and other
assets with which they are associated.
Threats: Refer to people, actions, events or other situations that could trigger losses, they are
potential causes of loss
Controls: Are counter measures to threats. They are tools that are used to counter risks from
the variety of people, actions, events or situations that can threaten an IS. Are used to identify
risk, prevent risk, reduce risks and recover from actual losses.
Common Threats
i. Natural disasters
E.g. five, floods, water damage, earthquakes, tornadoes, hurricanes, mud slides, wind
and storm damage
Security planning should consider
Disaster prevention
Disaster containment
Disaster recovery
e.g. Prevention: Use of backup power supplies or special building materials, locations,
drainage system or structural modifications to avoid damage during floods, storms fires and
earthquakes.
Containment: Consider sprinkler systems, halon gas fire
Suppression: System or watertight ceilings to contain water damage from fire hoses.
Recovery: developing contingency plans for use of computer facilities of vendors or non-
Competitors with similar computer systems
x. Computer viruses
A computer virus is a hidden program that inserts itself into your computer system and forces
the system to clone the virus (i.e. it replicates itself.)
They may cause serious damage by modifying data, erasing files or formatting disks.
e.g. cruise or stealth virus might lie dormant until it can capture financial information and
transmit the data to thieves
Antivirus programs or vaccination products can be used. Antivirus programs help in:
Preventing the virus program inserting itself in your system
Detecting a virus program so you can take emergency action
Controlling the damage virus can do once they have been detected.
Hardware theft and vandalism
Software privacy – any reproduction or a copyright program is theft.
A contingency plan must therefore provide for standby procedures so that operations can be
performed while normal services are disrupted, recovery procedures, personnel management
policies.
Database controls
Accees controls
Physical security
Administrative control
Legal protection
Administrative Controls
Building controls
Contingency plans
P C Controls
Password
Locking disks
Training
Virus scanning
Database Controls
Views
Encryption - coding of data by special algorithm that renders them unreadable without
decryption key
Development Controls
When a database system is developed, there should be controls over the design, development
and testing e.g.
Testing e.g. program testing, system testing and user department's acceptance testing
Document Standards
Requirement Specification
Program Specification
Operations Manual
User Manual
Legal Issues
Maintenance Agreements
Copyrights
Licenses
Other Controls
They include controls such as:Hardware Controls e.g. device interlocks which prevent input or
output of data from being interrupted or terminated, once begun