Database Security
Database Security
DATABASE SECURITY
Database Security
2
Integrity constraints are rules that define the correct states of a database.
Integrity entails data protection from malicious or accidental modification,
including the insertion of false data, contamination and the destruction of
data.
Deadline:
10 Access Control
This is the selective restriction of access to a resource in the
database. It is a system of controlling data that is accessible to a
given user.
Read more:
Understanding data
processing textbook.
Database auditing
13
Database auditing involves observing a database so as to be aware of the actions of
database users. Database administrators and consultants often set up auditing for
security purposes, for example, to ensure that those without the permission to access
information do not access it.
Authentication
14 Database authentication is the process or act of confirming that
a user who is attempting to log in to a database is authorized to
do so, and is only accorded the rights to perform activities that
he or she has been authorized to do.
It may be performed by
a. the database itself,
b. the operating system,
c. a network service
d. the secured socket layer (SSL)
Database encryption
15
Database encryption is a process that uses an algorithm to
transform data stored in a database into a form that is
incomprehensible without first being decrypted.
A "meaningless" encrypted data is of little or no use for
hackers.
There are multiple techniques and technologies available for
database encryption.
Tutorial question
16
How will the authorised user be able to read the encrypted data?
17 Backups
Tutorial Question:
• Outline situations where data backup will prove
useful.
Database Administrator
18
He manages the database
1. He develops a security policy for the database
2. He creates new users
3. He assigns roles to each user of the database.
4. He handles database auditing.
5. He regularly carries out database backups.