project of computer science
project of computer science
Derradji Yasmine
Presented by :
MEZAOUROU BRAHIM.
SEBBAH YOUSRA.
BEN ABDESSELAM WIDAD.
BOULARAS SOUAD.
CHIKHI DHIAA EDDINE.
BENBARA ROSTOM.
ABDELMOUMEN MAHER.
SABEG RAID.
1
Problem to Study :
Research Questions:
2
● Security Measures in Databases and Information Systems:
Data Encryption: Encryption protects data both at rest and in transit. Advanced
Encryption Standard (AES) is widely used for securing stored data, while Transport
Layer Security (TLS) safeguards data during transmission. Effective key management,
using tools like Hardware Security Modules (HSMs), ensures that encryption keys
remain secure.
Firewalls and IDS/IPS: Firewalls act as the first line of defense by filtering
unauthorized traffic. Intrusion Detection Systems (IDS) and Intrusion Prevention
Systems (IPS) monitor network activity for suspicious patterns, providing real-time
threat detection and response.
Zero Trust Architecture: Zero Trust operates on the principle of “never trust,
always verify.” It enforces continuous authentication at every access point,
minimizing risks from implicit trust within the network.
3
● Security in Database Management Systems (SGBDs):
Auditing in SGBDs: Audit trails track user activities to ensure accountability and
compliance with regulations like GDPR and HIPAA. These logs are essential for
forensic analysis during security incidents.
4
Comparison of Different Approaches and Technologies;
Access Control: RBAC and ABAC provide structured access management. RBACis
role-centric, while ABAC dynamically adjusts permissions based on contextual
attributes, offering flexibility for modern systems.
Encryption: AES ensures robust encryption for data at rest, while TLS protects datain
transit. Comparisons between symmetric and asymmetric encryption highlight trade-
offs between speed and security.
Auditing and Monitoring: IDS/IPS tools like Snort and Suricata provide real-time
threat detection. Continuous monitoring identifies anomalies and strengthens
Vulnerability Management: Regular updates to DBMSs are essential to address
security flaws. For example, the 2017 MongoDB breach was attributed to
misconfigured and unsecured databases, emphasizing the importance of
configuration management.
overallsecurity posture.
5
● Case Studies:
● Synthesis of Findings:
● Recommendations:
1. Ensure timely updates and patches for all software and DBMSs.
2. Adopt advanced security practices like Zero Trust and MFA.
3. Train users and administrators continuously on emerging threats.
4. Employ automated intrusion detection systems for proactive defense.
6
Conclusion:
The study of cases like Target, Equifax, and Yahoo underscores the consequences of
inadequate security measures and the importance of proactive risk management.
7
References:
• Firewalls: Chapple, M., & Ballad, B. (2021). CISSP Official (ISC)² Practice Tests.
Wiley.