0% found this document useful (0 votes)
15 views

Unit 8 Security

The document discusses security in data mining and warehousing, emphasizing the importance of defining security requirements early to avoid performance issues. It covers user and data classification, audit requirements, network considerations, and the CIA and DAD security triads. Additionally, it outlines hardware threats and solutions, methods to minimize security threats, and the role of cryptography in protecting data.

Uploaded by

MURA- NDASI
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views

Unit 8 Security

The document discusses security in data mining and warehousing, emphasizing the importance of defining security requirements early to avoid performance issues. It covers user and data classification, audit requirements, network considerations, and the CIA and DAD security triads. Additionally, it outlines hardware threats and solutions, methods to minimize security threats, and the role of cryptography in protecting data.

Uploaded by

MURA- NDASI
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 26

Data mining and Warehousing

Module Code: CSC5901

NDAYAMBAJE Simeon

6/25/2021 Course Code & Name 1


Unit 8
SECURITY

6/25/2021 2
What is Security?

Security is the protection of assets


from unauthorized access, use,
alteration, or destruction.
Security Requirements
Note: it is important to determine the
security requirements as early as possible.
– It is difficult to add security features after the
data warehouse has gone live.
– Adding security features affect the
performance of the data warehouse,
therefore
– new data sources will require new security
and/or audit restrictions to be implemented?
Security Requirements
The following activities get affected by
security measures −
–User access
–Data load
–Data movement
–Query generation
User and Data Classification
Data Classification
• according to its sensitivity:
– Highly-sensitive data is classified as highly
restricted and
– less-sensitive data is classified as less restrictive.
• according to the job function.
– Allows only specific users to view and deal with
particular data (Only for interested and are
responsible for)
User and Data Classification
User classification
• Classification by hierarchy
– i.e., users can be classified by departments,
sections, groups, and so on.
• Classification by role,
– with people grouped across departments based
on their role.
Audit Requirements
Audit requirements can be categorized as follows
– Connections
– Disconnections
– Data access
– Data change
it is necessary to audit success, failure, or both.
– To ensure security success or provide
recommendations
Network Requirements
We need to consider the following issues −

• Encryption: Is it necessary to encrypt data


before transferring it to the data
warehouse?
• Routes Restriction: Are there restrictions
on which network routes the data can
take?
Documentation
The audit and security requirements need to be
properly documented. This will be treated as a part
of justification. This documentation can contain
the following information:
– Data classification
– User classification
– Network requirements
– Data movement and storage requirements
– All auditable actions
Computer Security Basics

1. CIA Triad - Goals


for implementing
security practices.

2. DAD Triad -
Goals for
defeating the
security of an
organization.
CIA Triad
1. Confidentiality – Confidential information
should not be accessible to unauthorized
users.
2. Integrity – Data may only be modified
through an authorized mechanism.
3. Availability – Authorized users should be
able to access data for legitimate purposes
as necessary.
DAD Triad
1. Disclosure – Unauthorized individuals gain
access to confidential information.
2. Alteration – Data is modified through
some unauthorized mechanism.
3. Denial – Authorized users cannot gain
access to a system for legitimate
purposes.
6 dimensions of System security
• 1.Integrity: prevention against unauthorized data
modification
• 2.Nonrepudiation: prevention against any one party from
reneging on an agreement after the fact
• 3.Authenticity: authentication of data source
• 4.Confidentiality: protection against unauthorized data
disclosure
• 5.Privacy: provision of data control and disclosure
• 6.Availability: prevention against data delays or removal
Threats
What is Threats?: is anyone (foreign or
domestic, internal or external, Terrorists, insiders,
employees, hackers state-sponsored or a single
element) with the capability, technology,
opportunity, and intent to do harm or
interrupt the system functionality.
Hardware threat

Hardware threats involve four types of threats: -


• Physical
• Electrical
• Environmental
• Maintenance
Hardware threat
1. Physical Problems:
• Improper installation, selecting wrong components, incomplete
devices, lack of knowledge, unsecure or less secure network
components

Measurement should be taken (Solutions)


• Always purchase branded and genuine components.
• Hire experienced and knowledgeable technical staff.
• Always remove console cable after use.
• Always log off from administrative interfaces before leaving a
station.
• Critical resources should be kept in secured room or location
Hardware threat
2. Electrical
Irregular power supply (such as fluctuations, high voltage, low voltage
or surge voltage) can cause serious damage to the network
components.
Precautions(Solution) to be taken to minimize the electrical threats:-
• Use UPS (Uninterruptible Power Supply) for critical network
resources.
• Use RPS (Redundant power supplies) for critical devices.
• Use backup generator systems with auto inverter technology that
switches on backup power supply automatically if main supply
went down.
• Use monitor and alarm system at device levels.
Hardware threat
3. Environmental
• Extreme weather conditions (such as moisture, very high or low
temperature and humidity) can also damage network devices.

• Action(Solution) should be taken:-


• Wherever possible keep away EMI (Electro Magnetic Interface)
devices from critical networking devices such as routers,
switches, PCs and Servers.
• Set environmental parameters. Always maintain room temperature
and humidity level between these parameters.
• Keep the critical networking devices away from direct sun light
and heavy winds.
Hardware threat

4. Maintenance
• this threats includes lack of spare parts, poor cabling, incorrect or
no labeling on components.

following guideline(Solutions) should be taken:-


• Clearly label all components.
• Secure cabling equipment in racks.
• Always maintain a sufficient stock of critical spare parts for
emergency use.
HOW TO MINIMIZE SECURITY THREATS

1. Perform a risk assessment:


2. Develop a security policy: written statement on:
• What assets to protect from whom?
• Why these assets are being protected?
• Who is responsible for what protection?
• Which behaviors are acceptable and unacceptable?

3. Develop an implementation plan:


4. Create a security organization: unit to administer the security
policy
5. Perform a security audit:
Cryptography
• What is “Cryptography”? is a Greek word that
means “hidden writing”
• Used to hide message from someone, and
sometimes prevent them from creating a new
message
Encryption vs Decryption
 Encryption means translate Plain text Into cipher
text
 Decryption means translate cipher text Into Plain
text
Types of network security attacks
• Passive attack: In this attack an adversary deploys a
sniffer tool and waits for sensitive information to be
captured. This information can be used without the
knowledge of the user.
Types of network security attacks
• Active Attack: It results in disclosing sensitive
information, modification of data or complete data
lost.
Thank you

You might also like