0% found this document useful (0 votes)
7 views32 pages

Security Problems

The document provides an overview of database security, defining key concepts such as database security and sensitive data, and outlining vulnerabilities, threats, and risks associated with databases. It emphasizes the importance of implementing best practices to protect against unauthorized access and data loss, including user authentication, encryption, and regular auditing. Additionally, it highlights the need for a comprehensive approach to securing the entire database environment, including physical security and network access controls.

Uploaded by

Lau Shireen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as KEY, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views32 pages

Security Problems

The document provides an overview of database security, defining key concepts such as database security and sensitive data, and outlining vulnerabilities, threats, and risks associated with databases. It emphasizes the importance of implementing best practices to protect against unauthorized access and data loss, including user authentication, encryption, and regular auditing. Additionally, it highlights the need for a comprehensive approach to securing the entire database environment, including physical security and network access controls.

Uploaded by

Lau Shireen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as KEY, PDF, TXT or read online on Scribd
You are on page 1/ 32

Database SecurityCT069-3-3-DBS (VE1.

0)

Topic 1
Security Problems
Learning
Outcomes

At the end of this topic, you should be able to:


1. Define what is “Database Security” and “Sensitive

Data”
2. Identify database security vulnerabilities, threats

and risks
3. Suggest database security best practices to

address and mitigate the threats

Module Code & Module Title Slide Title


Contents & Structure

Database Security Overview


Database Security Vulnerabilities, Threats &
Risks
Database Security Best Practices

Module Code & Module Title Slide Title


Definition: Database Security

Database security is the set of measures,


policies, and practices employed to protect a
database from unauthorized access,
manipulation, or destruction.
Database security policies are designed to
prevent sensitive data exposure and ensure
the availability and integrity of records
stored within a database system.

Module Code & Module Title Slide Title


Definition: Sensitive Data

Sensitive data is any kind of information


that is protected against unwarranted
disclosure.

It involves a wide range of categories,


including personal data, financial
information, proprietary details, health
records, or trade secrets.

Module Code & Module Title Slide Title


Discussion

List down 10 data (facts) that you provided to


APU during registration
Among the 10 data, which ones do you
consider sensitive ?
List down other 5 data that are being stored
in/by APU ?
Among them, which ones do you consider
sensitive ?

Module Code & Module Title Slide Title


Security
News

Module Code & Module Title Slide Title


Information Systems (IS)

Information system - comprised


of components working together
to produce and generate
accurate information
Central to any Information
System is the database that
contains all the required data and
information that the
organization acquires, processes,
generates, stores and uses to run
its business

Module Code & Module Title Slide Title


Data vs Database vs DBMS
Data
is one of an organization’s most valuable assets
critical for all individuals and organizations
(government, SME and corporations) to function
properly DBMS Advantages-
Better control on access and
Database
security such as encryption
An organized collection of structured data to make Better activity tracing and
it easily accessible, manageable and updatable auditing capabilities
DBMS Efficient backup and
Typically, a Database Management System or DBMS recovery management
such as MS-SQL , MySQL or Oracle is used to manage Reduced data redundancy
the databases and increased consistency.
Integrated system that can be used to store, manage
and secure structured data as well as develop
applications to create data structures and manipulate
data

Module Code & Module Title Slide Title


Discussion

Differentiate between data and Information ?

Differentiate between structured and


unstructured data ?

Module Code & Module Title Slide Title


Database Security Problems

Since data is very valuable, it is subject to misuse, damage, loss or being


stolen – by whom ?

Problems can come in many ways


Unauthorized access to steal valuable data – How can this
happen ?
Damage caused by unauthorized persons – How can this
happen ?
Damage caused by authorized persons or application – How
can this happen ?
Other damages caused by power interruptions, hardware, OS or
software failure etc

Module Code & Module Title Slide Title


Definitions

Vulnerability
Weakness in the system that makes the data vulnerable to
unauthorized access
manipulation, or destruction by authorized/unauthorized

Threat
Security attack that can happen any time because of a security
vulnerabilities

Risk
Damage that can happen if the threat attack happens

Module Code & Module Title Slide Title


DB Security Vulnerability Access Points

Module Code & Module Title Slide Title


DB Security Vulnerabilities

Human
Insufficient training, careless , ill intention

Applications
Bugs in the application software typically unpatched
and developed using outdated technology or without
good security features
Default values and/or Misconfigurations can leave
loopholes in the systems

Module Code & Module Title Slide Title


DB Security Vulnerabilities

Network & Hardware


Weaknesses within an organization’s access
infrastructure that allow cyber attackers to gain
access and cause harm.
Old or low-quality hardware

Operating system (OS)


Caused by exposures within an OS typically
unpatched and outdated OS

Module Code & Module Title Slide Title


Database Security Vulnerabilities

DBMS Applications
Bugs in the DBMS software typically unpatched
Old versions being used
Default values and/or Misconfigurations can leave
loopholes in the systems

Data files and data


Data not properly classified and protected

Module Code & Module Title Slide Title


DB Security Threats & Risks

Module Code & Module Title Slide Title


DB Security Threats & Risks

Module Code & Module Title Slide Title


Discussion

Identify the threats that can be avoided ? What


will you do address the threats ?

Identify the threats that cannot be avoided ?


What will you do to mitigate the risks ?

Module Code & Module Title Slide Title


Securing database environment

Database Server – physical or virtual machine


hosting your database

Securing the host also refer to as “hardening”


– a process to stringent human physical
access, network access, including securing
the server’s OS.

Module Code & Module Title Slide Title


Securing database environment

Databases are nearly always network-accessible,


any security threat to any component within or
portion of the network infrastructure is also a
threat to the database, and any attack impacting a
user’s device or workstation can threaten the
database

Database security must extend far beyond the


confines of the database alone.

Module Code & Module Title Slide Title


Securing database environment

When evaluating database security in your environment to


decide on your team’s top priorities, consider each of the
following areas:
Physical security
Administrative and network access controls
End user account/device security
Encryption
Database software security
Application/web server security
Backup security
Auditing

Module Code & Module Title Slide Title


Security Methods

People
Individuals who have been granted privileges and permissions to
access applications, networks, servers, databases, data files and
data.

How to Secure
Establishment of security policies/procedures
Physical limits on access to HW and documents
Identification and authentication
Training on the importance of security and how to protect
information assets

Module Code & Module Title Slide Title


Security Methods
Applications
Application design and implementation, which includes
privileges and permissions granted to people.
Be cautious because too loose permission results in
violation of data access, and too strict permission
compromises availability.
How to Secure
Authentication and authorization of users who access applications
Good design - hide database implementation details, perform code
reviews, implements good error handling and not user facing
Business rules to limit access
Prevent SQL Injection
Patched to the latest version

Module Code & Module Title Slide Title


Security Methods

Network
Is the most sensitive security access point.
Use best effort to protect the network.

How to Secure
Firewalls
VPN
Authentication

Module Code & Module Title Slide Title


Security Methods

Operating system
The authentication to the system and the gateway to the
data.

How to Secure
User accounts/authentication/authorization
Intrusion detection
Password policy
Patched to the latest version

Module Code & Module Title Slide Title


Security Methods

DBMS
Holds our data
Logical structure of the database, include memory, executables,
and other binaries.

How to Secure
Authentication & Authorization of People & Application
Database Encryption
Password Policy
Database Auditing
Backup Database
Replication / Redundancy

Module Code & Module Title Slide Title


Security Methods

Data files
Physical files

How to Secure
File encryption, permission management and access monitoring

Data
Actual data as can been seen by the users

How to Secure
Validation, constraints, encryption, access

Module Code & Module Title Slide Title


Database Security Best Practices
Permission Management / Access Control
Authentication
Authorization/Privileges
Role based access control (RBAC)
Data protection
Obfuscation - Anonymization, Masking, Hashing, Encryption
Backup
High Availability
User action validation to protect against accidental or intentional
data loss
Auditing – passive
Try to identify what could happen (potential risk) - future
Captured what happened – past
Monitoring - active
Keeping track of is happening (monitoring) – present

Module Code & Module Title Slide Title


Discussion

What is Database Security?


Where or what can be the security weaknesses in
the system ?
Identify common security threats specifically for
database and its hosting environment.
List the database security scope of evaluation

Module Code & Module Title Slide Title


Summary / Recap of Main Points

Definition of Database Security


Type of threats in context of database security
Database security scope of evaluation

Module Code & Module Title Slide Title


What To Expect Next Week

In Class
Preparation for Class
OS and Security Principles. Do some research on
operating system (OS) security
principles

Module Code & Module Title Slide Title

You might also like