Security Problems
Security Problems
0)
Topic 1
Security Problems
Learning
Outcomes
Data”
2. Identify database security vulnerabilities, threats
and risks
3. Suggest database security best practices to
Vulnerability
Weakness in the system that makes the data vulnerable to
unauthorized access
manipulation, or destruction by authorized/unauthorized
Threat
Security attack that can happen any time because of a security
vulnerabilities
Risk
Damage that can happen if the threat attack happens
Human
Insufficient training, careless , ill intention
Applications
Bugs in the application software typically unpatched
and developed using outdated technology or without
good security features
Default values and/or Misconfigurations can leave
loopholes in the systems
DBMS Applications
Bugs in the DBMS software typically unpatched
Old versions being used
Default values and/or Misconfigurations can leave
loopholes in the systems
People
Individuals who have been granted privileges and permissions to
access applications, networks, servers, databases, data files and
data.
How to Secure
Establishment of security policies/procedures
Physical limits on access to HW and documents
Identification and authentication
Training on the importance of security and how to protect
information assets
Network
Is the most sensitive security access point.
Use best effort to protect the network.
How to Secure
Firewalls
VPN
Authentication
Operating system
The authentication to the system and the gateway to the
data.
How to Secure
User accounts/authentication/authorization
Intrusion detection
Password policy
Patched to the latest version
DBMS
Holds our data
Logical structure of the database, include memory, executables,
and other binaries.
How to Secure
Authentication & Authorization of People & Application
Database Encryption
Password Policy
Database Auditing
Backup Database
Replication / Redundancy
Data files
Physical files
How to Secure
File encryption, permission management and access monitoring
Data
Actual data as can been seen by the users
How to Secure
Validation, constraints, encryption, access
In Class
Preparation for Class
OS and Security Principles. Do some research on
operating system (OS) security
principles