0% found this document useful (0 votes)
24 views8 pages

computer information and security basics part 3

The document discusses Database Security, emphasizing its definition, importance, and goals of ensuring confidentiality, integrity, and availability of data. It outlines various threats such as SQL injection and unauthorized access, as well as mechanisms like authentication and encryption to protect databases. Best practices include using strong passwords, limiting user access, conducting regular audits, and implementing firewalls.

Uploaded by

hamza zahid
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views8 pages

computer information and security basics part 3

The document discusses Database Security, emphasizing its definition, importance, and goals of ensuring confidentiality, integrity, and availability of data. It outlines various threats such as SQL injection and unauthorized access, as well as mechanisms like authentication and encryption to protect databases. Best practices include using strong passwords, limiting user access, conducting regular audits, and implementing firewalls.

Uploaded by

hamza zahid
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Computer Information & Security

Lecture 29 to 35
By:
Dr. Asif Aziz Memon
Dawood University of Engineering
and Technology Karachi, Pakistan.
Outline
• Database Security
• Introduction
• Importance
• Goal
• Key Concepts in Database Security
• Threats to Database Security
• Database Security Mechanisms
• Best Practices in Database Security
Database Security
Definition: Database Security refers to the protection of
databases from unauthorized access, misuse, and corruption.

Importance: Databases store critical information like personal


data, financial records, and business operations data.

Goal: Ensure confidentiality, integrity, and availability of data.


Key Concepts in Database Security
• Confidentiality – Ensuring only authorized users can
access sensitive data.

• Integrity – Ensuring data is accurate and reliable.

• Availability – Ensuring that authorized users can


access the data when needed.
Threats to Database Security
• SQL Injection – Attacks where malicious SQL code is inserted
into queries.

• Unauthorized Access – Accessing data without proper


permission.

• Data Corruption – Malicious or accidental alteration of data.

• Insider Threats– Employees or users with access exploiting


their privileges.
Database Security Mechanisms
• Authentication – Verifying the identity of users.

• Authorization – Determining what actions authenticated


users can perform.

• Encryption – Securing data through encryption algorithms.

• Backup and Recovery– Ensuring data can be recovered after


corruption or loss.
Best Practices in Database Security
• Use Strong Passwords – Enforce strong authentication
policies.

• Limit User Access – Apply the principle of least privilege.

• Regular Audits – Conduct security audits and monitor


database activities.

• Use Firewalls– Set up firewalls to prevent unauthorized


database access.
Thank you

You might also like