Week 5
Week 5
Topics to be covered:
Week Broader Topic Topics Tools to
be
covered
1. Introduction to database Security
2. Threats in Database Security
3. Counter measures in Databases security
3 Database
Security
1
DBMS Week5
3. Availability: Ensuring that the database and its data are consistently available to
authorized users.
1. Access Control:
- Implement strong authentication mechanisms, such as username-password
combinations, multi-factor authentication, or biometrics, to ensure only legitimate users
gain access.
- Utilize role-based access control (RBAC) to assign permissions based on job roles, limiting
access to the least necessary privileges (principle of least privilege).
- Use data access monitoring and session management to track user activity and terminate
inactive sessions.
2. Encryption:
2
DBMS Week5
- Encrypt data at rest and in transit to protect against unauthorized access. Encryption
algorithms such as AES (Advanced Encryption Standard) are commonly used.
- Use secure key management practices to safeguard encryption keys.
9. Physical Security:
- Secure physical access to the server hosting the database to prevent unauthorized
physical access.
Regulatory Compliance:
Database security is also crucial for meeting various regulatory compliance requirements
such as GDPR, HIPAA, PCI DSS, and SOX, which mandate the protection of sensitive data and
user privacy.
3
DBMS Week5
1. Unauthorized Access:
One of the most significant threats to database security is unauthorized access. It occurs
when individuals or entities gain access to the database without proper authorization.
Unauthorized users may exploit weak authentication mechanisms, steal credentials, or find
vulnerabilities in the system to gain entry. This threat can lead to data theft, modification, or
destruction.
3. Insider Threats:
4
DBMS Week5
Insider threats originate from individuals within the organization who have legitimate access
to the database. They may include employees, contractors, or business partners. Insider
threats can be intentional or unintentional. Malicious insiders may misuse their privileges to
steal data or cause damage, while unintentional actions, like accidental data exposure, can
also lead to security breaches.
4. Data Leakage:
Data leakage occurs when sensitive or confidential data is unintentionally exposed to
unauthorized individuals or entities. This threat may result from misconfigurations, weak
access controls, or vulnerabilities in the database system.
Threats to database security are diverse and constantly evolving, requiring organizations to
implement comprehensive security measures to protect their databases effectively.
Implementing strong access controls, encryption, regular monitoring, and user awareness
5
DBMS Week5
training are crucial for mitigating these threats and ensuring the confidentiality, integrity,
and availability of valuable data stored in databases. Regular security assessments and
updates are essential to staying ahead of potential threats and maintaining robust database
security.
1. Access Control:
- Implement strong authentication mechanisms, including username-password
combinations, multi-factor authentication, or biometrics, to ensure only authorized users
can access the database.
- Utilize Role-Based Access Control (RBAC) to assign specific privileges based on job roles,
limiting access to the least necessary level (principle of least privilege).
- Regularly review and update user access rights to ensure permissions align with job
responsibilities.
- Enforce proper password policies, such as mandatory password changes, minimum
complexity, and maximum password age.
2. Encryption:
- Encrypt sensitive data both at rest and in transit using strong encryption algorithms, such
as AES (Advanced Encryption Standard).
- Securely manage encryption keys and certificates to prevent unauthorized access to
encrypted data.
- Use secure protocols like SSL/TLS to protect data during transmission between clients and
servers.
6
DBMS Week5
- Monitor database activity in real-time using Intrusion Detection Systems (IDS) or Database
Activity Monitoring (DAM) solutions to identify potential security breaches or abnormal
behavior.
- Establish alerting mechanisms to notify administrators of suspicious activities or potential
security incidents.
8. Physical Security:
- Secure physical access to the server hosting the database to prevent unauthorized physical
access and tampering.
- Limit access to server rooms and data centers to authorized personnel only.