Notes Chapter 2.2 Lecture 2.2.2 (Database Security Threats)
Notes Chapter 2.2 Lecture 2.2.2 (Database Security Threats)
CHAPTER 2.2
Threats
Any situation or event, whether intentionally or incidentally, can cause damage, which can
reflect an adverse effect on the database structure and, consequently, the organization. A
threat may occur by a situation or event involving a person or the action or situations that are
probably to bring harm to an organization and its database.
The degree that an organization undergoes as a result of a threat's following which depends
upon some aspects, such as the existence of countermeasures and contingency plans. Let us
take an example where you have a hardware failure that occurs corrupting secondary storage;
all processing activity must cease until the problem is resolved.
Threats to Databases
Threats to databases can result in the loss or degradation of some or all of the following
commonly accepted security goals: integrity, availability, and confidentiality.
Integrity is lost if unauthorized changes are made to the data by either intentional or
accidental acts. If the loss of system or data integrity is not corrected, continued use of the
contaminated system or corrupted data could result in inaccuracy, fraud, or erroneous
decisions.
In a multiuser database system, the DBMS must provide techniques to enable certain users or
user groups to access selected portions of a database without gaining access to the rest of the
database. This is particularly important when a large integrated database is to be used by
many different users within the same organization.
For example, sensitive information such as employee salaries or performance reviews should
be kept confidential from most of the database system’s users. A DBMS typically includes a
database security and authorization subsystem that is responsible for ensuring the security
of portions of a database against unauthorized access. It is now customary to refer to two
types of database security mechanisms:
Other References