Database Security Threats and Countermeasures Computer Science Essay - Lecturer - 1
Database Security Threats and Countermeasures Computer Science Essay - Lecturer - 1
The security of data is crucial not only in business but also in even
home computers as personal files, details of bank accounts are
difficult to replace and potentially unsafe if they will be in wrong
hands. Data destroyed by hazards like floods or fire is just lost but
handing it in unethical person will have severe consequences.Other
threats will be included human errors and espionage. Therefore, the
data security starts with strategies of identifying the area of
exposure which will be affected. It is important to define who can
access what data, who is allowed and who is restricted, whether
passwords are used and how to maintain it, what sort of firewalls
and anti-malware solutions to use, how to train the staff and to
enforce data security. Furthermore, the backup continuity plan
should be laid out so that even though the systems fail, the business
can be carried out without delay.
The insecurity of the database can affect not only the database
itself, but also the other running systems which have the
relationship with that database.The process of an intruder can be
first to get access to the poorlysafe database, then use strongbuilt-
in database characters to get admission to the local operating
system. In this way, other trusted systems connecting with that
database will be easily attacked by the intruder.
3.1 Integrity:
Database integrity refers that information be protected from
improper modification. Modification includes creation, insertion,
modification, changing the status of data, and deletion. Integrity is
lost if unauthorized changes are made intentionally or through
accidental acts. For example, Students cannot be allowed to modify
their grades.
3.2 Availability:
Authorized user or program should not be denied access. For
example, an instructor who wishes to change a student grade
should be allowed to do so.
3.3 Secrecy:
Data should not be disclosed to unauthorized users. For example, a
student should not be allowed to see and change other student
grades.
4.3 Encryption:
An encryption algorithm should be applied to the data, using a user-
specified encryption key. The output of the algorithm is the
encrypted version. There is also a decryption algorithm, which takes
the encrypted data and a decryption key as input and then returns
the original data.
4.4 RAID:
Redundant Array of Independent Disks which protect against data
loss due to disk failure.
4.5 Authentication:
Access to the database is a matter of authentication. It provides the
guidelines how the database is accessed. Every access should be
monitored.
4.6 Backup:
At every instant, backup should be done. In case of any disaster,
Organizations can retrieve their data.
For the time being, the software commonly used in web applications
is CGI (Common Gateway Interface). The web server can do a
different function in easier way as it is uncomplicated. It is user-
friendly as a web page counter. Moreover, for example as reading
the input from the remote user, it can be used as multifarious to
access the input as uncertainty to a local database. CGI precedes
the outcome to the userafter retrieving the database. On the other
hand, it is also risky since CGI scripts permit software applications to
be carried out inside the web server. The well-known language for
CGI scripts is Perl since it is simple to build applications and parse
the input from the user. Nevertheless, Perl can be exploited by
wicked users as it grants some forceful system commands.
The invader can simply demolish the system if CGI was weakly
executed by web server. This may be a huge hazard to the system
as someone can easily eliminate the classified files from Web server
as effortless to contact. To get rid of the intimidations, there are
several ways to prevent these. The CGIscripts should be prohibited
by abuser to write, and the arrangement should be done to CGI
program that can be performedas a single way of directory. It should
also be cautious in writing the CGI script. No more longer usage of
CGI applications such as sample applications should be disposed as
theseare approachabletoWeb server and major intentions for
invaders since older CGI samples havesafetygaps.
5.4 Firewalls
The major significant layer to slab the external interruption of the
system is Firewalls. Packet filter and proxy server are the twotypes
of firewall mechanism. Theconnected data between the application
and database are divided into packets which consist of much
information in its headers, for examples, sources, destination
address and protocol being used. A number of them are cleanedas
with whichsource addresses are unbelievable to access to the
databases.
The arrangement of firewall should be done to access only one or
few protocolswhich is helpful for application queriessuch as TCP
whereas the other packets are choked-up firmly. Accordingly, the
smallest amountof risks are maintained for the vulnerable system.
Moreover, the ping of fatalloss will be kept systematically if the
firewall is constructed to abandon the approached ICMP demand.
.
use multiple passwords to access multi-functions of a server such as
using one password to access thesingle system for administration;
6. Conclusion
The institutions, organizations and business firms mainly storedtheir
important information and valuable assets as digital formats in
online related excellent databases. The safety and security issues of
Databasesbecomestrongly an essential role in the modern world for
enterprises.To save from harm of database is to prevent the
companies’untouchableinformation resources and digital
belongings. Database is the multifarious system and very
complicated to handle and difficult to prevent from invaders.