Security in Computing Notes Powerpoint Presentation
Security in Computing Notes Powerpoint Presentation
Introduction to Databases
Database collection of data and set
of rules that organize the data by
specifying certain relationships
among the data
Database administrator (DBA)
Database management system
(DBMS) database manager, frontend
Introduction to Databases
Records contain related group of
data
Fields (elements) elementary data
items
Schema logical structure of
database
Subschema view into database
Introduction to Databases
Relational
Rows (relation); columns (attributes)
DB2, Oracle, Access
Hierarchical
IMS
Object-oriented
Introduction to Databases
Queries
SELECT NAME = ADAMS
SELECT (ZIP = 43210) ^ (NAME = ADAMS)
Project
SHOW FIRST WHERE (ZIP = 43210) ^ (NAME
= ADAMS)
Join
SHOW NAME, AIRPORT WHERE
NAME.ZIP = AIRPORT.ZIP
Security Requirements
Physical database integrity
Logical database integrity
Element integrity
Auditability
Access control
User authentication
Availability
Element Integrity
Correctness or accuracy of elements
Field checks
Access control
Maintain a change log list every
change made to the database
Two-Phase Update
Failure of computing system in
middle of modifying data
Intent Phase gather resources
needed for update; write commit
flag to the database
Update Phase make permanent
changes
Shadow fields
Concurrency/Consistency
Sensitive Data
Data that should not be made public
What if some but not all of the
elements of a DB are sensitive
Inherently sensitive
From a sensitive source
Declared sensitive
Part of a sensitive attribute or record
Sensitive in relation to previously
disclosed information
Access Decisions
Need an access policy (programmed
into DBMS)
Availability blocking; permanent
blocking
Acceptability of Access (sensitive
data)
Assurance of Authenticity
Types of Disclosures
Exact Data
Bounds
Negative Results
Existence of Data
Probable Values
Inference
Way to infer / derive sensitive data
from nonsensitive data
Direct Attack
Indirect Attack
Sum
Show STUDENT-AID WHERE SEX=F ^
DORM=Grey
Count
Show Count, STUDENT-AID WHERE SEX=M ^
DORM=Holmes
List NAME where (SEX=M ^ DORM=Holmes)
Median
Tracker Attacks using additional queries
that produce small results
Controls
Suppression dont provide
sensitive data
Concealing dont provide actual
values (close to)
Limited Response Suppression
Controls
Combined Results
Sums
Ranges
Rounding
Random Sample
Random Data Perturbation
Query Analysis should the result
be provided
Aggregation
Building sensitive results from less
sensitive inputs
Data mining process of sifting
through multiple databases and
correlating multiple data elements to
find useful information
Multilevel Databases
Differentiated Security
Security of single element may be
different from security of other elements
Two levels sensitive and nonsensitive
are inadequate to represent some
security situations
Security of an aggregate (sum, count,)
may be different from security of the
individual elements
Granularity
Security Issues
Integrity
*-property for access control
Either process cleared at a high level cannot
write to a lower level or process must be a
trusted process
Confidentiality
Different users at different levels may get
different query results
Polyinstantiation record can appear more
than once with different levels of confidentiality
Separation
Partitioning divide DB into separate
DBs with own level of sensitivity
Encryption (time consuming)
Integrity Lock each data item contains
a sensitivity label and a checksum
Sensitivity label must be unforgeable,
unique, concealed
Checksum must be unique
Sensitivity lock
Window/View
Subset of a database containing exactly
the information that the user is entitled
to access