0% found this document useful (0 votes)
96 views11 pages

Database Security

This document discusses database security. It defines database security as protecting the confidentiality, integrity, and availability of database information. Confidentiality means only authorized parties can access sensitive data. Integrity means data is not altered without authorization. Availability means authorized users can access data when needed. The document outlines security threats like natural disasters, software bugs, and unauthorized access. It describes using firewalls and encryption to secure databases, as well as authentication and access control.

Uploaded by

Muhammad Zakir
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
96 views11 pages

Database Security

This document discusses database security. It defines database security as protecting the confidentiality, integrity, and availability of database information. Confidentiality means only authorized parties can access sensitive data. Integrity means data is not altered without authorization. Availability means authorized users can access data when needed. The document outlines security threats like natural disasters, software bugs, and unauthorized access. It describes using firewalls and encryption to secure databases, as well as authentication and access control.

Uploaded by

Muhammad Zakir
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 11

TOPIC: Database Security

Roll # 161506
Name: Remshaa Javed
Subject: System Security
Overview:
 In today’s world, we need everything to be secured whether it is a mobile,
computer, vehicle or almost anything.
 Threats and risk to database have increased, So there is a need for security
of the database. The majority companies store sensitive data in database.
E.g.: Credit card number’s, University Admission, Land record.
 If there is no security to database what happens??? Data will be easily
corrupted.
What is Database Security?
• Database:
It is a collection of information stored in a computer.
• Security:
It is being free from danger.
• Database Security:
It is a mechanism that protects database against intentional and
accidental threats.
Definition of Database Security:
Database security is defined as a process by which “ Confidentiality, Integrity
and Availability” of database can be protected.
Database Security Concept:
1. Confidentiality
2. Integrity
3. Availability
Confidentiality:
Confidentiality refers to protecting information from being accessed by
unauthorized parties. In other words, only the people who are authorized to
do so can gain access to sensitive data. Imagine your bank records. You
should be able to access them, of course, and employees at the bank who
are helping you with a transaction should be able to access them, but no
one else should. A failure to maintain confidentiality means that someone
who shouldn't have access has managed to get it, through intentional
behavior or by accident. Such a failure of confidentiality, commonly known
as a breach, typically cannot be remedied. Once the secret has been
revealed, there's no way to un-reveal it. If your bank records are posted on a
public website, everyone can know your bank account number, balance,
etc., and that information can't be erased from their minds, papers,
computers, and other places. Nearly all the major security incidents reported
in the media today involve major losses of confidentiality.
Integrity:
Integrity refers to ensuring the authenticity of information—that information is
not altered, and that the source of the information is genuine. Imagine that
you have a website and you sell products on that site. Now imagine that an
attacker can shop on your web site and maliciously alter the prices of your
products, so that they can buy anything for whatever price they choose. That
would be a failure of integrity, because your information—in this case, the
price of a product—has been altered and you didn't authorize this alteration.
Another example of a failure of integrity is when you try to connect to a
website and a malicious attacker between you and the website redirects your
traffic to a different website. In this case, the site you are directed to is not
genuine.
Availability:
 The other thing we want to do with this data is make sure that the people
who need to see it are the authorized individuals that can get to data and
that’s all about availability because even if we have confidentiality and
integrity if we have a denial of service or the authorized user isn’t able to
get to the data when they need it that’s a problem as far as the business is
concerned.
Security Problems:
There are two kinds of threat.
• Non-fraudulent Threat
• Fraudulent Threat
 Non-fraudulent Threat:
1. Natural or accidental disasters.
2. Errors or bugs in hardware or software.
3. Human errors.
 Fraudulent Threat:
Authorized users:
Those who abuse their privileges and authority.
Hostile agents:
Those improper users (outsider or insiders) who attack the software and/or
hardware system, or read or write data in a database
Security of Database through Firewalls:
 A FIREWALL is dedicated software on another computer which inspects
network traffic passing through it and denies (or) permits passage based on
set of rules. Basically it is a piece of software that monitors all traffic that
goes from your system to another via the Internet or network and Vice
Versa. Database Firewalls are a type of Web Application Firewalls that
monitor databases to identify and protect against database specific
attacks that mostly seek to access sensitive information stored in the
databases.
Method of Securing the Database:
 Encryption: This is the process of transforming plain text information using an
encryption algorithms (called cipher) to make it unreadable to anyone
except those possessing special knowledge, usually referred to as a key.
 Web-based Database Security: Some Methods are proposed to establish
security of Web database against illegitimate intrusion. The data
transmission from server to the client should be in a secured way (use
Secure Socket Layer).SSL encrypt the link between a client and serve which
ensures that all data passed between them remain private and free of
attack.
 Authentication and Access Control: Authentication is used to check
properly the identity of the user and Access Control controls the user
actions or operations.

You might also like