0% found this document useful (0 votes)
48 views11 pages

Database Security by Haris

Database security involves measures to protect sensitive data from threats. These include separating database and web servers with firewalls, securely managing user privileges so that only necessary access is granted, enforcing strong password policies, encrypting data and backups, and auditing and monitoring the system for suspicious activity.

Uploaded by

Muhammad Asfand
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views11 pages

Database Security by Haris

Database security involves measures to protect sensitive data from threats. These include separating database and web servers with firewalls, securely managing user privileges so that only necessary access is granted, enforcing strong password policies, encrypting data and backups, and auditing and monitoring the system for suspicious activity.

Uploaded by

Muhammad Asfand
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 11

Database Security

Haris Sattar Ghurki


Database
Systematic collection of data that
Social media CRM systems E-commerce
is set up for easy access,
websites websites
management and updating.
Database
Threats 1 2 3

An object, person or other


Privilege Credential System
entity that represents a risk of
Threats Threats Threats
loss or corruption of sensitive
data to an asset.

.
Separate Database

& Web Servers

Database Firewalls

Security Secure Privileges

The collective measures used


to protect and secure a Secure Passwords
database
Encrypt Data And
Backups

Audit And Monitor


Firewalls
Cisco Umbrella pfSense Software Sophos XG
Firewall
• Denies access to traffic by
default.

• The only traffic allowed


through should come from
specific applications or web
servers. McAfee Firewall Fortinet Firewall Sonicwall Firewall
5
Secure
Privileges
Least number of people possible
to have access to the database. Administrator
Object privileges
privileges
Administrators should have only
the bare minimum privileges they
need to do their job.
6
Separate
Database &
Web Servers

Keeping the database on a


separate physical machine,
removed from the machines
running applications or web
servers.
Secure
Passwords
• Secure computer systems store
users' passwords in an
encrypted format.
• Whenever a user logs in, the
password entered is encrypted
initially, then compared to the
stored encryption of the
password associated with the
user's login name.
Encrypt Data &
Backups
• Method by which information is
converted into secret code that
hides the information's true
meaning.

• Should not store encrypted


backups alongside description
keys in plaintext. 
Audit And Monitor
• Monitoring logins (and
attempted logins) to the
operating system and database.

• Create alerts to notify relevant


team members when potentially
malicious activity is identified.
ANY QUESTIONS?

THANK YOU!

You might also like