Unit 8 Security
Unit 8 Security
Unit 8 Security
Integrity:
•Maintains the accuracy and consistency of data within the database.
•DBMS implements data validation rules to ensure data entered conforms to
specific criteria (e.g., data type, format, range).
Availability:
•Guarantees that authorized users can access the data they need when needed.
•DBMS provides backup and recovery solutions to restore data in case of hardware
failures, software errors, or cyberattacks.
•High availability techniques like clustering and replication can ensure
minimal downtime even during maintenance or system outages.
Importance of Data Security in
DBMS
Data breaches and unauthorized access can have severe
consequences for organizations. Robust data security in DBMS
helps to:
•Authorization: The process of determining what a user can do with the database
after successful authentication. It defines the level of access (permissions) a user
has for specific data or functionalities within the database.
Authentication and Authorization
Benefits:
• Simplified Administration: Managing access control becomes easier
by defining permissions at the role level rather than for individual
users.
• Improved Security: Reduces the risk of unauthorized access by
granting permissions based on job requirements, not individual users.
• Scalability: Adapts well to changes in personnel and organizational
structure as permissions are tied to roles, not specific users.
Benefits:
• Flexibility: Allows users to share data with specific colleagues as needed.
• Simplicity: Relatively easy to implement for small-scale environments.
Drawbacks:
• Security Concerns: Increased risk of unauthorized access if users
grant permissions carelessly.
• Management Complexity: Administering access becomes
cumbersome in
larger environments with many users and data objects.
Benefits:
• High Security: Provides the strictest access control, ideal for highly
sensitive data.
Drawbacks:
• Limited Flexibility: Inflexible for dynamic environments where
access needs might change frequently.
• Complex Administration: Requires significant effort to define
and
maintain security classifications and user clearances.
Choosing the Right access control model depends on the specific needs of the
organization and the sensitivity of the data:
•RBAC: A good choice for most organizations due to its balance of security,
manageability, and scalability.
•DAC: Suitable for smaller environments with well-defined ownership of
data objects, but security concerns increase with larger scales.
•MAC: Best suited for environments with highly sensitive data requiring
the
Benefits of Access
Control
Data Security: Prevents unauthorized access to sensitive data,
protecting confidential information like customer records,
financial data, or intellectual property.
Data Integrity: Reduces the risk of accidental or malicious
data modification by restricting unauthorized users from
modifying data they shouldn't access.
Compliance: Helps organizations comply with regulations that
require data privacy and security.
Improved Efficiency: Streamlines database management by
ensuring users only have access to the data they need for their
tasks.
Authentication
Authentication is the process of verifying a user's identity. It
confirms whether someone is who they claim to be when
attempting to access the database.
Data Manipulation: Malicious code can modify or delete data within the
database, leading to data corruption or disruption of operations.