OS, DB & Program security
OS, DB & Program security
tabor
OS, DB & Program security
University
Seminar Prepared By……………...Id No.
1. Sewlesew Tilahun ……1422
2. Yeabsira Haile………....1483
3. Surafel Abedela……….0495
4. Daniel Gethaun …….…0649
5. Mamaru Anemaw …....0539
6. Temsgen Yilma………..1267
Outline
Introduction
Os security
Database security
Program security
Threats to database
Loss of integrity
Loss of availability
Loss of confidentiality
12/30/2022 Prepared by group 5 students 17
Confidentiality
No one can read our data/ communication unless we
want them to
It is protecting the database from unauthorized users
Ensures that users area allowed to do things they are
trying to do
For example:
The employees should not see the salaries of their
mangers.
Database firewall build (or come with) white list of approved SQL
commands(or) statement that are safe.
All
12/30/2022the input commands are compared
Prepared with white list and only those
by group 5 students 24
that are already present in the white list are sent to the database.
Advantage of using
FIREWALLS
Database firewalls maintains the black list of certain specific and
potential harmful commands(or) SQL statements and do not allow this
type of input.
Database
12/30/2022 firewalls notifies thebysuspicious
Prepared activity instead of blocking
group 5 students 25
them right away.
How data encryption
works
Data encryption is a key-based access control system. Even if the
encrypted data is received, it cannot be understood until authorized
decryption occurs, which is automatic for users authorized to access
the tables.
You do not need to create triggers or views to decrypt data. Data from
tables is decrypted for the database user.
Database users need not be aware of the fact that the data they are
accessing is stored in encrypted form. Data is transparently decrypted
for the database users and does not require an action on their part.
A. Non-malicious code
Unintentional
Caused from a mistake done by a human such as programmers
and developers
Many such errors cause program malfunction but do not lead to
more serious security vulnerabilities
Example:
char sample|10];
-> compiler set aside 10 bytes to store this buffer
sample[10] = ‘A’
-> the subscript is out of bound, we have a problem
Malicious code runs under the user’s authority but without the user's
12/30/2022 Prepared by group 5 students 40
permission or even knowledge
Kinds of Malicious
Code
Malicious code/rogue program is the general name for
unanticipated or undesired effects in programs or programs parts,
caused by an agent intent on damage
The agent is the writer of the program or the person who Causes Its
distribution
Resident virus
Locates itself in memory;
Then it can remain active or be activates as a stand-alone
program, even after its attached program ends
12/30/2022 Prepared by group 5 students 42
Cont’d