0% found this document useful (0 votes)
24 views10 pages

DBMSs and Web Security

Uploaded by

xogiji8803
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views10 pages

DBMSs and Web Security

Uploaded by

xogiji8803
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 10

DBMSs and Web Security

Securing DBMS in Web Environments


Introduction
• Database Management Systems (DBMS) ensure efficient and
secure data storage, providing quick access and maintaining
data integrity with web Security complementing this by
protecting online data and user privacy from cyber threats.

Together, DBMS and web security create a robust framework


for managing and safeguarding our digital assets.
Introduction
The challenge is to ensure that
• Private: Only accessible to the sender and receiver.
• Integrity: Unchanged during transmission.
• Authentic: Verified to come from a trusted source.
• Non-fabrication: Confirming the receiver's identity.
• Non-repudiation: Preventing the sender from denying the
transmission.
Security Mechanisms
Proxy servers
• A computer that acts as an intermediary between a Web browser and a
Web server. It intercepts and evaluates requests to determine if they can
be fulfilled locally or need to be forwarded to the Web server.
• Improve performance:
• Caches frequently accessed web pages, reducing load times for users.
• Example: If user A requests a page, it's stored by the proxy. When user B
requests the same page, the proxy serves it directly from the cache.
• Supports thousands of users efficiently, like those in large networks (e.g.,
CompuServe, AOL).
• Filter Requests:
• Controls access to certain websites.
• Example: Organizations can block employees from accessing non work-
related sites.
• A firewall is a system designed to
prevent unauthorized access to or
from a private network.

Looks at each packet and accepts


Packet Filter or rejects it based on rules.

Application Applies security mechanisms to


Gateway specific applications.

Circuit-Level Applies security mechanisms


Gateway when a TCP or UDP connection is
established.

Proxy Intercepts all messages entering


Server and leaving the network.
Cryptographic Measures
Message Digest Algorithm (One-Way Hash Function):
• Generates a fixed-length digest from an arbitrary message.
• Key Characteristics:
• Computationally infeasible to find another message with the same digest.
• The digest does not reveal the original message.
Digital Signature:
• Combines data with a private key to create a unique, verifiable signature.
• Key Properties:
• Authenticity: Can be verified with the corresponding public key.
• Non-forgeable: Cannot be replicated if the private key is secure.
• Integrity: Signature is tied to the specific data, ensuring it hasn't been
altered.
• Often uses message digest algorithms to enhance efficiency.
Cryptographic Measures
Digital Certificates
• An attachment to an electronic message used to verify the sender’s identity
and to provide a secure way to encode a reply.
• Issued by a Certificate Authority.
How It Works:
• Sender: Applies for a digital certificate from a CA, which includes their public
key and identification details.
• Recipient: Uses the CA’s public key to decode the certificate, verify the sender’s
identity, and obtain the sender’s public key to send an encrypted reply.
• Importance:
• - Critical in establishing trust in a large, distributed network.
• - Most commonly used for SSL Web server validation to ensure secure
interactions.
SSL and S-HTTP: Securing Web Communications
Secure Sockets Layer (SSL):
• Developed for encrypting data over the Internet.
• Uses a private key to secure data transmission, preventing eavesdropping,
tampering, and forgery.
• Supported by major browsers like Firefox and Internet Explorer for protecting
sensitive information (e.g., credit card numbers).
Secure HTTP (S-HTTP):
• A modified version of HTTP designed for secure transmission of individual
messages.
• Complements SSL by securing specific messages rather than entire connections.
• Both SSL and S-HTTP are submitted for IETF approval and are used for
authenticating and securing web communications.
SSL and S-HTTP: Securing Web Communications
Benefits of SSL/S-HTTP:
• Authentication: Verifies both the browser and server.
• Access Control: Allows control over server resources.
• Data Security: Ensures sensitive information remains inaccessible to third parties.
• Data Integrity: Prevents data corruption during transmission.
• Key Component:
• Digital certificates are essential for the security of SSL and S-HTTP protocols.
Secure Electronic Transactions
• The Secure Electronic
Transactions (SET) protocol is an
open, interoperable standard
for processing credit card
transactions over the Internet.

• SET’s goal is to allow credit card


transactions to be as simple and
secure on the Internet as they
are in retail stores.

You might also like