0% found this document useful (0 votes)
0 views

Encryption and Authentication in Database Systems

The document discusses the importance of encryption and authentication in database systems to ensure data security. Encryption protects sensitive information from unauthorized access during storage and transmission, while authentication verifies user identities to prevent unauthorized actions. Both components are crucial for maintaining data integrity and privacy.

Uploaded by

Mani Malathi
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
0 views

Encryption and Authentication in Database Systems

The document discusses the importance of encryption and authentication in database systems to ensure data security. Encryption protects sensitive information from unauthorized access during storage and transmission, while authentication verifies user identities to prevent unauthorized actions. Both components are crucial for maintaining data integrity and privacy.

Uploaded by

Mani Malathi
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 8

ENCRYPTION AND AUTHENTICATION

IN DATABASE SYSTEMS

By
Mrs.Subhasheni A
Assistant Professor
Sri Ramakrishna college of Arts & Science
INTRODUCTION
 Both Encryption and Authentication are critical components
in ensuring the security of a database system. They protect
data from unauthorized access and help verify the identity
of users interacting with the system.
ENCRYPTION
 Encryption is the process of converting data into a format that
cannot be easily read or understood by unauthorized individuals.
The goal is to protect sensitive information from unauthorized
access, especially when it is being stored or transmitted.
 Data Encryption: Ensures that data stored in the database or
transmitted over the network is unreadable without the proper
decryption key.
 Example: Encrypting credit card numbers or personal
information stored in the database.
CONTN..
 Encryption Methods:
 Symmetric Encryption: The same key is used for both
encryption and decryption.
 Asymmetric Encryption: Uses a pair of keys—one for
encryption (public key) and another for decryption (private key).
 Advantages:
 Protects data in case of unauthorized access to physical devices
or breaches.
 Secures data during data transmission, such as over the
internet (e.g., SSL/TLS).
AUTHENTICATION
 Authentication is the process of verifying the identity of a user or
system before granting access to a database or application. It
ensures that only authorized users can perform actions on sensitive
data.
 User Authentication:
 The most common form of authentication is the use of a
username and password. The system compares the provided
credentials against stored credentials.
 Multi-Factor Authentication (MFA) adds an additional layer
of security by requiring multiple forms of verification (e.g., a one-
time password sent via SMS or email, biometric verification).
CONTN..
 Authentication Methods:
 Password-based: A combination of a username and password.
 Biometric authentication: Uses unique physical
characteristics, such as fingerprints or facial recognition.
 Token-based authentication: The system issues a token after
initial login, which is used for subsequent access.
ADVANTAGES
 Prevents unauthorized access by ensuring that only users with
proper credentials can access data.
 Helps meet regulatory compliance standards (e.g., HIPAA, GDPR)
by ensuring only authorized users can interact with sensitive data.
CONCLUSION
 Encryption secures data confidentiality during storage and
transmission.
 Authentication verifies the identity of users to prevent
unauthorized access.
 Both are essential to maintaining the integrity and privacy of data
within a database system.

You might also like