Database Security
Database Security
Specific objectives: by the end of the lesson, you will be able to do the following;
1. Define data security;
2. List at least two importance of data security;
3. Explain risk assessment;
4. List four ways of physically securing data;
5. List and explain the types of security control on the data;
6. State at least four roles of database administrator.
Data Security
Data security is the means of ensuring that data are kept safe from corruption and that
access to it is suitably controlled.
In simple terms, data security is the practice of keeping data protected from corruption
and unauthorized access.
Data security is a major issue for businesses, organizations and even homes. Ensuring that
your data is secured is becoming more important everyday and vital to business operations.
Data security helps to ensure the following;
Once you draw up a plan and access your risks, it is time to put your data security system
into action. Some data can be compromised in many ways, the best security against misuse
or theft involves a combination of technical measures, physical security and a well-educated
staff. Here are things to do;
1. Protect your office or data counter with alarms and monitoring systems.
2. Keep computers and associated components out of public view.
3. Enforce restrictions on internet access.
4. Ensure that your anti-malware solution is up to date.
5. Ensure that your operating system is up to date.
6. Fight off hacking attacks with intrusion detection technology.
7. Utilize a protected power supply and backup energy sources.
Types of security control on the data
Access control: this is the selective restriction of access to a place or other resources. Most
users need to access only a small part of the database to carry out their tasks. DBMS should
provide mechanisms to control access to data. Authorization is the permission to access
resources.
Database auditing: this is the act of observing database users. The database administrators
and consultants set up auditing for security purposes. For example, ensuring that those
without permission to information will not have access.
Authentication: authentication is another part of data security that we encounter with every
day computer usage. Things like password, smart card, fingerprints etc. can be used for
authentication purpose.
Encryption: a DBMS can use encryption to protect information in certain situations where
the normal security mechanisms of the DBMS are not adequate. For example, an intruder
may steal tapes/hard disk etc. containing some data or tap a communication line. By storing
and transmitting data in an encrypted form, the DBMS ensures that such stolen data is not
intelligible to the intruder. The basic idea behind encryption is to apply an encryption
algorithm, which may be accessible to the intruder but the original data is not without the
encryption key.
Roles of database administrator