Chapter 5 SAD
Chapter 5 SAD
Compiled by Dagmawi
Fetene
SECURITY BREACHES
Data observation
results in disclosure of information to users not
Compiled by
Dagmawi Fetene
DBMS
SECURITY(PASSWORD,GROUPS)
DBMS products provide security facilities
They limit certain actions on certain objects
Compiled by Dagmawi
Fetene
PERMISSIONS AND PRIVILEGE
The owner (creator)
SQL uses privileges
to control access to of a database has all
privileges on all
tables and other
Compiled by Dagmawi
Fetene
DATABASE INTEGRITY
Security vs Integrity Integrity constraints
Database security Domain constraints
makes sure that the apply to data types
user is authorised to Attribute constraints
access information apply to columns
Database integrity Relation constraints
makes sure that apply to rows in a
(authorised) users single table
use that information Database constraints
correctly apply between tables
Compiled by Dagmawi
Fetene
DATABASE CONSTRAINTS
Database constraints are similar but refer to
several tables
Example: Given tables student and enrolment,
make sure no CS student takes more than 12
modules
Student Enrolment
ID Name Department ID Code
Compiled by Dagmawi
Fetene
CHECK EXAMPLE
To add a check on the Employee table to
make sure no employee’s bonus is more than
15% of their salary
Compiled by Dagmawi
Fetene
DATA - INFORMATION - IS
VALUABLE
Many enterprises depend on secure & reliable
DBMSs:
Banks, the stock exchange, airlines, hospitals, ...
DBMS systems may be at risk from situations
such as:
Theft, fraud
Loss of confidentiality (business secrets) – loss of
competitiveness
Loss of privacy (personal information) – legal
implications
Loss of integrity – corrupted data
Loss of availability
Insecure DBMS worse than having no DBMS at all
Low staff confidence
Low customer confidence
Compiled by Dagmawi
Fetene
POTENTIAL SOURCES OF RISK -
THREATS
Examples of hardware & software threats
are:
Hardware - breakdown, theft, fire, flood, power
loss...
Software - bugs, unexpected features (includes OS)
Communications - wiretapping, packet sniffers,
packet loss
Probably the greatest threats are from
people:
Programmers - insecure code
DBAs - trapdoors, fake accounts
Users - mistakes, hacking, blackmail
Compiled by Dagmawi
Fetene
COMMON SECURITY MEASURES
Authorization - privileges, views
Authentication - passwords
Verification - digital signatures/certificates
Encryption - public key / private key, secure sockets
Integrity – IEF (Integrity Enhancement Features), transactions
Backups - offsite backups, journaling, log files
RAID (Redundant Array of Independent Discs) discs - data
duplication, “hot swap” discs
Physical - data centres, alarms, guards, UPS
Logical - firewalls, net proxies
Note: The security of a component is as good as the security
of the weakest link in the whole system
Compiled by Dagmawi
Fetene
DIGITAL SIGNATURES
Digital signatures (RSA in reverse):
Establishes authenticity of a document
BEGIN SIGNATURE
P4`341uy2rl34iut1lf,jbf,KPP98$\%\#!\$"BV!"X#
END SIGNATURE
Compiled by Dagmawi
Fetene
FIREWALLS
The Internet
Firewall ??
Internal Network
General guidelines:
Disable all user accounts on all Bastion machines
Preferably, run only one type of service on each
Bastion machine
Software firewalls:
Can have “all-software” firewalls (packet filters)
Until MS-Blast virus, Microsoft shipped Windows-XP
with firewall off by default!!
Compiled by Dagmawi
Fetene
SUMMARY
The best security comes from using multiple
techniques:
People - authorisation/authentication . .need-to-
know.
Physical - protect the hardware, RAID discs,
backups
Network - use firewalls, encryption
Software – “good programming practice” main CS
responsibility
For any given system:
Consider the different sources of risk (threats)...
Balance the cost of implementing security
measures vs cost of any loss!!
Compiled by Dagmawi
Fetene