8 Database Security
8 Database Security
Database Security
• With the development of information
technology organizations have accumulated a
huge volume of data regarding many aspects
of their activities.
Database Security • All this data can be the basis for critical
decisions, which means that data has become
Ref: Sharma N. et al. Database Fundamentals, IBM an extremely valuable resource for
Corporation, 2010
organizations, so it is necessary to pay close
attention to data security.
• For these reasons, everyone in an organization
must be sensitive to security threats and take
measures to protect the data within their
domains.
1 2
Database Security: The Big Picture Database Security: The Big Picture
• Often the problems related to security are
complex and may involve legal, social or • In consequence, by focusing on database
ethical aspects, or issues related to policies security alone will not ensure a secure
implemented or related to control of the database.
physical equipment.
• Database security relates to protecting the • All parts of the system must be secure:
database against intentional or unintentional • the database,
threats, using elements of control that may or • the network,
may not be based on the computing
equipment. • the operating system,
• The analysis of database security includes not • the building in which the database resides
only services provided by a DBMS, but a wider physically and
range of issues associated with database and • the persons who have an opportunity to access
the environment security.
the system.
3 4
Database Security – The Big Picture Database Security – The Big Picture
• Designing and implementing a secure
database involves achieving the following
objectives:
• Privacy, which means that data should not be
known by unauthorized users;
• Integrity, which means that only authorized
users can change data;
• Availability, which means that authorized
users should not be denied access;
5 6
1
29/10/2021
7 8
9 10
11 12
2
29/10/2021
13 14
15 16
Data Encryption
Data Encryption • Encryption is the process of encoding data by a
particular algorithm, which makes it impossible for
• Sensitive and personal data stored within the a program to read data without the decryption key.
Usually encryption protects data transmitted
database tables and critical data transmitted through communication lines.
across the network, such as user credentials
• There are more techniques for encoding data, some
(user ID and password), are vulnerable and of which are reversible, while others are
should be protected against intruders. irreversible. Irreversible techniques do not allow
knowledge of the original data, but can be used to
obtain valid statistical information.
• Any system that provides encryption facilities must
also provide adequate routines for decoding,
routines which must be protected by proper
security.
17 18
3
29/10/2021
19 20