Security.

Slides:



Advertisements
Similar presentations
Chapter ADCS CS262/0898/V1 Chapter 1 An Introduction To Computer Security TOPICS Introduction Threats to Computer Systems –Threats, Vulnerabilities.
Advertisements

1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA.
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
Access Control Methodologies
Lecture 1: Overview modified from slides of Lawrie Brown.
Ch4 Database Security. Security  Security - protection from malicious attempts to steal or modify data.  Database system level Authentication and authorization.
1 Protection Protection = access control Goals of protection Protecting general objects Example: file protection in Linux.
Kerberos Jean-Anne Fitzpatrick Jennifer English. What is Kerberos? Network authentication protocol Developed at MIT in the mid 1980s Available as open.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Silberschatz, Galvin and Gagne  Operating System Concepts Module 19: Security The Security Problem Authentication Program Threats System Threats.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Chapter 10: Computer Controls for Organizations and Accounting Information Systems
Storage Security and Management: Security Framework
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
DATABASE UTILITIES. D ATABASE S YSTEM U TILITIES In addition to possessing the software modules most DBMSs have database utilities that help the DBA in.
Operations Security Lisa M. True, CISSP January 12, 2004 Domain 7.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Computer Security “Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware,
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
SCUHolliday12–1 Schedule Today: u Security, Object-Relational Systems. u Read Section 8.7. Next u Indexing. u Read Section And Then u Query optimization.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
D ATABASE A DMINISTRATION L ECTURE N O 3 Muhammad Abrar.
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
DB Security, Nov 11, Database Security S. Sudarshan Computer Science and Engg. Dept I.I.T. Bombay.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Chap1: Is there a Security Problem in Computing?.
TM 13-1 Copyright © 1999 Addison Wesley Longman, Inc. Data and Database Administration.
CONTROLLING INFORMATION SYSTEMS
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
Security and Ethics Safeguards and Codes of Conduct.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
CSCE 201 Identification and Authentication Fall 2015.
Database Security Threats. Database An essential corporate resource Data is a valuable resource Must be strictly controlled, managed and secured May have.
Understand Wireless Security LESSON Security Fundamentals.
TM 13-1 Copyright © 1999 Addison Wesley Longman, Inc. Data and Database Administration.
OSI Model OSI MODEL. Communication Architecture Strategy for connecting host computers and other communicating equipment. Defines necessary elements for.
OSI Model OSI MODEL.
Securing Information Systems
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Controlling Computer-Based Information Systems, Part II
SECURITY FEATURES OF ATM
Objectives Differentiate between the different editions of Windows Server 2003 Explain Windows Server 2003 network models and server roles Identify concepts.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Securing Information Systems
12: Security The Security Problem Authentication Program Threats
Final HIPAA Security Rule
برنامج أمن أنظمة الحاسب
INFORMATION SYSTEMS SECURITY and CONTROL
How to Mitigate the Consequences What are the Countermeasures?
Faculty of Science IT Department By Raz Dara MA.
Database Security &Threats
OSI Model OSI MODEL.
Security.
Operating System Concepts
Computer Security By: Muhammed Anwar.
Operating System Concepts
Security in SDR & cognitive radio
Mohammad Alauthman Computer Security Mohammad Alauthman
Cryptography and Network Security
Introduction to Course
Presentation transcript:

Security

Security Security of data is important concept in DBMS because it is essential to safeguard the data against any unwanted users. It is protection from malicious attempts to steal or modify data.

There are five different level of security Database system level Operating Network level Physical level Human level

1. Database system level Authentication and authorization mechanism to allow specific users access only to required data.

2. Operating Protection from invalid logins File level access protection Protection from improper use of “superuser” authority. Protection from improper use of privileged machine instructions.

3. Network level Each site must ensure that it communicates with trusted sites. Links must be protected from theft or modification of messages. Mechanisms used Identification protocol (password based) Cryptography

4. Physical level Protection of equipment from floods, power failure etc. Protection of disks from theft, erasure, physical damage etc. Protection of network and terminal cables from wire tapes, non invasive electronic eavesdropping, physical damage etc., Solution Replication hardware- mirrored disks, dual busses etc. Multiple access paths between every pair of devices. Physical security by locks, police etc. Software techniques to detect physical security breaches.

5. Human level Protection from stolen passwords, sabotage, etc. Solution Frequent change of passwords. Use of “non-guessable” passwords. Log all invalid access attempts. Data audits Careful hiring practices.