D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.

Slides:



Advertisements
Similar presentations
Operating System Security
Advertisements

Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Chapter 23 Database Security and Authorization Copyright © 2004 Pearson Education, Inc.
Building web applications on top of encrypted data using Mylar Presented by Tenglu Liang Tai Liu.
Access Control Methodologies
Database Management System
Security Issues and Challenges in Cloud Computing
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
It’s always better live. MSDN Events Security Best Practices Part 2 of 2 Reducing Vulnerabilities using Visual Studio 2008.
Information Networking Security and Assurance Lab National Chung Cheng University The Ten Most Critical Web Application Security Vulnerabilities Ryan J.W.
It’s always better live. MSDN Events Securing Web Applications Part 1 of 2 Understanding Threats and Attacks.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Silberschatz, Galvin and Gagne  Operating System Concepts Module 19: Security The Security Problem Authentication Program Threats System Threats.
Applied Cryptography for Network Security
Chapter 8 Security Transparencies © Pearson Education Limited 1995, 2005.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
Introduction (Pendahuluan)  Information Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Summary For Chapter 8 Student: Zhibo Wang Professor: Yanqing Zhang.
Chapter 19 Security Transparencies. 2 Chapter 19 - Objectives Scope of database security. Why database security is a serious concern for an organization.
Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit.
Storage Security and Management: Security Framework
ISOM MIS3150 Data and Info Mgmt Database Security Arijit Sengupta.
Chapter 5 Security Threats to Electronic Commerce
Ladd Van Tol Senior Software Engineer Security on the Web Part One - Vulnerabilities.
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
DBSQL 7-1 Copyright © Genetic Computer School 2009 Chapter 7 Transaction Management, Database Security and Recovery.
Security Security is a measure of the system’s ability to protect data and information from unauthorized access while still providing access to people.
CS 325: Software Engineering April 14, 2015 Software Security Security Requirements Software Security in the Life Cycle.
Switch off your Mobiles Phones or Change Profile to Silent Mode.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 5 “Database and Cloud Security”.
1 Presented by July-2013, IIM Indore. 2  RFID = Radio Frequency IDentification.  RFID is ADC (Automated Data Collection) technology that:-  uses radio-frequency.
Security Mark A. Magumba. Definitions Security implies the minimization of threats and vulnerabilities A security threat is a harmful event or object.
Cryptography, Authentication and Digital Signatures
Oracle Application Express Security. © 2009 Oracle Corporation Authentication Out-of-the-Box Pre-Configured Schemes LDAP Directory credentials Oracle.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
SEC835 Runtime authentication Secure session management Secure use of cryptomaterials.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Database security Diego Abella. Database security Global connection increase database security problems. Database security is the system, processes, and.
Web Security Lesson Summary ●Overview of Web and security vulnerabilities ●Cross Site Scripting ●Cross Site Request Forgery ●SQL Injection.
Academic Year 2014 Spring Academic Year 2014 Spring.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
Trusted Operating Systems
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Securing Web Applications Lesson 4B / Slide 1 of 34 J2EE Web Components Pre-assessment Questions 1. Identify the correct return type returned by the doStartTag()
Overview of Database Security Introduction Security Problems Security Controls Designing Database Security.
Database Security. Introduction to Database Security Issues (1) Threats to databases Loss of integrity Loss of availability Loss of confidentiality To.
Database Security Database System Implementation CSE 507 Some slides adapted from Navathe et. Al.
Access Controls Mandatory Access Control by Sean Dalton December 5 th 2008.
By Collin Donaldson. Hacking is only legal under the following circumstances: 1.You hack (penetration test) a device/network you own. 2.You gain explicit,
DATABASE SECURITY.
Database and Cloud Security
CS457 Introduction to Information Security Systems
Database System Implementation CSE 507
Web Application Vulnerabilities, Detection Mechanisms, and Defenses
WWW安全 國立暨南國際大學 資訊管理學系 陳彥錚.
Operating System Concepts
Presentation transcript:

D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015

Why is database security important? Properties of Database Security Categories of Attacker Different Types of Attacks Web Security Threats Database Security Considerations Recent Used Database Security Techniques Outline

Databases often store data which is sensitive in nature Incorrect data or loss of data could negatively affect business operations Databases can be used as bases to attack other systems from Why is Database Security Important ?

Confidentiality Integrity Availability The Properties of Database Security

What does confidentiality mean ? Privacy or the ability to control or restrict access so that only authorized individuals can view sensitive information. One principles of confidentiality is “ Need-to-Know” or “Least Privilege”. The most common method: Encryption Authentication Access Control Confidentiality

Information is accurate and reliable and has not been subtly changed or tampered with by an unauthorized party. Authenticity : The ability to verify content has not changed in an unauthorized manner Non-repudiation & Accountability: The origin of any action on the system can be verified and associated with a user. Integrity :( Data Integrity)

Availability is the proportion of time a system is in a functioning condition. As the reliability increased, so does the availability. Availability

Intruder : An unauthorized user means accessing a computer system in an illegal manner and attempts to take out valuable information. Insider : Trusted users who make violence of his/her privileges and tries to get information beyond his own access permissions. Administrator: An authorized user who uses the administration privileges in unauthorized way according to organization’s security policy to get valuable information. Categories of Attacker

Direct attacks Attacking the targeted data directly These types of attacks are successful only if the database does not contain any protection mechanism. Indirect attacks These attacks are not directly executed on the target but information from or about the target can be received through other intermediate objects. Difficult to find out or track Combinations of different queries Different Types of Attacks

Passive Attack Attacker only observes data present in the database. Static leakage Linkage leakage Dynamic leakage Active Attack Actual database values are modified. These are more problematic than passive attacks because they can mislead a user. There are different ways of performing such kind of attack: Spoofing - Splicing - Replay Attacks on Database classified into two types

AJAX Security: In recent years, adding AJAX elements in sites has become a very popular style JavaScript : is a widely client-side scripting language, it has been broadly used to reduce the load on the server Run-time error can only be found during running time of program Web Security Threats

Cross site scripting (also known as XSS or CSS): By utilizing the XSS bugs in the web programs, malicious attackers construct a trap page and the malicious script can be saved in the page content or URL If the visitors visit URL, the JavaScript will be executed by attackers’ browser.

Every organization must having its own security policy and that security policy should be strictly enforced. A strong security policy must contain well defined security features. Database Security Considerations

Ensures all communications with the databases and other system objects are according to the policies and controls defined. No obstruction occurs by any attacker neither internally nor externally Protects the databases from potential errors. Minimizing the risks that may directly impact the security of the database. Access Control

Inference policy is required to protect the data at a particular level. Some data are required to be protected at a certain higher security level. The policy also determines how to protect the information from being released. Inference Policy

The identification method describes a set of people that are allowed to access data and provides a complete mechanism of accessibility To ensure security, the identity is authenticated and it keeps the sensitive data secure and from being modified by any ordinary user. User Identification/ Authentication

These two checks are required to ensure physical integrity of the data which requires defined access to the databases and that is managed through auditing and record keeping. Helps in analysis of information held on servers for authentication, accounting and access of a user. Accountability and Auditing

Encryption is the process of transforming information by means of a cipher or a code so that it becomes unreadable to all other people except those who hold a key to the information. Various Types of encryption offered by SQL : Column Level Database Level Instance Level This encrypts ALL traffic to and from SQL server Encryption

Securing Database using Cryptography Securing Database using Steganography Securing Database using Access Control Recent Used Database Security Techniques

A database encryption scheme users are divided into two levels: Level 1: users have access to their own private encrypted data and the unclassified public data. Level 2: users have access to their own private data and also classified data which is stored in an encrypted form. A novel database encryption mechanism Classify the data into sensitive data and public data. Encrypt only the sensitive and critical data Helps the performance is not degraded. Mixed Cryptography Database scheme designing a framework to encrypt the databases. the data is grouped depending upon the ownership and on other conditions. Securing Database using Cryptography

Various techniques in steganography that can be implemented to hide critical data and prevent them from unauthorized and direct access. the data is embedded in the least-significant-bit’s of the pixel values. The pixels values are categorized into different ranges and depending on the range certain number of bits is allocated to hide the sensitive data. Securing Database using Steganography

the access to the database only after verifying the credentials of that user The credentials may not just be the user-id but it may be the characteristics There two techniques: A generalized authorization model An authorization model Securing Database using Access Control

A generalized authorization model involves integrating the three most common and widely used access control mechanisms namely: Mandatory – Discretionary – and role-based model into a single framework to allow unified access to the protected data An authorization model queries are acceptable only when the queries can be verified using the information contained in the authorization rules. Securing Database using Access Control Techniques:

Questions or Comments?