DB Security, Nov 11, 20031 Database Security S. Sudarshan Computer Science and Engg. Dept I.I.T. Bombay.

Slides:



Advertisements
Similar presentations
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Advertisements

Overview Network security involves protecting a host (or a group of hosts) connected to a network Many of the same problems as with stand-alone computer.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
Database and Application Security
Database and Application Security
Chapter 15 Security Bernard Chen Spring Protection vs. Security Protection (Ch.14) deals with internal problem Security (Ch. 15) Deals with external.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Crime and Security in the Networked Economy Part 4.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Database Management System
Ch4 Database Security. Security  Security - protection from malicious attempts to steal or modify data.  Database system level Authentication and authorization.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
1 Applications of Computers Lecture-3 2 E-Commerce 4 Almost all major companies have their homes on the web, mainly for advertising 4 Companies were.
Network Security Peter Behrens Seth Elschlager. Computer Security Preventing unauthorized use of your network and information within that network. Preventing.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Dec 13 th CS555 presentation1 Yiwen Wang --“Securing the DB may be the single biggest action an organization can take to protect its assets” David C. Knox.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Programming Satan’s Computer
CS 4720 Security CS 4720 – Web & Mobile Systems. CS 4720 The Traditional Security Model The Firewall Approach “Keep the good guys in and the bad guys.
1 Seminar on DATABASE SECURITY Presented by: Name: SANGRAM KE CHOUDHURY Branch: MCA Regd no: G.I.A.C.R Engg. College, Rayagada.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Secure Electronic Transaction (SET)
Web Services Security. Introduction Developing standards for Web Services security – XML Key Management Specification (XKMS) – XML Signature – XML Encryption.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Electronic Payment Systems. How do we make an electronic payment? Credit and debit cards Smart cards Electronic cash (digital cash) Electronic wallets.
CS CS 5150 Software Engineering Lecture 18 Security.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Types of Electronic Infection
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Chapter No 4 Query optimization and Data Integrity & Security.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Topic 5: Basic Security.
Network Security Lecture 27 Presented by: Dr. Munam Ali Shah.
1 Database and Application Security S. Sudarshan Computer Science and Engg. Dept I.I.T. Bombay.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Chap1: Is there a Security Problem in Computing?.
Security & Privacy. Learning Objectives Explain the importance of varying the access allowed to database elements at different times and for different.
Database security Diego Abella. Database security Global connection increase database security problems. Database security is the system, processes, and.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Distributed Systems Ryan Chris Van Kevin. Kinds of Systems Distributed Operating System –Offers Transparent View of Network –Controls multiprocessors.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Chapter 40 Internet Security.
CAN A DATABASE REALLY BE SECURE?
Answer the questions to reveal the blocks and guess the picture.
Message Digest Cryptographic checksum One-way function Relevance
INFORMATION SYSTEMS SECURITY and CONTROL
Security.
Intrusion.
Operating System Concepts
Security.
Mohammad Alauthman Computer Security Mohammad Alauthman
Presentation transcript:

DB Security, Nov 11, Database Security S. Sudarshan Computer Science and Engg. Dept I.I.T. Bombay

DB Security, Nov 11, Database Security Database Security - protection from malicious attempts to steal (view) or modify data.

DB Security, Nov 11, Importance of Data in Databases Bank/Demat accounts Salary Income tax data Credit card University admissions, marks/grades

DB Security, Nov 11, Levels of Data Security Human level: Corrupt/careless User Network/User Interface Database application program Database system Operating System Physical level

DB Security, Nov 11, Levels of Security Outside of Database Physical level Traditional lock-and-key security Protection from floods, fire, etc. Remote backup for disaster recovery Operating system level Operating system administrators (also known as super-users) can do anything they want to the database! Good operating system level security is required Windows viruses allow intruders to become “super- users”!

DB Security, Nov 11, Security (Cont.) Network level: must use encryption to prevent Eavesdropping: unauthorized reading of messages Masquerading:  pretending to be an authorized user or legitimate site, or  sending messages supposedly from authorized users

DB Security, Nov 11, Security at the Database/Application Program Authentication and authorization mechanisms to allow specific users access only to required data Authentication: who are you? Prove it! Authorization: what you are allowed to do

DB Security, Nov 11, Database vs. Application Application authenticates/authorizes users Application itself authenticates itself to database Database password Database Application Program

DB Security, Nov 11, User Authentication Password Most users abuse passwords. For e.g.  Easy to guess password  Share passwords with others Smartcards Need smartcard + a PIN or password Bill Gates

DB Security, Nov 11, Authorization Different authorizations for different users Accounts clerk vs. Accounts manager vs. End users

DB Security, Nov 11, Authorization Forms of authorization on (parts of) the database: Read authorization - allows reading, but not modification of data. Insert authorization - allows insertion of new data, but not modification of existing data. Update authorization - allows modification, but not deletion of data. Delete authorization - allows deletion of data

DB Security, Nov 11, Application Authorization Applications authenticate end users and decide what interfaces to give to whom Screen level authorization Central authentication systems allow users to be authenticated centrally LDAP often used for this Single sign-on: authenticate once, and access multiple applications without fresh authentication Microsoft passport, PubCookie etc

DB Security, Nov 11, Application Security Applications are often the biggest source of insecurity Poor coding of application may allow unauthorized access Application code may be very big, easy to make mistakes and leave security holes

DB Security, Nov 11, Insider vs. Outsider Attack Most people worry about outsider attack Most organizations are also highly vulnerable to insider attacks E.g. Indira Gandhi Luckily most programmers are honest souls!

DB Security, Nov 11, Almighty Application Programmers/Administrators Have password to database, can update anything! Digital signatures can help in some situations  E.g. low update rate data such as land records, birth/death data More people with access  more danger Application program has database password Anyone who manages to seize control of the application programme can do anything to the database.

DB Security, Nov 11, Dealing with Insider Attacks Audit trails: record of all (update) activity on the database: who did what, when Database needs to ensure these can’t be turned off, and turned on again after doing damage Supported by most commercial database systems Sys-admin should periodically review audit trail Don’t give database password to development team, keep it with a few system administrators Multiple copies for security

DB Security, Nov 11, Anecdotes SQL/Slammer Attacked SQLServer, brought our network down, luckily no data lost/stolen Database security workshop at IIT Bombay Careless coding exposed database password to outside world Academic office application at IIT Bombay Working on “check-sum” technique to ensure grades/marks are not changed Database will accept requests only from machine running application programme Other security loopholes no doubt exist

DB Security, Nov 11, Summary Data security is critical Requires security at different levels Several technical solutions But human training is essential

DB Security, Nov 11, Acknowledgments Pictures in this talk stolen from various web sources!

DB Security, Nov 11, Extra Slides

DB Security, Nov 11, Network Security All information must be encrypted to prevent eavesdropping Public/private key encryption widely used Handled by secure http - Must prevent person-in-the-middle attacks E.g. someone impersonates seller or bank/credit card company and fools buyer into revealing information  Encrypting messages alone doesn’t solve this problem  More on this in next slide

DB Security, Nov 11, Site Authentication Digital certificates are used to prevent impersonation/man-in-the middle attack Certification agency creates digital certificate by encrypting, e.g., site’s public key using its own private key  Verifies site identity by external means first! Site sends certificate to buyer Customer uses public key of certification agency to decrypt certificate and find sites public key  Man-in-the-middle cannot send fake public key Sites public key used for setting up secure communication

DB Security, Nov 11, Secure Payment Three-way communication between seller, buyer and credit-card company to make payment Credit card company credits amount to seller Credit card company consolidates all payments from a buyer and collects them together  E.g. via buyer’s bank through physical/electronic check payment Several secure payment protocols E.g. Secure Electronic Transaction (SET)