CSC271 Database Systems Lecture # 31. Summary: Previous Lecture  Remaining steps/activities in  Physical database design methodology  Monitoring and.

Slides:



Advertisements
Similar presentations
Chapter 23 Database Security and Authorization Copyright © 2004 Pearson Education, Inc.
Advertisements

CSC271 Database Systems Lecture # 32.
II.I Selected Database Issues: 1 - SecuritySlide 1/20 II. Selected Database Issues Part 1: Security Lecture 2 Lecturer: Chris Clack 3C13/D6.
Database Administration and Security Transparencies 1.
Lecture 5. Some solutions on the written examination: Primary key: Unique identifier for each row in a table. Not allowed to be null. Cascade update:
Security Dale-Marie Wilson, Ph.D.. Why Database Security? Data Valuable resource Must be strictly controlled and managed Corporate resource Have strategic.
Concurrency Control. R/RR/W W/W User 2 ReadWrite User 1 Read Write R/W: Inconsistent Read problem. W/W: Lost Update problem.
Transaction Management and Concurrency Control
1 Minggu 7, Pertemuan 13 Security Matakuliah: T0206-Sistem Basisdata Tahun: 2005 Versi: 1.0/0.0.
1 ACID Properties of Transactions Chapter Transactions Many enterprises use databases to store information about their state –e.g., Balances of.
Transaction Management
1 Transaction Management Database recovery Concurrency control.
Chapter 8 Security Transparencies © Pearson Education Limited 1995, 2005.
Chapter 16 Security. 2 Chapter 16 - Objectives u The scope of database security. u Why database security is a serious concern for an organization. u The.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 10 Transaction Management and Concurrency Control.
Transaction Management and Concurrency Control
Chapter 19 Security.
Transaction. A transaction is an event which occurs on the database. Generally a transaction reads a value from the database or writes a value to the.
Chapter 19 Security Transparencies © Pearson Education Limited 1995, 2005.
Transactions and Recovery
Academic Year 2014 Spring. MODULE CC3005NI: Advanced Database Systems “DATABASE RECOVERY” (PART – 1) Academic Year 2014 Spring.
DATABASE SECURITY By Oscar Suciadi CS 157B Prof. Sin-Min Lee.
DATABASE ADMINISTRATION AND SECURITY
Chapter 19 Security Transparencies. 2 Chapter 19 - Objectives Scope of database security. Why database security is a serious concern for an organization.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Chapter 19 Security Integrity Security Control –computer-based –non-computer-based PC security DBMS and Web security Risk Analysis Data protection and.
II.I Selected Database Issues: 1 - SecuritySlide 1/24 II. Selected Database Issues Part 1: Security Lecture 1 Lecturer: Chris Clack 3C13/D6.
© Pearson Education Limited, Chapter 5 Database Administration and Security Transparencies.
D ATABASE A DMINISTRATION L ECTURE N O 4 Muhammad Abrar.
ISOM MIS3150 Data and Info Mgmt Database Security Arijit Sengupta.
Managing Multi-User Databases AIMS 3710 R. Nakatsu.
DBSQL 7-1 Copyright © Genetic Computer School 2009 Chapter 7 Transaction Management, Database Security and Recovery.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
1 Transactions BUAD/American University Transactions.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
1 Database Systems CS204 Lecture 21 Transaction Processing I Asma Ahmad FAST-NU April 7, 2011.
Security and Transaction Nhi Tran CS 157B - Dr. Lee Fall, 2003.
BIS Database Systems School of Management, Business Information Systems, Assumption University A.Thanop Somprasong Chapter # 10 Transaction Management.
The protection of the DB against intentional or unintentional threats using computer-based or non- computer-based controls. Database Security – Part 2.
Switch off your Mobiles Phones or Change Profile to Silent Mode.
D ATABASE A DMINISTRATION L ECTURE N O 3 Muhammad Abrar.
Section 3 Database Security. 3-2 CA306 Introduction Section Content 3.1 Security Overview 3.2 Security Controls 3.3 Views 3.4 Security in Oracle 3.5 Web.
Chapter 1 Introduction to Databases. 1-2 Chapter Outline   Common uses of database systems   Meaning of basic terms   Database Applications  
CSCI 3140 Module 6 – Database Security Theodore Chiasson Dalhousie University.
11/4/2012ISC239 Isabelle Bichindaritz1 Database Security.
Sekolah Tinggi Ilmu Statistik (STIS) 1 Dr. Said Mirza Pahlevi, M.Eng.
Database Security Tampere University of Technology, Introduction to Databases. Oleg Esin.
II.I Selected Database Issues: 2 - Transaction ManagementSlide 1/20 1 II. Selected Database Issues Part 2: Transaction Management Lecture 4 Lecturer: Chris.
Database Systems Recovery & Concurrency Lecture # 20 1 st April, 2011.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
Transaction Management Transparencies. ©Pearson Education 2009 Chapter 14 - Objectives Function and importance of transactions. Properties of transactions.
10 1 Chapter 10 - A Transaction Management Database Systems: Design, Implementation, and Management, Rob and Coronel.
CREATE THE DIFFERENCE Back ups and Recovery. CREATE THE DIFFERENCE Aims This lecture aims to cover –Back ups –Transaction logging –Security threats.
1 Chapter 7 Data Protection Data Recovery As with almost all complex forms of computer hardware and software, there is always the possibility.
Web Database Security Session 12 & 13 Matakuliah: Web Database Tahun: 2008.
Chapter 13 Managing Transactions and Concurrency Database Principles: Fundamentals of Design, Implementation, and Management Tenth Edition.
Database Security Threats. Database An essential corporate resource Data is a valuable resource Must be strictly controlled, managed and secured May have.
SYSTEMS IMPLEMENTATION TECHNIQUES TRANSACTION PROCESSING DATABASE RECOVERY DATABASE SECURITY CONCURRENCY CONTROL.
Copyright © 2016 Pearson Education, Inc. CHAPTER 12: DATA AND DATABASE ADMINISTRATION Modern Database Management 12 th Edition Jeff Hoffer, Ramesh Venkataraman,
Managing Multi-User Databases
Security and Administration Transparencies
Transaction Management and Concurrency Control
By Oscar Suciadi CS 157B Prof. Sin-Min Lee
By Oscar Suciadi CS 157B Prof. Sin-Min Lee
Database Security &Threats
Database Security Transactions
By Oscar Suciadi CS 157B Prof. Sin-Min Lee
Transaction management
Implementation of security elements in database
Presentation transcript:

CSC271 Database Systems Lecture # 31

Summary: Previous Lecture  Remaining steps/activities in  Physical database design methodology  Monitoring and performance tuning

Security Chapter 19

Database Security  Data is a valuable resource that must be strictly controlled and managed, as with any corporate resource  Part or all of the corporate data may have strategic importance and therefore needs to be kept secure and confidential  Mechanisms that protect the database against intentional or accidental threats

Database Security  Security considerations do not only apply to the data held in a database: breaches of security may affect other parts of the system, which may in turn affect the database  Database security encompasses  Hardware  Software  People  Data

Database Security  Database security involves measures to avoid:  Theft and fraud  Loss of confidentiality (secrecy)  Loss of privacy  Loss of integrity  Loss of availability

Database Security  Threat  Any situation or event, whether intentional or unintentional, that will adversely affect a system and consequently an organization

Threats to Computer Systems

Typical Multi-user Computer Environment

Countermeasures: Computer-Based Controls  Concerned with physical controls to administrative procedures and includes:  Authorization  Access controls  Views  Backup and recovery  Integrity  Encryption  RAID technology

Countermeasures: Computer-Based Controls  Authorization  The granting of a right or privilege that enables a subject to have legitimate access to a system or a system’s object  Authentication  A mechanism that determines whether a user is who he or she claims to be

Countermeasures: Computer-Based Controls  Access controls  Based on the granting and revoking of privileges  Privilege  A privilege allows a user to create or access (that is read, write, or modify) some database object (such as a relation, view, and index) or to run certain DBMS utilities  Approaches used by DBMS  Discretionary Access Control (DAC)  Mandatory Access Control (MAC)

Countermeasures: Computer-Based Controls  Discretionary Access Control (DAC)  Provided by most DBMSs  SQL standard supports through GRANT/REVOKE  Certain weaknesses  Mandatory Access Control (MAC)  System-wide policies that cannot be changed by individual users  Each database object is assigned a security class and each user is assigned a clearance for a security class, and rules are imposed on reading and writing of database objects by users  The SQL standard does not include support for MAC  Popular Bell-LaPudula model based on MAC

Countermeasures: Computer-Based Controls  Views  A view is the dynamic result of one or more relational operations operating on the base relations to produce another relation  A view is a virtual relation that does not actually exist in the database, but is produced upon request by a particular user, at the time of request  Powerful and flexible security mechanism by hiding parts of the data from certain users  Access to views, not to base relations

Countermeasures: Computer-Based Controls  Backup and Recovery  The process of periodically taking a copy of the database and log file (and possibly programs) on to offline storage media  Journaling  The process of keeping and maintaining a log file (or journal) of all changes made to the database to enable recovery to be undertaken effectively in the event of a failure

Countermeasures: Computer-Based Controls  Integrity  Prevents data from becoming invalid, and hence giving misleading or incorrect results  Encryption  The encoding of the data by a special algorithm that renders the data unreadable by any program without the decryption key  Symmetric encryption  Same key, DES, PGP etc.  Asymmetric encryption  Different keys, RSA etc.

Countermeasures: Computer-Based Controls  RAID (Redundant Array of Independent Disks) Technology  Hardware that the DBMS is running on must be fault- tolerant, meaning that the DBMS should continue to operate even if one of the hardware components fails  The main hardware components that should be fault-tolerant include disk drives, disk controllers, CPU, power supplies, and cooling fans  Disk drives are the most vulnerable components with the shortest times between failure of any of the hardware components

Countermeasures: Computer-Based Controls  RAID (Redundant Array of Independent Disks) Technology  One solution is to provide a large disk array comprising an arrangement of several independent disks that are organized to improve reliability (through mirror and error-correction scheme) and at the same time increase performance (through data stripping)

DBMSs and Web Security  Internet communication relies on TCP/IP as the underlying protocol  However, TCP/IP and HTTP were not designed with security in mind  Without special software, all Internet traffic travels ‘in the clear’ and anyone who monitors traffic can read it

DBMSs and Web Security  The challenge is to transmit and receive information over the Internet while ensuring that:  It is inaccessible to anyone but the sender and receiver (privacy)  It has not been changed during transmission (integrity)  The receiver can be sure it came from the sender (authenticity)  The sender can be sure the receiver is genuine (non- fabrication)  The sender cannot deny he or she sent it (non-repudiation)

DBMSs and Web Security  Measures include:  Proxy servers  Firewalls  Message digest algorithms and digital signatures  Digital certificates  Kerberos  Secure sockets layer (SSL) and Secure HTTP (S-HTTP)  Secure Electronic Transactions (SET) and Secure Transaction Technology (SST)  Java security  ActiveX security

A SET Transaction

Transaction Management Chapter 20

DBMS Functions  DBMS functions (transaction support, concurrency control services, recovery services) ensure:  Database is reliable and remains in a consistent state even in the presence of failures of both hardware and software components, and when multiple users are accessing the database  Both concurrency control and recovery are mutually dependent, and required to protect database from data inconsistencies and data loss

Transaction  An action, or series of actions, carried out by a single user or application program, which reads or updates the contents of the database  A transaction is a logical unit of work on the database  It may be an entire program, a part of a program, or a single command (e.g. the SQL command INSERT or UPDATE), and it may involve any number of operations on the database  In the database context, the execution of an application program can be thought of as one or more transactions with non-database processing taking place in between

Transaction

 A transaction should always transform the database from one consistent state to another, although we accept that consistency may be violated while the transaction is in progress  For example, there may be some moment when one tuple of PropertyForRent contains the new newStaffNo value and another still contains the old one, x  However, at the end of the transaction, all necessary tuples should have the new newStaffNo value

Transaction  A transaction can have one of two outcomes  If the transaction completes successfully, the transaction is said to have committed and the database reaches a new consistent state  A committed transaction cannot be aborted  If we decide that the committed transaction was a mistake, we must perform another compensating transaction to reverse its effects e.g. increasing the salary of a staff member etc.

Transaction  If the transaction does not execute successfully, the transaction is aborted  If a transaction is aborted, the database must be restored to the consistent state it was in before the transaction started  Such a transaction is rolled back or undone  However, an aborted transaction that is rolled back can be restarted later and, depending on the cause of the failure, may successfully execute and commit at that time

Transaction  The DBMS has no inherent way of knowing which updates are grouped together to form a single logical transaction  DBMS must therefore provide a method to allow the user to indicate the boundaries of a transaction  The keywords BEGIN TRANSACTION, COMMIT, and ROLLBACK (or their equivalent) are available in many data manipulation languages to delimit transactions  If these delimiters are not used, the entire program is usually regarded as a single transaction, with the DBMS automatically performing a COMMIT when the program terminates correctly and a ROLLBACK if it does not

Transaction

Properties of Transaction  The four basic, or so-called ACID, properties of a transaction are:  Atomicity  ‘All or nothing’ property  A transaction is an indivisible unit that is either performed in its entirety or is not performed at all  Responsibility of recovery subsystem of DBMS  Consistency  A transaction must transform the database from one consistent state to another consistent state  Responsibility of both DBMS and application developers

Properties of Transaction  The four basic, or so-called ACID, properties of a transaction are:  Isolation  Transactions execute independently of one another  In other words, the partial effects of incomplete transactions should not be visible to other transactions  Responsibility of the concurrency control subsystem  Durability  The effects of a successfully completed (committed) transaction are permanently recorded in the database and must not be lost because of a subsequent failure  Responsibility of the recovery subsystem

Summary  Database security  Countermeasure: computer-based controls  DBMSs and web security  Transaction management  Transaction  Properties of transaction

References  All the material (slides, diagrams etc.) presented in this lecture is taken (with modifications) from the Pearson Education website : 