Academic Year 2014 Spring Academic Year 2014 Spring.

Slides:



Advertisements
Similar presentations
Operating System Security
Advertisements

MSc IT UFCE8K-15-M Data Management Prakash Chatterjee Room 2Q18
Chapter 23 Database Security and Authorization Copyright © 2004 Pearson Education, Inc.
Database Administration, Integrity and Performance.
Jan. 2014Dr. Yangjun Chen ACS Database security and authorization (Ch. 22, 3 rd ed. – Ch. 23, 4 th ed. – Ch. 24, 6 th )
Database Security by Muhammad Waheed Aslam SIS Project Leader ITC/KFUPM.
Chapter 11 Database Security: An Introduction Copyright © 2004 Pearson Education, Inc.
Security and Integrity
Database Management System
Data security 1. 2 Overview  generalities  discretionary access control  mandatory access control  data encryption.
Database Security - Farkas 1 Database Security and Privacy.
Monday, 08 June 2015Dr. Mohamed Osman1 What is Database Administration A high level function (technical Function) that is responsible for ► physical DB.
Security Fall 2006McFadyen ACS How do we protect the database from unauthorized access? Who can see employee salaries, student grades, … ? Who can.
Chapter 2 Access Control Fundamentals. Chapter Overview Protection Systems Mandatory Protection Systems Reference Monitors Definition of a Secure Operating.
CSCI 5707: Database Security Pusheng Zhang University of Minnesota March 2, 2004.
Concepts of Database Management Sixth Edition
Chapter 8 Security Transparencies © Pearson Education Limited 1995, 2005.
IS 4420 Database Fundamentals Chapter 12: Data and Database Administration Leon Chen.
Database Features Lecture 2. Desirable features in an information system Integrity Referential integrity Data independence Controlled redundancy Security.
View n A single table derived from other tables which can be a base table or previously defined views n Virtual table: doesn’t exist physically n Limitation.
Lecture 7 Access Control
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 4 “Overview”.
ORACLE DATABASE SECURITY
Chapter 7 Database Auditing Models
10/5/1999Database Management -- R. Larson Data Administration and Database Administration University of California, Berkeley School of Information Management.
Security and Integrity
Database Management System Lecture 2 Introduction to Database management.
Effectively Integrating Information Technology (IT) Security into the Acquisition Process Section 5: Security Controls.
ISOM MIS3150 Data and Info Mgmt Database Security Arijit Sengupta.
Chapter 6: Integrity and Security Thomas Nikl 19 October, 2004 CS157B.
Lecture 2 The Relational Model. Objectives Terminology of relational model. How tables are used to represent data. Connection between mathematical relations.
Chapter 4 The Relational Model 3: Advanced Topics Concepts of Database Management Seventh Edition.
Database Technical Session By: Prof. Adarsh Patel.
Database Security John Ortiz. Lecture 23Database Security2 Secure Passwords  Two main requirements for choosing a secure password:  1) MUST be easy.
Switch off your Mobiles Phones or Change Profile to Silent Mode.
CODD’s 12 RULES OF RELATIONAL DATABASE
SEC835 Practical aspects of security implementation Part 1.
Lecture 7 Integrity & Veracity UFCE8K-15-M: Data Management.
CSCE 201 Introduction to Information Security Fall 2010 Access Control.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models.
Discovering Computers Fundamentals Fifth Edition Chapter 9 Database Management.
Chapter 14 Data and Database Administration. McGraw-Hill/Irwin © 2004 The McGraw-Hill Companies, Inc. All rights reserved. Outline Organizational context.
Controlling User Access. Objectives After completing this lesson, you should be able to do the following: Create users Create roles to ease setup and.
Metadata, Security, and the DBA Chapter 8.1 V3.0 Napier University Dr Gordon Russell.
Chapter 11 Database Security: An Introduction Copyright © 2004 Pearson Education, Inc.
G53SEC 1 Access Control principals, objects and their operations.
Prepared By Prepared By : VINAY ALEXANDER ( विनय अलेक्सजेंड़र ) PGT(CS),KV JHAGRAKHAND.
14.1/21 Part 5: protection and security Protection mechanisms control access to a system by limiting the types of file access permitted to users. In addition,
Chapter 11 Database Security: An Introduction Copyright © 2004 Pearson Education, Inc.
Database Security Chapter Terms Security – all the processes and mechanisms by which computer-based equipment, information and services are.
Chapter 9 Database Security and Authorization Copyright © 2004 Pearson Education, Inc.
Computer Security: Principles and Practice
Context Aware RBAC Model For Wearable Devices And NoSQL Databases Amit Bansal Siddharth Pathak Vijendra Rana Vishal Shah Guided By: Dr. Csilla Farkas Associate.
Database Security. Introduction to Database Security Issues (1) Threats to databases Loss of integrity Loss of availability Loss of confidentiality To.
Database Security and Authorization Introduction to DB Security Access Controls Database Security and the DBA Discretionary Access Control The privileges.
Database Security Database System Implementation CSE 507 Some slides adapted from Navathe et. Al.
Access Controls Mandatory Access Control by Sean Dalton December 5 th 2008.
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
SQL Basics Review Reviewing what we’ve learned so far…….
22 feb What is Access Control? Access control is the heart of security Definitions: * The ability to allow only authorized users, programs or.
Chapter 5 : DataBase Security Lecture #1-Week 8 Dr.Khalid Dr. Mohannad Information Security CIT460 Information Security Dr.Khalid Dr. Mohannad 1.
Database System Implementation CSE 507
Access Control Model SAM-5.
Security Unit 5.2b Dr Gordon Russell, Napier University
Database Security and Authorization
OS Access Control Mauricio Sifontes.
DATABASE SECURITY For CSCL (BIM).
Access Control.
Access Control What’s New?
INTRODUCTION A Database system is basically a computer based record keeping system. The collection of data, usually referred to as the database, contains.
Presentation transcript:

Academic Year 2014 Spring Academic Year 2014 Spring

MODULE CC3005NI: Advanced Database Systems “DATABASE SECURITY” Academic Year 2014 Spring Academic Year 2014 Spring

 Widespread use of multi user database systems has increased productivity and efficiency for many organisations. However, it also exposes these organisations to greater vulnerability of the databases being misused.  The overall objective of database security is to protect data in the databases against unauthorised use, disclosure, alteration or destruction. Objective of Database Security:

 Different Concepts  Database Security o How to protect data from unauthorised use Only authorised users are permitted to use the database They do so under the access control imposed by the system  Database Integrity o How to ensure accuracy or validity of data Entity integrity, domain integrity, referential integrity rules Other user defined, application specific integrity rules Database Security vs. Integrity:

 Common Features  The database systems must be aware of constraints that users must not violate  These constraints must be specified by DBA in some suitable language  These constraints must be maintained in the system catalogue  The DBMS must monitor user operations in order to ensure that the constraints are properly enforced. Database Security vs. Integrity:

General Concerns  Legal, Social Ethical Issues  Whether a person has a legal right to access the information  Data Protection Act to ensure proper control of access to personal/confidential information  Policy Issues  What is the company scheme to protect its database Issued to be Considered:

 Hardware Issues  Physical security of the computer system and the reliability of the hardware  Software Issues  Reliability of Operating systems used Issued to be Considered:

Database specific Concerns  Unauthorised used of the database, either deliberately or accidentally  Unauthorised users attempting access to the database  Authorised users attempting unauthorised operations on certain data objects  Data encryption provides additional protection for sensitive data during transmission Issued to be Considered:

 In the context of database security, an access request / access right contains three aspects  User – who is requesting access  Operation – what operation is requested (select, insert, delete, update)  Data object – what data object is requested  Typically, users will have different access rights on various data objects in a database Access Request:

 Depending on the security schemes used, the scope of data objects ranges from:  Entire database  A set of relations  A set of tuples / columns  A particular attribute value within a tuple Granularity of Data Objects:

 Authorisation subsystem  Provided by database security mechanism to check and verify user’s identity for ensuring the security of the database against unauthorised access  Before accessing database a user must  Identify themselves  Authenticate their identification  Additional identification & authentication may further be required during session e. g. Cash point, oracle log in, finger prints retina scans etc. Identification and Authentication:

 Two main approaches to database security, depending on the type of objects (user or data) through which the access control is exercised  Discretionary Access Control o Control is exercised by assigning users different access rights (privileges / authorities) on different data objects  Mandatory Access Control o Control is exercised by assigning data objects different classification levels and assigning user different clearance levels Two Main Approaches:

 Discretionary Access Control (DAC) provide flexibility in allowing access to database  DACs protect unstructured work in progress  DAC objects contain information protected by Mandatory Access Control (MAC)  DAC also includes privileges associated with  DAC labels are derived from MAC labels  Access decisions in DAC do not take into account user’s role or program’s functionality Discretionary Access Control:

 There are various methods used in Discretionary Access Control like;  Access Matrix use table(s) to specify access privilege for different users on different data objects  Security Rules use a suitable language to specify user’s access rights Discretionary Access Control:

Discretionary Access Control - Access Matrix:

 An Access Matrix may contain many empty cells, so its information could be stored as user profiles or object profiles User Profiles (from the example) User Atable1:select; table1, attr2:update; table2:select User Btable1,attr1:select; table2:select; table2, attr1:update Object Profiles (from the example) Table 1userA:select Table 2userA:select; userB:select; userD:insert Discretionary Access Control - Access Matrix:

 Supported by SQL standard and facilitated by two statements GRANT and REVOKE  GRANT – Definition of Security Rules GRANT operation ON data object TO user(s) Violation response Discretionary Access Control - Security Rules:

Some examples  Value independent rules  GRANTONTO  GRANT SELECT ON TABLE Employee TO Ram, Shyam, Hari;  Value dependent rules  GRANTTO  GRANT SELECT ON TABLE Supplier where Supplier-city = ‘London’ TO Ganesh;  Context dependent rules  GRANT TO  GRANT UPDATE ON TABLE Product WHEN Day() in (‘Mon’, ‘Tue’, ‘Wed’, ‘Thu’, ‘Fri’) AND Now() >= Time ‘09:00:00’ AND NOW() >= Time ‘17:00:00’ TO Order-Dept; Discretionary Access Control - Security Rules:

 Violation Response GRANTONTO e.g. GRANT SELECT ON TABLE Employee TO Ram ON attempted violation Reject;  REVOKE – Deletion of Security Rules  REVOKE SELECT ON TABLE Employee TO Ram;  REVOKE UPDATE ON TABLE Employee TO Ram;  REVOKE DELETE ON TABLE Employee TO Ram;  REVOKE INSERT ON TABLE Employee TO Ram; or,  REVOKE SELECT, INSERT ON TABLE Employee TO Ram;  REVOKE ALL ON TABLE Employee TO Ram; Discretionary Access Control - Security Rules:

 Why Mandatory Access Control (MAC) is needed?  Enhances security of database  Gives consistent view of operations  General rule is all allowed accesses are provided by MAC  Access that is not part of MAC is Discretionary Access Control (DAC)  MAC adds to complexity Mandatory Access Control:

 MAC is used for type enforcement (TE) as is done in programming languages  MAC protects organizational data  MAC deals with database queries, reports and statistical studies  Data protection for a class is determined by its label  Relabel privileges follow a set of rules since label makes a difference in access Mandatory Access Control:

 Relabels are used for declassification of existing objects or for approvability  Relabels do not allow changing or observing the content  Information flow is specified between MAC labels  Information flow restrictions are essential for maintaining confidentiality Mandatory Access Control:

 Examples:  Official reports (DAC permission allows DAC copy)  Statistical analysis of medical records (providers and researchers have different view of same data)  Accounting records (updated by structured programs and accessed by unstructured programs) Mandatory Access Control:

 Key Points of the scheme  Each data objects is assigned a classification level  Each user is assigned a clearance level o Users with a clearance level I can only access data objects whose classification level j is lower than or equal to i. o The classification and clearance levels have the same number of possibilities o These levels form a strict ordering hierarchy Mandatory Control:

Example Mandatory Control – Security Classification Method:

Questions:  According to the information given in the tables:  What is a manager’s access right? o Select tables 1 and 2; o Update table 2 and attributes 1 and 2 of table 1 o Delete table 2 and attribute 2 of table 1  Is a manager allowed to delete a data item from the attribute 1 of Table 1? o No  Who can select attribute 1 of Table 2? o Everyone Mandatory Control – Security Classification Method:

 Discretionary Access Control  More widely used due to its flexibility  Supported by current SQL standard  Mandatory Access Control  With more rigid structure  Suitable for organisations with strict requirement for security and hierarchy (e.g. Government, defence systems, for sensitive / classified information) Comparison:

Thank you!!! Questions are WELCOME Academic Year 2014 Spring Academic Year 2014 Spring