You are on page 1of 20

Database Administration and Security Transparencies

CMSC 127
1

Objectives

The distinction between data administration and database administration. The purpose and tasks associated with data administration and database administration. The scope of database security.
CMSC 127
2

Objectives

Why database security is a serious concern for an organization. The type of threats that can affect a database system. How to protect a computer system using computer-based controls.

CMSC 127

Data administration and database administration

Data Administrator (DA) and Database Administrator (DBA) are responsible for managing and controlling activities associated with corporate data and corporate database, respectively. DA is more concerned with early stages of lifecycle and DBA is more concerned with later stages. CMSC 127

Data administration

Management and control of corporate data, including:


database planning development and maintenance of standards, policies, and procedures conceptual and logical database design
CMSC 127
5

Data administration tasks

CMSC 127

Database administration

Management and control of physical realization of a database system, including:

physical database design and implementation setting security and integrity controls monitoring system performance reorganizing the database
CMSC 127
7

Database administration tasks

CMSC 127

Comparison of data and database administration

CMSC 127

Database security

Mechanisms that protect the database against intentional or accidental threats. Not only apply to the data held in a database. Breaches of security may affect other parts of the system, which may in turn affect the database.
CMSC 127
10

Database security

Includes hardware, software, people, and data. Growing importance of security is the increasing amounts of crucial corporate data being stored on computer.

CMSC 127

11

Database security

Outcomes to avoid:

theft and fraud loss of confidentiality (secrecy) loss of privacy loss of integrity loss of availability

CMSC 127

12

Database security

Threat

Any situation or event, whether intentional or unintentional, that may adversely affect a system and consequently the organization.

CMSC 127

13

Examples of threats and possible outcomes

CMSC 127

14

Summary of threats to computer systems

CMSC 127

15

Countermeasures computer-based controls


authorization views backup and recovery integrity encryption

CMSC 127

16

Countermeasures computer-based controls

Authorization

The granting of a right or privilege that enables a subject to have legitimate access to a database system or a database systems object. A mechanism that determines whether a user is, who he or she claims to CMSC 127 be.

Authentication

17

Countermeasures computer-based controls

View

A view is a virtual table that does not necessarily exist in the database but can be produced upon request by a particular user, at the time of request.

CMSC 127

18

Countermeasures computer-based controls

Backup

Process of periodically taking a copy of the database and log file (and possibly programs) onto offline storage media. Process of keeping and maintaining a log file (or journal) of all changes made to database to enable recovery to be undertaken effectively in the event of CMSC 127 19 failure.

Journaling

Countermeasures computer-based controls

Integrity

Prevents data from becoming invalid, and hence giving misleading or incorrect results. Encoding the data by a special algorithm that renders the data unreadable by any program without the decryption key.
CMSC 127
20

Encryption

You might also like