Managing Data Security: Data and Database Administration
Managing Data Security: Data and Database Administration
Managing Data Security: Data and Database Administration
Threats
Accidental losses, including human error, software, and hardware-caused breaches
Theft and fraud
Loss of privacy or confidentially
Loss of data integrity
Loss of availability
Establishing Client/Server Security
Server Security
Network Security
Server Security
Network Security
Securing Client/Server systems includes securing the network between client and server
consists of the provisions and policies adopted by a network administrator to prevent and
monitor unauthorized access, misuse, modification, or denial of a computer network and networkaccessible resources
Web Security
Web Privacy
Web Security
Involving browser security but also network security on a more general level as it applies to other
applications or operating systems on a whole. Its objective is to establish rules and measures to
use against attacks over the Internet.
Restrict the to the Web server, keeping a minimum number of ports open.
Remove any unneeded programs that load automatically when setting up the server.
Web Privacy
Involves the right or mandate of personal privacy concerning the storing, repurposing, provision
to third-parties, and displaying of information pertaining to oneself via the Internet
Which information will be shared with others and who are those others ?
Can users make changes in the way their data will be used by a collector ?
Domains, assertions, checks, and other integrity controls defined as database objects, which are
enforced by the DBMS during database querying and updating
Authorization Rules, which identify users and restrict the actions they may take against a
database
User Defined Procedures, which define additional constraints or limitations in using a database
Authentication schemes, which positively identify persons attempting to gain access to a database
Back up, journaling, and checkpointing, capabilities, which facilitate recovery procedures
Views
Integrity Control
Authorization Rules
Controls incorporated in the data management systems that restrict access to data and also restrict
the actions that people may take when they access data
User exits (or interfaces) that allow system designers to define their own security procedures n
addition to the authorization rules
Encryption
Is the process of encoding messages (or information) in such a way that eavesdroppers or hackers
cannot read it, but that authorized parties can
Authentication Schemes
Factors
1. Something the user knows, usually a password or personal identification number (PIN).
2. Something the user possesses, such as a card or token.
3. Some unique personal characteristic, such as a fingerprint or retinal scan.
Authentication Schemes
Authentication Schemes also called one factor, two factor or three factor authentication,
depending on how many of these factors are employed. Authentication become stronger in
proportion to the number of factors that are used
Password
The first line of defense is the use of password, which is one-factor authentication schemes.
Is a secret word or string of characters that is used for user authentication to prove identity, or
for access approval to gain access to a resource.
This scheme is much more secure than a simple passwords because it is quite difficult for an
unauthorized person to obtain both factors at the same time.
Smart Card
a credit card sized plastic card with an embedded microprocessor chip with the ability
to store, process, and output electronic data in a secure manner
Mediated Authentication
A third-party mediated authentication systems, which establish user authenticity through a trusted
authentication agent, such as Kerberos.
Kerberos
Developed at MIT
Kerberos works by providing a secret key (Kerberos Ticket) to a qualified user that can then be
embedded in any other network protocol
Adequate controls of personnel must be developed and followed, for the greatest threat to
business security is often internal or external
Maintenance Controls
An area of control that helps to maintain data quality and availability but that is often overlooked
is maintenance control.
Generally gives individuals the right to know what have been collected about them and to correct
any errors in those data