DBA Chapter 4 Advanced Concepts in Database
DBA Chapter 4 Advanced Concepts in Database
Likewise, even though there are various threats that could be categorized
in this group, intentional misuse could be:
¾ Unauthorized reading of data
¾ Unauthorized modification of data or
• Physical control
Examples of threats:
9 Using another persons’ means of access
9 Unauthorized amendment/modification or copying of data
9 Program alteration
9 Inadequate policies and procedures that allow a mix of
confidential and normal out put
9 Wire-tapping
9 Illegal entry by hacker
9 Blackmail
9 Creating ‘trapdoor’ into system
9 Theft of data, programs, and equipment
9 Failure of security mechanisms, giving greater access than normal
9 Staff shortages or strikes
9 Inadequate staff training
9 Viewing and disclosing unauthorized data
9 Electronic interference and radiation
9 Data corruption owing to power loss or surge
9 Fire (electrical fault, lightning strike, arson), flood, bomb
9 Physical damage to equipment
9 Breaking cables or disconnection of cables
9 Introduction of viruses
These policies
should be known by the system: should be encoded in the system
should be remembered: should be saved somewhere (the catalogue)
Authorization
The granting of a right or privilege that enables a subject to have
legitimate access to a system or a system’s object
Authorization controls can be built into the software, and govern
not only what system or object a specified user can access, but also
what the user may do with it
Authorization controls are sometimes referred to as access controls
The process of authorization involves authentication of subjects (i.e.
a user or program) requesting access to objects (i.e. a database
table, view, procedure, trigger, or any other object that can be
created within the system)
Views
A view is the dynamic result of one or more relational operations
operation on the base relations to produce another relation
A view is a virtual relation that does not actually exist in the
database, but is produced upon request by a particular user
The view mechanism provides a powerful and flexible security
mechanism by hiding parts of the database from certain users
Using a view is more restrictive than simply having certain
privileges granted to a user on the base relation(s)
Integrity
Integrity constraints contribute to maintaining a secure database
system by preventing data from becoming invalid and hence giving
misleading or incorrect results
Domain Integrity
Entity integrity
Referential integrity Key constraints
Encryption
The encoding of the data by a special algorithm that renders
the data unreadable by any program without the decryption
key
If a database system holds particularly sensitive data, it may
be deemed necessary to encode it as a precaution against
possible external threats or attempts to access it
The DBMS can access data after decoding it, although there is
a degradation in performance because of the time taken to
decode it
Encryption also protects data transmitted over
communication lines
To transmit data securely over insecure networks requires the
use of a Cryptosystem, which includes:
Authentication
¾ All users of the database will have different access levels and
permission for different data objects, and authentication is the
process of checking whether the user is the one with the privilege for
the access level.
¾ Each user is given a unique identifier, which is used by the
operating system to determine who they are
¾ Thus the system will check whether the user with a specific
username and password is trying to use the resource.
¾ Associated with each identifier is a password, chosen by the user
and known to the operation system, which must be supplied to
enable the operating system to authenticate who the user claims to
be
Any database access request will have the following three major
components
1. Requested Operation: what kind of operation is requested
by a specific query?
2. Requested Object: on which resource or data of the database
is the operation sought to be applied?
3. Requesting User: who is the user requesting the operation on
the specified object?
The database should be able to check for all the three components before
processing any request. The checking is performed by the security
subsystem of the DBMS.
2. Insert Authorization: the user with this privilege is allowed only to insert
new records or items to the data object.
4. Delete Authorization: users with this privilege are only allowed to delete
a record and not anything else.
Different users, depending on the power of the user, can have one or the
combination of the above forms of authorization on different data objects.
Role of DBA in Database Security
The database administrator is responsible to make the database to be as secure as
possible. For this the DBA should have the most powerful privilege than every
other user. The DBA provides capability for database users while accessing the
content of the database.
Centralized DB Distributed DB
Concepts in DDBMS
Replication: System maintains multiple copies of data, stored in
different sites, for faster retrieval and fault tolerance.
Advantages of DDBMS
1. Data sharing and distributed control:
¾ User at one site may be able access data that is available at another site.
¾ Each site can retain some degree of control over local data
¾ We will have local as well as global database administrator
Disadvantages of DDBMS
1. Software development cost
2. Greater potential for bugs (parallel processing may endanger
correctness)
3. Increased processing overhead (due to communication jargons) 4.
Communication problems
3. Data warehousing
Data warehouse is an integrated, subject-oriented, time-variant,
non-volatile database that provides support for decision making.