SlideShare a Scribd company logo
Database Security
What is Database Security
• Database security means protection of a database against unauthorized access, either
intentional or unintentional
• Database security requires the mechanisms, that protect a database against the intentional or
accidental threats
• Such mechanisms affect the hardware, software, people, and data components of a database
management system
• Database security protects against:
• Theft and fraud,
• Loss of confidentiality
• Loss of privacy
• Loss of integrity
• Loss of availability
Threats
• A threat is any situation or event, whether intentional or accidental, that may adversely effect
on a system Sample threats:
• Unauthorized amendment or copying of data
• Using another person's means of access
• Program alteration
• Wire tapping
• Illegal entry by hacker
• Blackmail
• Theft
• Failure of security mechanisms And the others
Countermeasures
• Countermeasures range from the physical controls to the administrative controls
• Security of Database Management System (DBMS) is as good as security of an
operating system running DBMS
• We consider the following computer-based security controls in a multiuser
environment
• Authorization and authentication
• Encryption
• Views
• Backup and recovery
• Integrity
Authorization and authentication
• Authorization means granting a right or a privilege to have a legitimate access
to a system or the resources operated by a system
• Authorization is usually built into the software and it determines what
system or object a user can access and what a user is allowed to do with it
• In a process of authorization a subject representing a user or a program
requests and obtains access to an object, that represent relational table,
relational view, etc
• A process of authorization requires authentication of a subject
Authorization and authentication
• Authentication is a mechanism, that determines whether a user is who he or she claims to be
• A system administrator is responsible for allowing the users to have access to a computer
system by creating the individual user accounts
• When an account is created a user is given a unique identifier and a user picks a password
associated with the identifier
• To reduce the total number of user names and passwords it is possible to authenticate user's
access to a database system through earlier authentication of access to an operating system
• Such solution is not as safe as two separate passwords and it is consistent with a principle
saying, that simplification of data access always reduces data security
Access Control
• A typical way to control access to a database system is based on granting and revoking
privileges
• A privilege allows a user to create, to drop, or to access in read or write mode some
database objects like relational tables, relational views, index, etc or to perform certain
operations
• The privileges are granted to a user to accomplish their task
• The excessive privileges can compromise security
• A user who creates a database object becomes an owner of the object and he/she
automatically gets all privileges on the object
• DBMS keeps track of all granted privileges to ensure that only selected user can access
and can perform operations on the database objects
Access Control
• There are two different strategies of access control:
• Discretionary Access Control (DAC) Mandatory Access Control (MAC)
• In Discretionary Access Control each user is given the access rights (privileges) on the specific
database objects
• A user obtains the privileges in a moment when he/she creates an object and the access of other
users to the object is at a discretion of an owner
• It is an effective system with some weaknesses, for example:
• A user Alice creates a new relational table R and grants write access to such table to a user Bob
• a user Bob owns a relational table S, which is not accessible to a user Alice
• a user Alice modifies a software used by a user Bob, such that it copies the contents of a table S
to a table R
• user Alice returns a software used by user Bob to its original state
Access Control
• Mandatory Access Control is based on system-wide policies that cannot be
changed by the individual users
• Each database object is assigned a security class and each user is assigned a
clearance for a security class and the rules are imposed on reading and
writing the database objects by the users
• DBMS determines whether a user can read or write a database object based
on certain rules, that involve a security level of the object and a clearance of
the user
Encryption
• Encryption of data means encoding of data by a special algorithm, that renders the data
unreadable by any program without the decryption key
• Sensitive data can be encoded to protect it against external threats or access
• Some DBMS provide special facilities to encrypt data and to access encrypted data after
decoding it
• Usually there is a degradation in performance because of time needed to decode data
Encryption
• A typical cryptosystem includes:
• An encryption key to encrypt data (plaintext)
• An encryption algorithm that with the encryption key transfroms plaintext
into ciphertext
• A decryption key to decrypt the ciphertext
• A decryption algorithm to use decryption key with cipher text and to create
the original plaintext
Ad

More Related Content

Similar to Database Security and Management Systems (20)

Data security and Integrity
Data security and IntegrityData security and Integrity
Data security and Integrity
Zaid Shabbir
 
Database managementsystemes_Unit-7.pptxe
Database managementsystemes_Unit-7.pptxeDatabase managementsystemes_Unit-7.pptxe
Database managementsystemes_Unit-7.pptxe
chnrketan
 
4_25655_SE731_2020_1__2_1_Lecture 2 - Security Requirments.ppt
4_25655_SE731_2020_1__2_1_Lecture 2 - Security Requirments.ppt4_25655_SE731_2020_1__2_1_Lecture 2 - Security Requirments.ppt
4_25655_SE731_2020_1__2_1_Lecture 2 - Security Requirments.ppt
nasirmehmood929552
 
4_25655_SE731_2020_1__2_1_Lecture 2 - Security Requirments.ppt
4_25655_SE731_2020_1__2_1_Lecture 2 - Security Requirments.ppt4_25655_SE731_2020_1__2_1_Lecture 2 - Security Requirments.ppt
4_25655_SE731_2020_1__2_1_Lecture 2 - Security Requirments.ppt
nasirmehmood929552
 
Lannguyen-Detecting Cyber Attacks
Lannguyen-Detecting Cyber AttacksLannguyen-Detecting Cyber Attacks
Lannguyen-Detecting Cyber Attacks
Security Bootcamp
 
CISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security OperationsCISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security Operations
Karthikeyan Dhayalan
 
Lecture 2 - Security Requirments.ppt
Lecture 2 - Security Requirments.pptLecture 2 - Security Requirments.ppt
Lecture 2 - Security Requirments.ppt
DrBasemMohamedElomda
 
Authentication Authorization-Lesson-2-Slides.ppt
Authentication Authorization-Lesson-2-Slides.pptAuthentication Authorization-Lesson-2-Slides.ppt
Authentication Authorization-Lesson-2-Slides.ppt
MuhammadAbdullah311866
 
4_5949547032388570388.ppt
4_5949547032388570388.ppt4_5949547032388570388.ppt
4_5949547032388570388.ppt
MohammedMohammed578197
 
System Security Sem 2(Module 1).pptx
System Security Sem 2(Module     1).pptxSystem Security Sem 2(Module     1).pptx
System Security Sem 2(Module 1).pptx
rahulkumarcscsf21
 
Geek Sync | Handling HIPAA Compliance with Your Data Access
Geek Sync | Handling HIPAA Compliance with Your Data AccessGeek Sync | Handling HIPAA Compliance with Your Data Access
Geek Sync | Handling HIPAA Compliance with Your Data Access
IDERA Software
 
CH12-CompSec4e.pptx
CH12-CompSec4e.pptxCH12-CompSec4e.pptx
CH12-CompSec4e.pptx
ams1ams11
 
Authorization Pattern.pptx power point s
Authorization Pattern.pptx power point sAuthorization Pattern.pptx power point s
Authorization Pattern.pptx power point s
Coderkids
 
LOW LEVEL DESIGN INSPECTION SECURE CODING
LOW LEVEL DESIGN INSPECTION SECURE CODINGLOW LEVEL DESIGN INSPECTION SECURE CODING
LOW LEVEL DESIGN INSPECTION SECURE CODING
Sri Latha
 
Group 8 - Database Security Version 1.pptx
Group 8 - Database Security Version 1.pptxGroup 8 - Database Security Version 1.pptx
Group 8 - Database Security Version 1.pptx
HenryQuang1
 
CISSP - Chapter 3 - System security architecture
CISSP - Chapter 3  - System security architectureCISSP - Chapter 3  - System security architecture
CISSP - Chapter 3 - System security architecture
Karthikeyan Dhayalan
 
Sharing and security in Salesforce
Sharing and security in SalesforceSharing and security in Salesforce
Sharing and security in Salesforce
Saurabh Kulkarni
 
boundary_security.pptx
boundary_security.pptxboundary_security.pptx
boundary_security.pptx
KelvinDube4
 
Database management system lecture notes
Database management system lecture notesDatabase management system lecture notes
Database management system lecture notes
UTSAHSINGH2
 
Adbms 46 security and integrity of databases
Adbms 46 security and integrity of databasesAdbms 46 security and integrity of databases
Adbms 46 security and integrity of databases
Vaibhav Khanna
 
Data security and Integrity
Data security and IntegrityData security and Integrity
Data security and Integrity
Zaid Shabbir
 
Database managementsystemes_Unit-7.pptxe
Database managementsystemes_Unit-7.pptxeDatabase managementsystemes_Unit-7.pptxe
Database managementsystemes_Unit-7.pptxe
chnrketan
 
4_25655_SE731_2020_1__2_1_Lecture 2 - Security Requirments.ppt
4_25655_SE731_2020_1__2_1_Lecture 2 - Security Requirments.ppt4_25655_SE731_2020_1__2_1_Lecture 2 - Security Requirments.ppt
4_25655_SE731_2020_1__2_1_Lecture 2 - Security Requirments.ppt
nasirmehmood929552
 
4_25655_SE731_2020_1__2_1_Lecture 2 - Security Requirments.ppt
4_25655_SE731_2020_1__2_1_Lecture 2 - Security Requirments.ppt4_25655_SE731_2020_1__2_1_Lecture 2 - Security Requirments.ppt
4_25655_SE731_2020_1__2_1_Lecture 2 - Security Requirments.ppt
nasirmehmood929552
 
Lannguyen-Detecting Cyber Attacks
Lannguyen-Detecting Cyber AttacksLannguyen-Detecting Cyber Attacks
Lannguyen-Detecting Cyber Attacks
Security Bootcamp
 
CISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security OperationsCISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security Operations
Karthikeyan Dhayalan
 
Lecture 2 - Security Requirments.ppt
Lecture 2 - Security Requirments.pptLecture 2 - Security Requirments.ppt
Lecture 2 - Security Requirments.ppt
DrBasemMohamedElomda
 
Authentication Authorization-Lesson-2-Slides.ppt
Authentication Authorization-Lesson-2-Slides.pptAuthentication Authorization-Lesson-2-Slides.ppt
Authentication Authorization-Lesson-2-Slides.ppt
MuhammadAbdullah311866
 
System Security Sem 2(Module 1).pptx
System Security Sem 2(Module     1).pptxSystem Security Sem 2(Module     1).pptx
System Security Sem 2(Module 1).pptx
rahulkumarcscsf21
 
Geek Sync | Handling HIPAA Compliance with Your Data Access
Geek Sync | Handling HIPAA Compliance with Your Data AccessGeek Sync | Handling HIPAA Compliance with Your Data Access
Geek Sync | Handling HIPAA Compliance with Your Data Access
IDERA Software
 
CH12-CompSec4e.pptx
CH12-CompSec4e.pptxCH12-CompSec4e.pptx
CH12-CompSec4e.pptx
ams1ams11
 
Authorization Pattern.pptx power point s
Authorization Pattern.pptx power point sAuthorization Pattern.pptx power point s
Authorization Pattern.pptx power point s
Coderkids
 
LOW LEVEL DESIGN INSPECTION SECURE CODING
LOW LEVEL DESIGN INSPECTION SECURE CODINGLOW LEVEL DESIGN INSPECTION SECURE CODING
LOW LEVEL DESIGN INSPECTION SECURE CODING
Sri Latha
 
Group 8 - Database Security Version 1.pptx
Group 8 - Database Security Version 1.pptxGroup 8 - Database Security Version 1.pptx
Group 8 - Database Security Version 1.pptx
HenryQuang1
 
CISSP - Chapter 3 - System security architecture
CISSP - Chapter 3  - System security architectureCISSP - Chapter 3  - System security architecture
CISSP - Chapter 3 - System security architecture
Karthikeyan Dhayalan
 
Sharing and security in Salesforce
Sharing and security in SalesforceSharing and security in Salesforce
Sharing and security in Salesforce
Saurabh Kulkarni
 
boundary_security.pptx
boundary_security.pptxboundary_security.pptx
boundary_security.pptx
KelvinDube4
 
Database management system lecture notes
Database management system lecture notesDatabase management system lecture notes
Database management system lecture notes
UTSAHSINGH2
 
Adbms 46 security and integrity of databases
Adbms 46 security and integrity of databasesAdbms 46 security and integrity of databases
Adbms 46 security and integrity of databases
Vaibhav Khanna
 

Recently uploaded (20)

IT488 Wireless Sensor Networks_Information Technology
IT488 Wireless Sensor Networks_Information TechnologyIT488 Wireless Sensor Networks_Information Technology
IT488 Wireless Sensor Networks_Information Technology
SHEHABALYAMANI
 
An Overview of Salesforce Health Cloud & How is it Transforming Patient Care
An Overview of Salesforce Health Cloud & How is it Transforming Patient CareAn Overview of Salesforce Health Cloud & How is it Transforming Patient Care
An Overview of Salesforce Health Cloud & How is it Transforming Patient Care
Cyntexa
 
Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...
Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...
Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...
Vasileios Komianos
 
Dark Dynamism: drones, dark factories and deurbanization
Dark Dynamism: drones, dark factories and deurbanizationDark Dynamism: drones, dark factories and deurbanization
Dark Dynamism: drones, dark factories and deurbanization
Jakub Šimek
 
Build With AI - In Person Session Slides.pdf
Build With AI - In Person Session Slides.pdfBuild With AI - In Person Session Slides.pdf
Build With AI - In Person Session Slides.pdf
Google Developer Group - Harare
 
Reimagine How You and Your Team Work with Microsoft 365 Copilot.pptx
Reimagine How You and Your Team Work with Microsoft 365 Copilot.pptxReimagine How You and Your Team Work with Microsoft 365 Copilot.pptx
Reimagine How You and Your Team Work with Microsoft 365 Copilot.pptx
John Moore
 
Building the Customer Identity Community, Together.pdf
Building the Customer Identity Community, Together.pdfBuilding the Customer Identity Community, Together.pdf
Building the Customer Identity Community, Together.pdf
Cheryl Hung
 
Unlocking Generative AI in your Web Apps
Unlocking Generative AI in your Web AppsUnlocking Generative AI in your Web Apps
Unlocking Generative AI in your Web Apps
Maximiliano Firtman
 
DNF 2.0 Implementations Challenges in Nepal
DNF 2.0 Implementations Challenges in NepalDNF 2.0 Implementations Challenges in Nepal
DNF 2.0 Implementations Challenges in Nepal
ICT Frame Magazine Pvt. Ltd.
 
DevOpsDays SLC - Platform Engineers are Product Managers.pptx
DevOpsDays SLC - Platform Engineers are Product Managers.pptxDevOpsDays SLC - Platform Engineers are Product Managers.pptx
DevOpsDays SLC - Platform Engineers are Product Managers.pptx
Justin Reock
 
論文紹介:"InfLoRA: Interference-Free Low-Rank Adaptation for Continual Learning" ...
論文紹介:"InfLoRA: Interference-Free Low-Rank Adaptation for Continual Learning" ...論文紹介:"InfLoRA: Interference-Free Low-Rank Adaptation for Continual Learning" ...
論文紹介:"InfLoRA: Interference-Free Low-Rank Adaptation for Continual Learning" ...
Toru Tamaki
 
Shoehorning dependency injection into a FP language, what does it take?
Shoehorning dependency injection into a FP language, what does it take?Shoehorning dependency injection into a FP language, what does it take?
Shoehorning dependency injection into a FP language, what does it take?
Eric Torreborre
 
ACE Aarhus - Team'25 wrap-up presentation
ACE Aarhus - Team'25 wrap-up presentationACE Aarhus - Team'25 wrap-up presentation
ACE Aarhus - Team'25 wrap-up presentation
DanielEriksen5
 
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
Lorenzo Miniero
 
May Patch Tuesday
May Patch TuesdayMay Patch Tuesday
May Patch Tuesday
Ivanti
 
Design pattern talk by Kaya Weers - 2025 (v2)
Design pattern talk by Kaya Weers - 2025 (v2)Design pattern talk by Kaya Weers - 2025 (v2)
Design pattern talk by Kaya Weers - 2025 (v2)
Kaya Weers
 
Artificial_Intelligence_in_Everyday_Life.pptx
Artificial_Intelligence_in_Everyday_Life.pptxArtificial_Intelligence_in_Everyday_Life.pptx
Artificial_Intelligence_in_Everyday_Life.pptx
03ANMOLCHAURASIYA
 
Slack like a pro: strategies for 10x engineering teams
Slack like a pro: strategies for 10x engineering teamsSlack like a pro: strategies for 10x engineering teams
Slack like a pro: strategies for 10x engineering teams
Nacho Cougil
 
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Safe Software
 
Everything You Need to Know About Agentforce? (Put AI Agents to Work)
Everything You Need to Know About Agentforce? (Put AI Agents to Work)Everything You Need to Know About Agentforce? (Put AI Agents to Work)
Everything You Need to Know About Agentforce? (Put AI Agents to Work)
Cyntexa
 
IT488 Wireless Sensor Networks_Information Technology
IT488 Wireless Sensor Networks_Information TechnologyIT488 Wireless Sensor Networks_Information Technology
IT488 Wireless Sensor Networks_Information Technology
SHEHABALYAMANI
 
An Overview of Salesforce Health Cloud & How is it Transforming Patient Care
An Overview of Salesforce Health Cloud & How is it Transforming Patient CareAn Overview of Salesforce Health Cloud & How is it Transforming Patient Care
An Overview of Salesforce Health Cloud & How is it Transforming Patient Care
Cyntexa
 
Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...
Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...
Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...
Vasileios Komianos
 
Dark Dynamism: drones, dark factories and deurbanization
Dark Dynamism: drones, dark factories and deurbanizationDark Dynamism: drones, dark factories and deurbanization
Dark Dynamism: drones, dark factories and deurbanization
Jakub Šimek
 
Reimagine How You and Your Team Work with Microsoft 365 Copilot.pptx
Reimagine How You and Your Team Work with Microsoft 365 Copilot.pptxReimagine How You and Your Team Work with Microsoft 365 Copilot.pptx
Reimagine How You and Your Team Work with Microsoft 365 Copilot.pptx
John Moore
 
Building the Customer Identity Community, Together.pdf
Building the Customer Identity Community, Together.pdfBuilding the Customer Identity Community, Together.pdf
Building the Customer Identity Community, Together.pdf
Cheryl Hung
 
Unlocking Generative AI in your Web Apps
Unlocking Generative AI in your Web AppsUnlocking Generative AI in your Web Apps
Unlocking Generative AI in your Web Apps
Maximiliano Firtman
 
DevOpsDays SLC - Platform Engineers are Product Managers.pptx
DevOpsDays SLC - Platform Engineers are Product Managers.pptxDevOpsDays SLC - Platform Engineers are Product Managers.pptx
DevOpsDays SLC - Platform Engineers are Product Managers.pptx
Justin Reock
 
論文紹介:"InfLoRA: Interference-Free Low-Rank Adaptation for Continual Learning" ...
論文紹介:"InfLoRA: Interference-Free Low-Rank Adaptation for Continual Learning" ...論文紹介:"InfLoRA: Interference-Free Low-Rank Adaptation for Continual Learning" ...
論文紹介:"InfLoRA: Interference-Free Low-Rank Adaptation for Continual Learning" ...
Toru Tamaki
 
Shoehorning dependency injection into a FP language, what does it take?
Shoehorning dependency injection into a FP language, what does it take?Shoehorning dependency injection into a FP language, what does it take?
Shoehorning dependency injection into a FP language, what does it take?
Eric Torreborre
 
ACE Aarhus - Team'25 wrap-up presentation
ACE Aarhus - Team'25 wrap-up presentationACE Aarhus - Team'25 wrap-up presentation
ACE Aarhus - Team'25 wrap-up presentation
DanielEriksen5
 
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
Lorenzo Miniero
 
May Patch Tuesday
May Patch TuesdayMay Patch Tuesday
May Patch Tuesday
Ivanti
 
Design pattern talk by Kaya Weers - 2025 (v2)
Design pattern talk by Kaya Weers - 2025 (v2)Design pattern talk by Kaya Weers - 2025 (v2)
Design pattern talk by Kaya Weers - 2025 (v2)
Kaya Weers
 
Artificial_Intelligence_in_Everyday_Life.pptx
Artificial_Intelligence_in_Everyday_Life.pptxArtificial_Intelligence_in_Everyday_Life.pptx
Artificial_Intelligence_in_Everyday_Life.pptx
03ANMOLCHAURASIYA
 
Slack like a pro: strategies for 10x engineering teams
Slack like a pro: strategies for 10x engineering teamsSlack like a pro: strategies for 10x engineering teams
Slack like a pro: strategies for 10x engineering teams
Nacho Cougil
 
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Safe Software
 
Everything You Need to Know About Agentforce? (Put AI Agents to Work)
Everything You Need to Know About Agentforce? (Put AI Agents to Work)Everything You Need to Know About Agentforce? (Put AI Agents to Work)
Everything You Need to Know About Agentforce? (Put AI Agents to Work)
Cyntexa
 
Ad

Database Security and Management Systems

  • 2. What is Database Security • Database security means protection of a database against unauthorized access, either intentional or unintentional • Database security requires the mechanisms, that protect a database against the intentional or accidental threats • Such mechanisms affect the hardware, software, people, and data components of a database management system • Database security protects against: • Theft and fraud, • Loss of confidentiality • Loss of privacy • Loss of integrity • Loss of availability
  • 3. Threats • A threat is any situation or event, whether intentional or accidental, that may adversely effect on a system Sample threats: • Unauthorized amendment or copying of data • Using another person's means of access • Program alteration • Wire tapping • Illegal entry by hacker • Blackmail • Theft • Failure of security mechanisms And the others
  • 4. Countermeasures • Countermeasures range from the physical controls to the administrative controls • Security of Database Management System (DBMS) is as good as security of an operating system running DBMS • We consider the following computer-based security controls in a multiuser environment • Authorization and authentication • Encryption • Views • Backup and recovery • Integrity
  • 5. Authorization and authentication • Authorization means granting a right or a privilege to have a legitimate access to a system or the resources operated by a system • Authorization is usually built into the software and it determines what system or object a user can access and what a user is allowed to do with it • In a process of authorization a subject representing a user or a program requests and obtains access to an object, that represent relational table, relational view, etc • A process of authorization requires authentication of a subject
  • 6. Authorization and authentication • Authentication is a mechanism, that determines whether a user is who he or she claims to be • A system administrator is responsible for allowing the users to have access to a computer system by creating the individual user accounts • When an account is created a user is given a unique identifier and a user picks a password associated with the identifier • To reduce the total number of user names and passwords it is possible to authenticate user's access to a database system through earlier authentication of access to an operating system • Such solution is not as safe as two separate passwords and it is consistent with a principle saying, that simplification of data access always reduces data security
  • 7. Access Control • A typical way to control access to a database system is based on granting and revoking privileges • A privilege allows a user to create, to drop, or to access in read or write mode some database objects like relational tables, relational views, index, etc or to perform certain operations • The privileges are granted to a user to accomplish their task • The excessive privileges can compromise security • A user who creates a database object becomes an owner of the object and he/she automatically gets all privileges on the object • DBMS keeps track of all granted privileges to ensure that only selected user can access and can perform operations on the database objects
  • 8. Access Control • There are two different strategies of access control: • Discretionary Access Control (DAC) Mandatory Access Control (MAC) • In Discretionary Access Control each user is given the access rights (privileges) on the specific database objects • A user obtains the privileges in a moment when he/she creates an object and the access of other users to the object is at a discretion of an owner • It is an effective system with some weaknesses, for example: • A user Alice creates a new relational table R and grants write access to such table to a user Bob • a user Bob owns a relational table S, which is not accessible to a user Alice • a user Alice modifies a software used by a user Bob, such that it copies the contents of a table S to a table R • user Alice returns a software used by user Bob to its original state
  • 9. Access Control • Mandatory Access Control is based on system-wide policies that cannot be changed by the individual users • Each database object is assigned a security class and each user is assigned a clearance for a security class and the rules are imposed on reading and writing the database objects by the users • DBMS determines whether a user can read or write a database object based on certain rules, that involve a security level of the object and a clearance of the user
  • 10. Encryption • Encryption of data means encoding of data by a special algorithm, that renders the data unreadable by any program without the decryption key • Sensitive data can be encoded to protect it against external threats or access • Some DBMS provide special facilities to encrypt data and to access encrypted data after decoding it • Usually there is a degradation in performance because of time needed to decode data
  • 11. Encryption • A typical cryptosystem includes: • An encryption key to encrypt data (plaintext) • An encryption algorithm that with the encryption key transfroms plaintext into ciphertext • A decryption key to decrypt the ciphertext • A decryption algorithm to use decryption key with cipher text and to create the original plaintext
  翻译: