SlideShare uma empresa Scribd logo
1 de 26
Security and Privacy
1By:-Gourav Kottawar
 Database security issues
 Discretionary access control based on grant &
revoking
privilege
 Mandatory access control and role based access
control for multilevel security
 Encryption & public key infrastructures
 Types of Security:
 Legal & Ethical issues regarding the right to access certain
information.
 System related issues such as the system levels at which various
security functions should be enforced , for e.g whether a security
function should be handled at the physical hardware level, the
operating system level or the DBMS level.
 The need in some organizations to identify multiple security
levels & to categorize the data & users based on these
classifications , for e,g top secret, secret, confidential, &
unclassified.
 Policy issues at the governmental, institutional or corporate level
as to what kind of information should be made publicly available,
for e.g credit ratings & personal medical records.
3By:-Gourav Kottawar
 Threats to database result in loss or degradation of following security
goals:
 Loss of Integrity: Database Integrity refers to the requirement that
information be protected from improper modification.
 Loss of Availability: Database availability refers to making objects
available to the user or a program to which they have a legitimate right.
 Loss of Confidentiality: Refers to the protection of data from
unauthorized disclosure.
 Unauthorized , unanticipated or unintentional disclosure could result in
loss of public confidence
 Modification of data includes creation, insertion , modification, changing
the status of data & deletion.
 Integrity is lost if unauthorized changes are made to the data by either
intentional or accidental acts.
4By:-Gourav Kottawar
 To protect database against these types of threats
four countermeasures can be implemented:
 Access Control
 Flow Control
 Encryption
5By:-Gourav Kottawar
 In a multi-user Database System , DBMS must provide techniques
to enable certain users or user groups to access selected portions
of a database without granting access to the rest of the database.
 There are two types of security mechanisms:
 Discretionary security Mechanisms: These are used to grant
privileges to users , including the capability to access specific
data files, records , or fields in a specific mode (such as read ,
insert , delete or update)
 Mandatory Security Mechanisms: These are used to enforce
multilevel security by classifying data & users into various
security classes.
 For e.g a role based security , which enforces policies & privileges
based on the concept of roles.
6By:-Gourav Kottawar
 A major problem to all computer systems is that of preventing
unauthorized persons from accessing the system itself.
 The security mechanisms of DBMS must include provisions for
restricting access to the database system as a whole.
 The function is called Access Control & is handled by creating
user accounts & passwords to control the login process by the
DBMS.
 DBA is the central authority for managing a database system.
 DBA’s responsibilities include:
 Account Creation
 Privilege granting
 Privilege revocation
 Security level assignment
7By:-Gourav Kottawar
 Whenever a person or a group of persons needs to
access a database system, the individual or group
must first apply for a user account.
 The DBA will then create a new account & password
for the user if there is a legal need to access the
database.
 The user must login to the DBMS by entering the
account name/number & password whenever
database access is needed.
 The database system must also keep track of all
operations on the database that are applied by a
certain user throughout each login session.
8By:-Gourav Kottawar
 The typical method of enforcing discretionary access
control in a database system is based on the granting
& revoking of privileges.
 The main idea is to include statements in the query
language that allow the DBA & selected users to grant
& revoke privileges.
 Types of Discretionary Privileges:
 There are two levels for assigning privileges to use the
database system.:
◦ The account level: DBA specifies the particular
privileges that each account holds independently of
the relations in the database.
◦ The relation (table) level: DBA can control the
privileges to access each individual relation in the
9By:-Gourav Kottawar
 Privileges at account level apply to the capabilities provided
to the account itself & can include the CREATE TABLE / VIEW
PREVILAGE, ALTER privilege , DROP privilege, MODIFY, SELECT
privilege
 Account level privileges are not defined as part of SQL ; they
are left to the DBMS implementers to define.
 The second level of privilege applies to the relation level,
whether they are base relations or virtual relations.
 In SQL the following types of privileges can be granted on
each individual relation R.
 SELECT: Gives the account retrieval privilege.
 MODIFY: This gives the account the capability to modify
tuples of R. In SQL this is divided into UPDATE, DELETE &
INSERT privileges.
10By:-Gourav Kottawar
 A user who creates a view has precisely those privileges on the
view that he or she has on the base tables used to define the
view.
 The user creating the view must have the SELECT privilege on
each underlying table ,so is always granted the SELECT privilege
on the view.
 The creator of the view has the SELECT privilege with the grant
option only if he or she has the SELECT privilege with the grant
option on every underlying table.
 The user automatically gets the same privilege on the view.
 A view may be dropped as a SELECT privilege is revoked from the
user who created the view.
 If the creator of the view gains additional privilege on the
underlying tables, he or she automatically gains additional
privileges on the view.
11By:-Gourav Kottawar
 In this method a user either has or does not have a certain
privilege.
 In many applications an additional security policy is needed
that classifies data & users based on security classes.
 This approach is known as mandatory access control.
 It is important to note that most of the commercial DBMSs
currently provide mechanisms only for discretionary access
control.
 However the need for multilevel security exists in government
, military & intelligence applications , as well as in many
industrial & corporate applications.
 Typical security classes are
◦ Top secret (TS)
◦ Secret (S)
◦ Confidential( C)
◦ Unclassified (U)
12By:-Gourav Kottawar
 TS is the highest level & U the lowest.
 The system uses four security classification levels , where
TS>S>C>U.
 The commonly used model for multilevel security , known as Bell-
Lapadula model.
 It classifies each subject (user, account, program) & object (table,
tuple,column,view,operation) into one of the security
classifications.
 The classification of subject S is referred as class(S) & classification
of object is referred as class(O)
13By:-Gourav Kottawar
 MAC is based on system wide policies that can not be
changed by individual user.
 In this approach each database object is assigned a
security class.
 Each user is assigned a clearance for a security class.
 Rules are imposed on reading & writing of database
objects by users.
 The DBMS determines whether a given user can read or
write a given object based on certain rules that involve
the security level of that object & the clearance of the
user.
 These rules seek to ensure that sensitive data can never
be ’passed on’ to a user without the necessary
clearance.
 SQL standard does not include any support for MAC.
14By:-Gourav Kottawar
 Clearance is the security level to which an individual
user or client can access information.
 This clearance is associated with ‘need to know’
requirement.
 The Bell-Lapadula model imposes two restrictions on
all reads & writes of database objects:
 Simple-security property: A subject can read an object
only if the security level of the subject is higher or
equal to the security level of object. (read –down)
 *-property: A subject can write on an object only if the
security level of the object is higher or equal to the
security level of the subject. (write up)
 It is usually assumed that the security levels on
subjects & objects once assigned cannot be changed
(except DBA)
 This is the reason that the MAC is mandatory.
15By:-Gourav Kottawar
 Subjects: Individuals who perform some activity
on the database. Might include specific people or
a group of users
 Objects: Database units that require
authorization in order to manipulate. Database
units might include an entire table, specific
columns in a table, specific rows in a table, etc.
 Actions: Any activity that might be performed on
an object by a subject. For example: Read,
Modify, Insert, Write, Delete, Grant (the ability to
grant authorizations to others)
 Constraint: A more specific rule regarding an
aspect of the object and action.
16By:-Gourav Kottawar
 For e.g a user with TS clearance can read a table with C
clearance , but a user with C clearance is not allowed to read
a table with TS classification. (Simple Security Property)
 *_Property: For e.g a user with S clearance can write only
objects with S or TS classification.
 In case of Multilevel security notions into the relational
database model, it is common to consider attribute values &
tuples as data objects.
 Each attribute is associated with a classification C.
 Each attribute value is associated with a corresponding
security classification.
17By:-Gourav Kottawar
 RBAC emerged in 1990s as a proven technology for managing &
enforcing security in large scale enterprise wide systems.
 Its basic notion is that permissions are associated with roles, &
users are assigned to appropriate roles.
 Roles can be created using CREATE ROLE & DESTROY ROLE
commands.
 RBAC appears to be a viable alternative to traditional
discretionary & mandatory access controls; it ensures that only
authorized users are given access to certain data or resources.
 User create sessions during which they may activate a subset of
roles to which they belong.
 Each session can be assigned to many roles, but it maps to only
one user.
 Many DBMSs have allowed the concept of roles , where privileges
can be assigned to roles.
20By:-Gourav Kottawar
 Another important consideration in RBAC systems is the
possible temporal constraints that may exist on roles, such as
the time & duration of role activations & time triggering of a
role by an activation of another role.
 RBAC models have several desirable features , such as
flexibility , better support for security management &
administration.
 RBAC can be effectively used for developing secure Web
based applications , however MAC & DAC lack capabilities
needed to support a secure web based application.
21By:-Gourav Kottawar
 The previous access control mechanisms being strong
countermeasures, may not be able to protect databases
from some threats.
 Suppose we communicate data, but our data falls into the
hands of some invalid user.
 In this situation , by using encryption we can disguise the
message so that even if the transmission is diverted, the
message will not be revealed.
 Encryption is a means of securing data in a insecure
environment.
 Encryption consists of applying an encryption algorithm to
data using some pre specified encryption key.
 The resulting data has to be decrypted using a decryption
key.
22By:-Gourav Kottawar
 The DES (Data Encryption Standard )is a system developed by
the U.S government for use by the general public.
 It has been widely accepted as a cryptographic standard both
in the United States & abroad.
 DES can provide end-to-end encryption on the channel
between the sender A & receiver B.
 The DES algorithm is a careful & complex combination of two
of the fundamental building blocks of encryption:
Substitution & Transposition
 The algorithm derives its strength from repeated application
of these two techniques for a total of 16 cycles.
23By:-Gourav Kottawar
 substitution :For example: a is replaced with D, b
with E, c with F and z with C. In this way attack
becomes DWWDFN. The substitution ciphers are
not much secure because intruder can easily guess
the substitution characters.
Transposition:Plaintext: this is a test
t h i s
i s a t tiehssiatst!
e s t !
24By:-Gourav Kottawar
 In 1976 Diffie & Hellman proposed a new kind of
cryptosystems ,which they called public key encryption.
 This algorithm uses two separate keys, in contrast to
conventional encryption , which uses only one key.
 The two keys are referred to as public key , & private key.
 The private key is kept secret .
 The Public key Encryption scheme:
◦ Plain Text
◦ Encryption Algorithm
◦ Pubilc key & Private key : Public key is used for encryption &
Private key used for decryption.
◦ Cipher Text
◦ Decryption Algorithm
25By:-Gourav Kottawar
 When John wants to send a secure message to Nipun, he
uses Nipun 's public key to encrypt the message. Nipun
then uses her private key to decrypt it. An important
element to the public key system is that the public and
private keys are related in such a way that only the public
key can be used to encrypt messages and only the
corresponding private key can be used to decrypt them.
Moreover, it is virtually impossible to figure out the private
key if you know the public key.
 Public-key systems are becoming popular for transmitting
information via the Internet. They are extremely secure
and relatively simple to use. The only difficulty with
public-key systems is that you need to know the
recipient's public key to encrypt a message for him or her.
26By:-Gourav Kottawar
 ciphertext (or cyphertext) is the result of
encryption performed on plaintext using an
algorithm, called a cipher .Ciphertext is also
known as encrypted or encoded information
because it contains a form of the original
plaintext that is unreadable by a human or
computer without the proper cipher to
decrypt it. Decryption, the inverse of
encryption, is the process of turning
ciphertext into readable plaintext.
27By:-Gourav Kottawar
 plaintext is information a sender wishes to
transmit to a receiver. Cleartext is often used
as a synonym. Plaintext has reference to the
operation of cryptographic algorithms,
usually encryption algorithms
28By:-Gourav Kottawar

Mais conteúdo relacionado

Mais procurados

Database design process
Database design processDatabase design process
Database design processTayyab Hameed
 
Design Goals of Distributed System
Design Goals of Distributed SystemDesign Goals of Distributed System
Design Goals of Distributed SystemAshish KC
 
File organization 1
File organization 1File organization 1
File organization 1Rupali Rana
 
Adbms 11 object structure and type constructor
Adbms 11 object structure and type constructorAdbms 11 object structure and type constructor
Adbms 11 object structure and type constructorVaibhav Khanna
 
3 Level Architecture
3 Level Architecture3 Level Architecture
3 Level ArchitectureAdeel Rasheed
 
1. Introduction to DBMS
1. Introduction to DBMS1. Introduction to DBMS
1. Introduction to DBMSkoolkampus
 
Relational database management system (rdbms) i
Relational database management system (rdbms) iRelational database management system (rdbms) i
Relational database management system (rdbms) iRavinder Kamboj
 
Distributed database management system
Distributed database management  systemDistributed database management  system
Distributed database management systemPooja Dixit
 
10. XML in DBMS
10. XML in DBMS10. XML in DBMS
10. XML in DBMSkoolkampus
 
Database User and Administrator
Database User and AdministratorDatabase User and Administrator
Database User and AdministratorA. S. M. Shafi
 
Introduction to distributed database
Introduction to distributed databaseIntroduction to distributed database
Introduction to distributed databaseSonia Panesar
 
Distributed dbms architectures
Distributed dbms architecturesDistributed dbms architectures
Distributed dbms architecturesPooja Dixit
 
Multimedia Database
Multimedia Database Multimedia Database
Multimedia Database Avnish Patel
 
Architectural styles and patterns
Architectural styles and patternsArchitectural styles and patterns
Architectural styles and patternsHimanshu
 

Mais procurados (20)

Database design process
Database design processDatabase design process
Database design process
 
Design Goals of Distributed System
Design Goals of Distributed SystemDesign Goals of Distributed System
Design Goals of Distributed System
 
File organization 1
File organization 1File organization 1
File organization 1
 
Adbms 11 object structure and type constructor
Adbms 11 object structure and type constructorAdbms 11 object structure and type constructor
Adbms 11 object structure and type constructor
 
Data independence
Data independenceData independence
Data independence
 
Dbms architecture
Dbms architectureDbms architecture
Dbms architecture
 
3 Level Architecture
3 Level Architecture3 Level Architecture
3 Level Architecture
 
1. Introduction to DBMS
1. Introduction to DBMS1. Introduction to DBMS
1. Introduction to DBMS
 
Cs6703 grid and cloud computing unit 2
Cs6703 grid and cloud computing unit 2Cs6703 grid and cloud computing unit 2
Cs6703 grid and cloud computing unit 2
 
Mutimedia databases
Mutimedia databasesMutimedia databases
Mutimedia databases
 
Relational database management system (rdbms) i
Relational database management system (rdbms) iRelational database management system (rdbms) i
Relational database management system (rdbms) i
 
Basic DBMS ppt
Basic DBMS pptBasic DBMS ppt
Basic DBMS ppt
 
Distributed database management system
Distributed database management  systemDistributed database management  system
Distributed database management system
 
10. XML in DBMS
10. XML in DBMS10. XML in DBMS
10. XML in DBMS
 
Parallel Database
Parallel DatabaseParallel Database
Parallel Database
 
Database User and Administrator
Database User and AdministratorDatabase User and Administrator
Database User and Administrator
 
Introduction to distributed database
Introduction to distributed databaseIntroduction to distributed database
Introduction to distributed database
 
Distributed dbms architectures
Distributed dbms architecturesDistributed dbms architectures
Distributed dbms architectures
 
Multimedia Database
Multimedia Database Multimedia Database
Multimedia Database
 
Architectural styles and patterns
Architectural styles and patternsArchitectural styles and patterns
Architectural styles and patterns
 

Semelhante a security and privacy in dbms and in sql database

Database Management System Security.pptx
Database Management System  Security.pptxDatabase Management System  Security.pptx
Database Management System Security.pptxRoshni814224
 
Database security and privacy
Database security and privacyDatabase security and privacy
Database security and privacyMd. Ahasan Hasib
 
Data base security
Data base securityData base security
Data base securitySara Nazir
 
Database Security - IG
Database Security - IGDatabase Security - IG
Database Security - IGAnne Lee
 
Database security and security in networks
Database security and security in networksDatabase security and security in networks
Database security and security in networksG Prachi
 
Dbms ii mca-ch12-security-2013
Dbms ii mca-ch12-security-2013Dbms ii mca-ch12-security-2013
Dbms ii mca-ch12-security-2013Prosanta Ghosh
 
01 database security ent-db
01  database security ent-db01  database security ent-db
01 database security ent-dbuncleRhyme
 
Security Issues Surrounding Data Manipulation in a Relational Database
Security Issues Surrounding Data Manipulation in a Relational DatabaseSecurity Issues Surrounding Data Manipulation in a Relational Database
Security Issues Surrounding Data Manipulation in a Relational DatabaseDavid Murphy
 
Analysis of Various Attributes to Have a Secure Database
Analysis of Various Attributes to Have a Secure DatabaseAnalysis of Various Attributes to Have a Secure Database
Analysis of Various Attributes to Have a Secure DatabaseIOSR Journals
 
Defending broken access control in .NET
Defending broken access control in .NETDefending broken access control in .NET
Defending broken access control in .NETSupriya G
 
Distributed database security with discretionary access control
Distributed database security with discretionary access controlDistributed database security with discretionary access control
Distributed database security with discretionary access controlJyotishkar Dey
 
information security(authentication application, Authentication and Access Co...
information security(authentication application, Authentication and Access Co...information security(authentication application, Authentication and Access Co...
information security(authentication application, Authentication and Access Co...Zara Nawaz
 
Fighting Spyware With Mandatory Access Control In Microsoft Windows Vista (Di...
Fighting Spyware With Mandatory Access Control In Microsoft Windows Vista (Di...Fighting Spyware With Mandatory Access Control In Microsoft Windows Vista (Di...
Fighting Spyware With Mandatory Access Control In Microsoft Windows Vista (Di...FilGov
 
Database Security Methods, DAC, MAC,View
Database Security Methods, DAC, MAC,ViewDatabase Security Methods, DAC, MAC,View
Database Security Methods, DAC, MAC,ViewDr-Dipali Meher
 
MobileDBSecurity.pptx
MobileDBSecurity.pptxMobileDBSecurity.pptx
MobileDBSecurity.pptxmissionsk81
 
Chapter 6 Database Security and Authorization (4).pdf
Chapter 6 Database Security and Authorization (4).pdfChapter 6 Database Security and Authorization (4).pdf
Chapter 6 Database Security and Authorization (4).pdfabrehamcheru14
 

Semelhante a security and privacy in dbms and in sql database (20)

Database Management System Security.pptx
Database Management System  Security.pptxDatabase Management System  Security.pptx
Database Management System Security.pptx
 
Database security and privacy
Database security and privacyDatabase security and privacy
Database security and privacy
 
Data base Access Control a look at Fine grain Access method
Data base Access Control a look at Fine grain Access methodData base Access Control a look at Fine grain Access method
Data base Access Control a look at Fine grain Access method
 
Data base security
Data base securityData base security
Data base security
 
Chapter23
Chapter23Chapter23
Chapter23
 
Database Security - IG
Database Security - IGDatabase Security - IG
Database Security - IG
 
Database security and security in networks
Database security and security in networksDatabase security and security in networks
Database security and security in networks
 
Dbms ii mca-ch12-security-2013
Dbms ii mca-ch12-security-2013Dbms ii mca-ch12-security-2013
Dbms ii mca-ch12-security-2013
 
01 database security ent-db
01  database security ent-db01  database security ent-db
01 database security ent-db
 
Security Issues Surrounding Data Manipulation in a Relational Database
Security Issues Surrounding Data Manipulation in a Relational DatabaseSecurity Issues Surrounding Data Manipulation in a Relational Database
Security Issues Surrounding Data Manipulation in a Relational Database
 
Analysis of Various Attributes to Have a Secure Database
Analysis of Various Attributes to Have a Secure DatabaseAnalysis of Various Attributes to Have a Secure Database
Analysis of Various Attributes to Have a Secure Database
 
Defending broken access control in .NET
Defending broken access control in .NETDefending broken access control in .NET
Defending broken access control in .NET
 
Oracle Database Vault
Oracle Database VaultOracle Database Vault
Oracle Database Vault
 
Distributed database security with discretionary access control
Distributed database security with discretionary access controlDistributed database security with discretionary access control
Distributed database security with discretionary access control
 
information security(authentication application, Authentication and Access Co...
information security(authentication application, Authentication and Access Co...information security(authentication application, Authentication and Access Co...
information security(authentication application, Authentication and Access Co...
 
Fighting Spyware With Mandatory Access Control In Microsoft Windows Vista (Di...
Fighting Spyware With Mandatory Access Control In Microsoft Windows Vista (Di...Fighting Spyware With Mandatory Access Control In Microsoft Windows Vista (Di...
Fighting Spyware With Mandatory Access Control In Microsoft Windows Vista (Di...
 
Database Security Methods, DAC, MAC,View
Database Security Methods, DAC, MAC,ViewDatabase Security Methods, DAC, MAC,View
Database Security Methods, DAC, MAC,View
 
MobileDBSecurity.pptx
MobileDBSecurity.pptxMobileDBSecurity.pptx
MobileDBSecurity.pptx
 
Chapter 6 Database Security and Authorization (4).pdf
Chapter 6 Database Security and Authorization (4).pdfChapter 6 Database Security and Authorization (4).pdf
Chapter 6 Database Security and Authorization (4).pdf
 
En ch23
En ch23En ch23
En ch23
 

Mais de gourav kottawar

operator overloading & type conversion in cpp
operator overloading & type conversion in cppoperator overloading & type conversion in cpp
operator overloading & type conversion in cppgourav kottawar
 
constructor & destructor in cpp
constructor & destructor in cppconstructor & destructor in cpp
constructor & destructor in cppgourav kottawar
 
classes & objects in cpp
classes & objects in cppclasses & objects in cpp
classes & objects in cppgourav kottawar
 
working file handling in cpp overview
working file handling in cpp overviewworking file handling in cpp overview
working file handling in cpp overviewgourav kottawar
 
pointers, virtual functions and polymorphisms in c++ || in cpp
pointers, virtual functions and polymorphisms in c++ || in cpppointers, virtual functions and polymorphisms in c++ || in cpp
pointers, virtual functions and polymorphisms in c++ || in cppgourav kottawar
 
exception handling in cpp
exception handling in cppexception handling in cpp
exception handling in cppgourav kottawar
 
cpp input & output system basics
cpp input & output system basicscpp input & output system basics
cpp input & output system basicsgourav kottawar
 
operator overloading & type conversion in cpp over view || c++
operator overloading & type conversion in cpp over view || c++operator overloading & type conversion in cpp over view || c++
operator overloading & type conversion in cpp over view || c++gourav kottawar
 
constructor & destructor in cpp
constructor & destructor in cppconstructor & destructor in cpp
constructor & destructor in cppgourav kottawar
 
classes & objects in cpp overview
classes & objects in cpp overviewclasses & objects in cpp overview
classes & objects in cpp overviewgourav kottawar
 
SQL || overview and detailed information about Sql
SQL || overview and detailed information about SqlSQL || overview and detailed information about Sql
SQL || overview and detailed information about Sqlgourav kottawar
 
SQL querys in detail || Sql query slides
SQL querys in detail || Sql query slidesSQL querys in detail || Sql query slides
SQL querys in detail || Sql query slidesgourav kottawar
 
Rrelational algebra in dbms overview
Rrelational algebra in dbms overviewRrelational algebra in dbms overview
Rrelational algebra in dbms overviewgourav kottawar
 
overview of database concept
overview of database conceptoverview of database concept
overview of database conceptgourav kottawar
 
Relational Model in dbms & sql database
Relational Model in dbms & sql databaseRelational Model in dbms & sql database
Relational Model in dbms & sql databasegourav kottawar
 
DBMS information in detail || Dbms (lab) ppt
DBMS information in detail || Dbms (lab) pptDBMS information in detail || Dbms (lab) ppt
DBMS information in detail || Dbms (lab) pptgourav kottawar
 

Mais de gourav kottawar (20)

operator overloading & type conversion in cpp
operator overloading & type conversion in cppoperator overloading & type conversion in cpp
operator overloading & type conversion in cpp
 
constructor & destructor in cpp
constructor & destructor in cppconstructor & destructor in cpp
constructor & destructor in cpp
 
classes & objects in cpp
classes & objects in cppclasses & objects in cpp
classes & objects in cpp
 
expression in cpp
expression in cppexpression in cpp
expression in cpp
 
basics of c++
basics of c++basics of c++
basics of c++
 
working file handling in cpp overview
working file handling in cpp overviewworking file handling in cpp overview
working file handling in cpp overview
 
pointers, virtual functions and polymorphisms in c++ || in cpp
pointers, virtual functions and polymorphisms in c++ || in cpppointers, virtual functions and polymorphisms in c++ || in cpp
pointers, virtual functions and polymorphisms in c++ || in cpp
 
exception handling in cpp
exception handling in cppexception handling in cpp
exception handling in cpp
 
cpp input & output system basics
cpp input & output system basicscpp input & output system basics
cpp input & output system basics
 
operator overloading & type conversion in cpp over view || c++
operator overloading & type conversion in cpp over view || c++operator overloading & type conversion in cpp over view || c++
operator overloading & type conversion in cpp over view || c++
 
constructor & destructor in cpp
constructor & destructor in cppconstructor & destructor in cpp
constructor & destructor in cpp
 
basics of c++
basics of c++basics of c++
basics of c++
 
classes & objects in cpp overview
classes & objects in cpp overviewclasses & objects in cpp overview
classes & objects in cpp overview
 
expression in cpp
expression in cppexpression in cpp
expression in cpp
 
SQL || overview and detailed information about Sql
SQL || overview and detailed information about SqlSQL || overview and detailed information about Sql
SQL || overview and detailed information about Sql
 
SQL querys in detail || Sql query slides
SQL querys in detail || Sql query slidesSQL querys in detail || Sql query slides
SQL querys in detail || Sql query slides
 
Rrelational algebra in dbms overview
Rrelational algebra in dbms overviewRrelational algebra in dbms overview
Rrelational algebra in dbms overview
 
overview of database concept
overview of database conceptoverview of database concept
overview of database concept
 
Relational Model in dbms & sql database
Relational Model in dbms & sql databaseRelational Model in dbms & sql database
Relational Model in dbms & sql database
 
DBMS information in detail || Dbms (lab) ppt
DBMS information in detail || Dbms (lab) pptDBMS information in detail || Dbms (lab) ppt
DBMS information in detail || Dbms (lab) ppt
 

Último

4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 

Último (20)

4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 

security and privacy in dbms and in sql database

  • 2.  Database security issues  Discretionary access control based on grant & revoking privilege  Mandatory access control and role based access control for multilevel security  Encryption & public key infrastructures
  • 3.  Types of Security:  Legal & Ethical issues regarding the right to access certain information.  System related issues such as the system levels at which various security functions should be enforced , for e.g whether a security function should be handled at the physical hardware level, the operating system level or the DBMS level.  The need in some organizations to identify multiple security levels & to categorize the data & users based on these classifications , for e,g top secret, secret, confidential, & unclassified.  Policy issues at the governmental, institutional or corporate level as to what kind of information should be made publicly available, for e.g credit ratings & personal medical records. 3By:-Gourav Kottawar
  • 4.  Threats to database result in loss or degradation of following security goals:  Loss of Integrity: Database Integrity refers to the requirement that information be protected from improper modification.  Loss of Availability: Database availability refers to making objects available to the user or a program to which they have a legitimate right.  Loss of Confidentiality: Refers to the protection of data from unauthorized disclosure.  Unauthorized , unanticipated or unintentional disclosure could result in loss of public confidence  Modification of data includes creation, insertion , modification, changing the status of data & deletion.  Integrity is lost if unauthorized changes are made to the data by either intentional or accidental acts. 4By:-Gourav Kottawar
  • 5.  To protect database against these types of threats four countermeasures can be implemented:  Access Control  Flow Control  Encryption 5By:-Gourav Kottawar
  • 6.  In a multi-user Database System , DBMS must provide techniques to enable certain users or user groups to access selected portions of a database without granting access to the rest of the database.  There are two types of security mechanisms:  Discretionary security Mechanisms: These are used to grant privileges to users , including the capability to access specific data files, records , or fields in a specific mode (such as read , insert , delete or update)  Mandatory Security Mechanisms: These are used to enforce multilevel security by classifying data & users into various security classes.  For e.g a role based security , which enforces policies & privileges based on the concept of roles. 6By:-Gourav Kottawar
  • 7.  A major problem to all computer systems is that of preventing unauthorized persons from accessing the system itself.  The security mechanisms of DBMS must include provisions for restricting access to the database system as a whole.  The function is called Access Control & is handled by creating user accounts & passwords to control the login process by the DBMS.  DBA is the central authority for managing a database system.  DBA’s responsibilities include:  Account Creation  Privilege granting  Privilege revocation  Security level assignment 7By:-Gourav Kottawar
  • 8.  Whenever a person or a group of persons needs to access a database system, the individual or group must first apply for a user account.  The DBA will then create a new account & password for the user if there is a legal need to access the database.  The user must login to the DBMS by entering the account name/number & password whenever database access is needed.  The database system must also keep track of all operations on the database that are applied by a certain user throughout each login session. 8By:-Gourav Kottawar
  • 9.  The typical method of enforcing discretionary access control in a database system is based on the granting & revoking of privileges.  The main idea is to include statements in the query language that allow the DBA & selected users to grant & revoke privileges.  Types of Discretionary Privileges:  There are two levels for assigning privileges to use the database system.: ◦ The account level: DBA specifies the particular privileges that each account holds independently of the relations in the database. ◦ The relation (table) level: DBA can control the privileges to access each individual relation in the 9By:-Gourav Kottawar
  • 10.  Privileges at account level apply to the capabilities provided to the account itself & can include the CREATE TABLE / VIEW PREVILAGE, ALTER privilege , DROP privilege, MODIFY, SELECT privilege  Account level privileges are not defined as part of SQL ; they are left to the DBMS implementers to define.  The second level of privilege applies to the relation level, whether they are base relations or virtual relations.  In SQL the following types of privileges can be granted on each individual relation R.  SELECT: Gives the account retrieval privilege.  MODIFY: This gives the account the capability to modify tuples of R. In SQL this is divided into UPDATE, DELETE & INSERT privileges. 10By:-Gourav Kottawar
  • 11.  A user who creates a view has precisely those privileges on the view that he or she has on the base tables used to define the view.  The user creating the view must have the SELECT privilege on each underlying table ,so is always granted the SELECT privilege on the view.  The creator of the view has the SELECT privilege with the grant option only if he or she has the SELECT privilege with the grant option on every underlying table.  The user automatically gets the same privilege on the view.  A view may be dropped as a SELECT privilege is revoked from the user who created the view.  If the creator of the view gains additional privilege on the underlying tables, he or she automatically gains additional privileges on the view. 11By:-Gourav Kottawar
  • 12.  In this method a user either has or does not have a certain privilege.  In many applications an additional security policy is needed that classifies data & users based on security classes.  This approach is known as mandatory access control.  It is important to note that most of the commercial DBMSs currently provide mechanisms only for discretionary access control.  However the need for multilevel security exists in government , military & intelligence applications , as well as in many industrial & corporate applications.  Typical security classes are ◦ Top secret (TS) ◦ Secret (S) ◦ Confidential( C) ◦ Unclassified (U) 12By:-Gourav Kottawar
  • 13.  TS is the highest level & U the lowest.  The system uses four security classification levels , where TS>S>C>U.  The commonly used model for multilevel security , known as Bell- Lapadula model.  It classifies each subject (user, account, program) & object (table, tuple,column,view,operation) into one of the security classifications.  The classification of subject S is referred as class(S) & classification of object is referred as class(O) 13By:-Gourav Kottawar
  • 14.  MAC is based on system wide policies that can not be changed by individual user.  In this approach each database object is assigned a security class.  Each user is assigned a clearance for a security class.  Rules are imposed on reading & writing of database objects by users.  The DBMS determines whether a given user can read or write a given object based on certain rules that involve the security level of that object & the clearance of the user.  These rules seek to ensure that sensitive data can never be ’passed on’ to a user without the necessary clearance.  SQL standard does not include any support for MAC. 14By:-Gourav Kottawar
  • 15.  Clearance is the security level to which an individual user or client can access information.  This clearance is associated with ‘need to know’ requirement.  The Bell-Lapadula model imposes two restrictions on all reads & writes of database objects:  Simple-security property: A subject can read an object only if the security level of the subject is higher or equal to the security level of object. (read –down)  *-property: A subject can write on an object only if the security level of the object is higher or equal to the security level of the subject. (write up)  It is usually assumed that the security levels on subjects & objects once assigned cannot be changed (except DBA)  This is the reason that the MAC is mandatory. 15By:-Gourav Kottawar
  • 16.  Subjects: Individuals who perform some activity on the database. Might include specific people or a group of users  Objects: Database units that require authorization in order to manipulate. Database units might include an entire table, specific columns in a table, specific rows in a table, etc.  Actions: Any activity that might be performed on an object by a subject. For example: Read, Modify, Insert, Write, Delete, Grant (the ability to grant authorizations to others)  Constraint: A more specific rule regarding an aspect of the object and action. 16By:-Gourav Kottawar
  • 17.  For e.g a user with TS clearance can read a table with C clearance , but a user with C clearance is not allowed to read a table with TS classification. (Simple Security Property)  *_Property: For e.g a user with S clearance can write only objects with S or TS classification.  In case of Multilevel security notions into the relational database model, it is common to consider attribute values & tuples as data objects.  Each attribute is associated with a classification C.  Each attribute value is associated with a corresponding security classification. 17By:-Gourav Kottawar
  • 18.  RBAC emerged in 1990s as a proven technology for managing & enforcing security in large scale enterprise wide systems.  Its basic notion is that permissions are associated with roles, & users are assigned to appropriate roles.  Roles can be created using CREATE ROLE & DESTROY ROLE commands.  RBAC appears to be a viable alternative to traditional discretionary & mandatory access controls; it ensures that only authorized users are given access to certain data or resources.  User create sessions during which they may activate a subset of roles to which they belong.  Each session can be assigned to many roles, but it maps to only one user.  Many DBMSs have allowed the concept of roles , where privileges can be assigned to roles. 20By:-Gourav Kottawar
  • 19.  Another important consideration in RBAC systems is the possible temporal constraints that may exist on roles, such as the time & duration of role activations & time triggering of a role by an activation of another role.  RBAC models have several desirable features , such as flexibility , better support for security management & administration.  RBAC can be effectively used for developing secure Web based applications , however MAC & DAC lack capabilities needed to support a secure web based application. 21By:-Gourav Kottawar
  • 20.  The previous access control mechanisms being strong countermeasures, may not be able to protect databases from some threats.  Suppose we communicate data, but our data falls into the hands of some invalid user.  In this situation , by using encryption we can disguise the message so that even if the transmission is diverted, the message will not be revealed.  Encryption is a means of securing data in a insecure environment.  Encryption consists of applying an encryption algorithm to data using some pre specified encryption key.  The resulting data has to be decrypted using a decryption key. 22By:-Gourav Kottawar
  • 21.  The DES (Data Encryption Standard )is a system developed by the U.S government for use by the general public.  It has been widely accepted as a cryptographic standard both in the United States & abroad.  DES can provide end-to-end encryption on the channel between the sender A & receiver B.  The DES algorithm is a careful & complex combination of two of the fundamental building blocks of encryption: Substitution & Transposition  The algorithm derives its strength from repeated application of these two techniques for a total of 16 cycles. 23By:-Gourav Kottawar
  • 22.  substitution :For example: a is replaced with D, b with E, c with F and z with C. In this way attack becomes DWWDFN. The substitution ciphers are not much secure because intruder can easily guess the substitution characters. Transposition:Plaintext: this is a test t h i s i s a t tiehssiatst! e s t ! 24By:-Gourav Kottawar
  • 23.  In 1976 Diffie & Hellman proposed a new kind of cryptosystems ,which they called public key encryption.  This algorithm uses two separate keys, in contrast to conventional encryption , which uses only one key.  The two keys are referred to as public key , & private key.  The private key is kept secret .  The Public key Encryption scheme: ◦ Plain Text ◦ Encryption Algorithm ◦ Pubilc key & Private key : Public key is used for encryption & Private key used for decryption. ◦ Cipher Text ◦ Decryption Algorithm 25By:-Gourav Kottawar
  • 24.  When John wants to send a secure message to Nipun, he uses Nipun 's public key to encrypt the message. Nipun then uses her private key to decrypt it. An important element to the public key system is that the public and private keys are related in such a way that only the public key can be used to encrypt messages and only the corresponding private key can be used to decrypt them. Moreover, it is virtually impossible to figure out the private key if you know the public key.  Public-key systems are becoming popular for transmitting information via the Internet. They are extremely secure and relatively simple to use. The only difficulty with public-key systems is that you need to know the recipient's public key to encrypt a message for him or her. 26By:-Gourav Kottawar
  • 25.  ciphertext (or cyphertext) is the result of encryption performed on plaintext using an algorithm, called a cipher .Ciphertext is also known as encrypted or encoded information because it contains a form of the original plaintext that is unreadable by a human or computer without the proper cipher to decrypt it. Decryption, the inverse of encryption, is the process of turning ciphertext into readable plaintext. 27By:-Gourav Kottawar
  • 26.  plaintext is information a sender wishes to transmit to a receiver. Cleartext is often used as a synonym. Plaintext has reference to the operation of cryptographic algorithms, usually encryption algorithms 28By:-Gourav Kottawar

Notas do Editor

  1. In the United States , there are numerous laws governing privacy of information.
  2. Inference Control
  3. REFERENCE: This privilege gives the account the capability to reference relation R when specifying integrity constraints.
  4. In addition in some models tuple classification attribute TC is also added to the relation attribute to provide a classification of each tuple as a whole.
  5. Thus RBAC becomes a superset model that can in turn mimic the behavior of MAC & DAC systems. Easier deployment over the Internet has been another reason for the success of RBAC.