Chapter 10 Database Protection
Chapter 10 Database Protection
1. Access Control: It ensures that only authorized users can access the
database. This includes user authentication (username and password) and
authorization (setting permissions).
6. Data Masking: Masking sensitive data prevents the real data from being
visible to unauthorized users. This is useful in development and testing
environments.
7. Regular Updates and Patching: Database software and operating systems
should be kept secure through regular updates and patches. These are helpful
in fixing vulnerabilities.
Security Issues:
There are some common security issues in Database Management Systems
(DBMS) that can put the security of data at risk. Some important security
issues are mentioned here:
1. Unauthorized Access: If users are not granted appropriate permissions,
unauthorized logs can access the database, which may expose sensitive
data.
6. Data Loss: Data loss can occur due to hardware failures, natural
disasters, or accidental deletions. Taking regular backups is a good way
to avoid this.
7. Insecure Data Transmission: If the data is not encrypted when it is
being transferred through the network, then attackers can intercept
our data. Secure protocols, such as HTTPS, should be used.
Threats to Databases:
Databases have to face many types of threats. Here are some common
threats:
2. Insider Threats: Sometimes authorized users can misuse the data. These
could be employees or contractors who leak or manipulate sensitive
information.
7. Human Error: Sometimes human error can also create threats, such as
accidentally deleting data or making incorrect configurations.
Security Mechanisms:
What types of security mechanisms are used to ensure database security?
These mechanisms protect the database from unauthorized access, data
breaches, and other threats. Here are some common security mechanisms:
3. Encryption: Data encryption ensures that even if the data falls into the
hands of an unauthorized party, it cannot be used. This is applied to both
data at rest (stored data) and data in transit (transmitted data).
Role of DBA:
The role of Database Administrator (DBA) is to effectively manage the
database management system. Some key responsibilities of a DBA are:
1. Database Design: DBA designs the database, which includes schema
design, data modeling, and normalization. These ensure that data can
be stored and retrieved efficiently.
6. Troubleshooting: If any issue or error occurs, then DBA can solve the
problem by analyzing it. They provide technical support and try to
minimize system downtime.
7. Documentation: DBA maintains documentation of database
configuration, procedures, and policies. This is important for future
reference.
8. User Support: DBAs support users in using the database, handling their
queries and issues.
The role of DBA is critical because they ensure data integrity, availability, and
performance.
2. Flexibility: In DAC system owners have the flexibility to assign access rights
at their discretion. They want to be able to give read, write, or execute
permissions to anyone.
4. Security Risks: DAC system can be vulnerable because if the owner has
given access rights to someone, then that user can also give access rights to
other users, which can create security risks.
5. Common Usage: DAC is used in small networks or personal computers,
where users have to maintain control over their files and resources.
###Example:
If you are the owner of a document, you can decide whether your friend has
permission to view that document. If you want, you can give them only read
access or you can also give them permission to edit.
2. Backup Process:
- Backup Tool: Database management systems (DBMS) like MySQL, SQL
Server, or Oracle provide their own backup tools. You can take backup using
these tools.
- Command Execution: Backup command has to be executed.
For example, in MySQL you can use the `mysqldump` command:
mysqldump -u username -p database_name > backup_file.sql
3. Storage: Backup files should be stored in a secure location, such as external
hard drives, cloud storage, or offsite locations.