database security write up
database security write up
Database security basically refers to the measures taken to protect databases, their contents, and
their users against unauthorized access, misuse, corruption, or loss. It's a critical aspect of
computer security, especially considering the sensitive and valuable nature of the data stored
within databases.
1. Authentication
2. Access control
3. Inference control
4. Flow control
5. Database Security applying Statistical Method
6. Encryption
1. Authentication:
Authentication is the process of confirmation that whether the user log in only
according to the rights provided to him to perform the activities of data base. A
particular user can login only up to his privilege but he can’t access the other
sensitive data. The privilege of accessing sensitive data is restricted by using
Authentication.
By using these authentication tools for biometrics such as retina and figure prints can
prevent the data base from unauthorized/malicious users.
2. AccessControl:
The security mechanism of DBMS must include some provisions for restricting
access to the data base by unauthorized users. Access control is done by creating user
accounts and to control login process by the DBMS. So, that database access of
sensitive data is possible only to those people (database users) who are allowed to
access such data and to restrict access to unauthorized persons.
The database system must also keep the track of all operations performed by certain
user throughout the entire login time.
3. InferenceControl:
This method is known as the countermeasures to statistical database security problem.
It is used to prevent the user from completing any inference channel. This method
protect sensitive information from indirect disclosure.
Inferences are of two types, identity disclosure or attribute disclosure.
4. FlowControl:
This prevents information from flowing in a way that it reaches unauthorized users.
Channels are the pathways for information to flow implicitly in ways that violate the
privacy policy of a company are called convert channels.
5. DatabaseSecurityapplyingStatisticalMethod:
Statistical database security focuses on the protection of confidential individual
values stored in and used for statistical purposes and used to retrieve the summaries
of values based on categories. They do not permit to retrieve the individual
information.
This allows to access the database to get statistical information about the number of
employees in the company but not to access the detailed confidential/personal
information about the specific individual employee.
6. Encryption:
This method is mainly used to protect sensitive data (such as credit card numbers,
OTP numbers) and other sensitive numbers. The data is encoded using some
encoding algorithms.
An unauthorized user who tries to access this encoded data will face difficulty in
decoding it, but authorized users are given decoding keys to decode data.