Database Security and Authorization
Database Security and Authorization
• Database Authorization
• It’s a process where database manager gets information about users.
Threats to database
• Loss of integrity the requirement that information
be protected from improper modification.
• Loss of availability refers to making objects available
to a human user or a program to which they have a
legitimate right.
• Loss of confidentiality refers to the protection of data
from unauthorized disclosure.
To protect databases against these types of threats, it is
common to implement four kinds of control measures:
Threat of DB Cont…
• ■ Access control :The security mechanism of a DBMS must
include provisions for restricting access to the database system
as a whole. This function, called access control, is handled by
creating user accounts and passwords to control the login
process by the DBMS.
• ■ Inference control :The corresponding control measures are
called inference control measures
• ■ Flow control : which prevents information from flowing in such
a way that it reaches unauthorized users.
• ■ Data encryption: which is used to protect sensitive data(such
as credit card numbers) that is transmitted via some type of
communications network. The data is encoded using some
coding algorithm.
Types of database security mechanisms