Chapter 6
Chapter 6
Database Security
6.1 Introduction to Database Security
Issues
• Database security a broad area
– Legal & ethical, policy, and system-related issues
• Threats to databases
– Loss of integrity
• Improper modification of information
– Data integrity: assures that information and programs are changed only in a specified and
authorized manner
– System integrity: Assures that a system performs its operations in perfect manner.
– Loss of availability
• Legitimate user cannot access data objects.
• Availability: assure that systems works on time and service is not denied to authorized users
– Loss of confidentiality
• Unauthorized disclosure of confidential information
• Data confidentiality: Assures that confidential information is not disclosed to unauthorized
individuals
• Privacy: Assures that individual control or influence what information may be collected and
stored
Introduction to Database Security Issues (cont’d.)
26
Encryption and Public Key Infrastructures
(cont’d.)
• Symmetric key algorithms
– Also called secret key algorithms
– Need for sharing the secret key
• Can apply some function to a user-supplied password string at
both sender and receiver
• Symmetrical encryption is an old and best-known technique. ... The
sender and the recipient should know the secret key that is used to
encrypt and decrypt all the messages.
• Public (asymmetric) key encryption
– Involves public key and private key
– Private key is not transmitted
– Two keys related mathematically
• Very difficult to derive private key from public key
Encryption and Public Key Infrastructures
(cont’d.)
• Asymmetrical encryption
• is also known as public key cryptography, which is a
relatively new method, compared to symmetric
encryption.
• Asymmetric encryption
• uses two keys to encrypt a plain text. Secret keys are
exchanged over the Internet or a large network.
• It ensures that malicious persons do not misuse the
keys.
28
Encryption and Public Key Infrastructures
(cont’d.)
33
30.11 Summary
• Threats to databases
• Types of control measures
– Access control
– Inference control
– Flow control
– Encryption
• Mandatory access control
• SQL injection
• Key-based infrastructures
END!!!
35