Database Security
Database Security
Database Security
Outline
Objectives of Database security
Scope of database security
Countermeasures: computer based controls
Access Control Policies
DAC
MAC
RBAC
Slide 5/24
Countermeasures: computer based
controls
“BRAVE”
B ackup and Journaling
R AID technology
A uthorization Types of countermeasures
range from:
V iews – Physical controls to
– Administrative procedures
E ncryption
NB: despite the wide range of
controls, generally a DBMS is only
as secure as its operating system!
…,om }
… Rights R = { r1,
…,rk }
sn Entries A[si, oj]
R
A[si, oj] = { rx, …,
ry } means subject
si has rights rx, …,
ry over object oj
White
Server 1
Server 2
Server 3
Role 1
Server 1
Role 2 Server 2
Server 3
Role 3