Database Security
Database Security
DATABASE
SECURITY
Database
2
Security
🠶 Integrity constraints are rules that define the correct states of a database.
🠶 Integrity entails data protection from malicious or accidental modification,
including the insertion of false data, contamination and the destruction
of data.
Deadline:
1 Access
0
🠶
Control
This is the selective restriction of access to a resource in the
database. It is a system of controlling data that is
accessible to a given user.
Read more:
Understanding
data processing
textbook.
Database
13
🠶 auditing
Database auditing involves observing a database so as to be aware of the
actions of database users. Database administrators and consultants often set
up auditing for security purposes, for example, to ensure that those without the
permission to access information do not access it.
Authenticatio
1
4
n Database
🠶 authentication is the process or act of confirming
that a user who is attempting to log in to a database is
authorized to do so, and is only accorded the rights to
perform activities that he or she has been authorized to do.
🠶 It may be performed by
a. the database itself,
b. the operating system,
c. a network service
d. the secured socket layer (SSL)
Database
15
🠶 encryption
Database encryption is a process that uses an
algorithm to transform data stored in a database into a
form that is incomprehensible without first being
decrypted.
🠶 A "meaningless" encrypted data is of little or no
use for hackers.
🠶 There are multiple techniques and technologies available
for database encryption.
Tutorial question
16
Tutorial Question:
• Outline situations where data backup will
prove useful.
Database
18 Administrator
He manages the database
1. He develops a security policy for the database
2. He creates new users
3. He assigns roles to each user of the database.
4. He handles database auditing.
5. He regularly ca rries out database backups.