Security of The Database
Security of The Database
Contents
What is Database Security? Issues in Database security How to Secure?
Access Control Mechanism Cryptography Backup and Recovery RAID Implementation Views Digital Signatures
1/16/2014
1/16/2014
Well, GRANT = To allow OR To give some rights, REVOKE = To cancel the GRANT i.e. Not to allow and Privileges = Permissions i.e. various commands like CREATE,UPDATE etc.
GRANT and REVOKE are Database Commands used to operate Database. We will use these commands like this,
GRANT [Privileges] ON [Database Objects] TO USER [With GRANT Option]; REVOKE [Privileges] ON [Database Object] FROM USER;
1/16/2014 6
Now you will wonder how security is classified? Well, it is classified using Bell-LaPadula Model.
1/16/2014 7
Role gives permissions to only authorized users to access the data. Thus Roles provides security in a smart and simple way.
1/16/2014
Cryptography
Cryptography is a way of enclosing the data called Encryption while Sending and disclosing that data called Decryption while it is received. Have a look at this,
1/16/2014
Cryptography
contd.
1/16/2014
11
RAID Implementation
RAID i.e. Redundant Array of Inexpensive Disks, is a category of disk drives that employ two or more drives in combination for fault tolerance and Performance. This Array of Disks have levels as follows,
Level 0: Provides data striping (spreading out blocks of each file across multiple disks) but no redundancy. This improves performance but does not deliver fault tolerance. Level 1: Provides disk mirroring.
Level 5: Provides data striping at the byte level and also stripe error correction information. This results in excellent performance and good fault tolerance.
Level 6: P+Q Redundancy Scheme i.e. Stores extra redundant information in case of disk failures.
1/16/2014 12
Views
A view is the dynamic result of one or more relational operations operating on the base relations to produce another relation. A view is a virtual relation that does not actually exist in the database, but is produced upon request by a particular user, at the time of request. The view mechanism provides a powerful and flexible security mechanism by hiding parts of the database from certain users.
1/16/2014
13
Oracle DBMS
System level security - name, password. User-level security is based on a privilege, i.e a right to execute a particular type of SQL statements or to access another users object. System privileges and object privileges.
1/16/2014 15 End of the Presentation
Thank You!
1/16/2014 16