0% found this document useful (0 votes)
99 views

Database Security 584

Database security refers to tools and measures to protect database confidentiality, integrity, and availability. It must address the data, database management system, applications, physical server, and network infrastructure used to access the database. Common threats include insider threats from malicious or negligent insiders; human error from weak passwords or sharing; exploitation of software vulnerabilities; SQL injections; denial of service attacks; and malware. Database security is important to safeguard data and prevent financial loss, reputation damage, and non-compliance with regulations from a database compromise.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
99 views

Database Security 584

Database security refers to tools and measures to protect database confidentiality, integrity, and availability. It must address the data, database management system, applications, physical server, and network infrastructure used to access the database. Common threats include insider threats from malicious or negligent insiders; human error from weak passwords or sharing; exploitation of software vulnerabilities; SQL injections; denial of service attacks; and malware. Database security is important to safeguard data and prevent financial loss, reputation damage, and non-compliance with regulations from a database compromise.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 7

G o v.

P o s t G r a d u a t e I s l a m i a C o l l e g e
Faisalabad

DATABASE SECURITY

M u h a m m a d Aw a i s E j a z
College Roll No. 584
University Roll No. 318835
Subject Information Security
BS Computer Science 7th Evening
Database Security
Database security refers to the range of tools, controls, and
measures designed to establish and preserve database
confidentiality, integrity, and availability. This article will
focus primarily on confidentiality since it’s the element
that’s compromised in most data breaches.
Database security must address and protect the following:
 The data in the database
 The database management system (DBMS)
 Any associated applications
 The physical database server and/or the virtual database
server and the underlying hardware
 The computing and/or network infrastructure used to
access the database
Common threats and challenges

Many software misconfigurations, vulnerabilities, or patterns of carelessness


or misuse can result in breaches. The following are among the most common
types or causes of database security attacks and their causes.
Insider threats
 An insider threat is a security threat from any one of three sources with
privileged access to the database:
 A malicious insider who intends to do harm
 A negligent insider who makes errors that make the database vulnerable to
attack
 An infiltrator—an outsider who somehow obtains credentials via a scheme
such as phishing or by gaining access to the credential database itself
 Insider threats are among the most common causes of database security
breaches and are often the result of allowing too many employees to hold
privileged user access credentials.
Human error
 Accidents, weak passwords, password sharing, and
other unwise or uninformed user behaviors continue
to be the cause of nearly half (49%) of all reported
data breaches.
Exploitation of database software
vulnerabilities
 Hackers make their living by finding and targeting
vulnerabilities in all kinds of software, including
database management software. All major
commercial database software vendors and open
source database management platforms issue
regular security patches to address these
vulnerabilities, but failure to apply these patches in a
timely fashion can increase your exposure.
SQL/NoSQL injection attacks
 A database-specific threat, these involve the insertion of arbitrary
SQL or non-SQL attack strings into database queries served by web
applications or HTTP headers. Organizations that don’t follow
secure web application coding practices and perform regular
vulnerability testing are open to these attacks.
Denial of service (DoS/DDoS) attacks
 In a denial of service (DoS) attack, the attacker deluges the target
server—in this case the database server—with so many requests that
the server can no longer fulfill legitimate requests from actual users,
and, in many cases, the server becomes unstable or crashes.
 In a distributed denial of service attack (DDoS), the deluge comes
from multiple servers, making it more difficult to stop the attack.
Malware
 Malware is software written specifically to exploit vulnerabilities or
otherwise cause damage to the database. Malware may arrive via
any endpoint device connecting to the database’s network.
Attacks on backups
 Organizations that fail to protect backup data with the same
stringent controls used to protect the database itself can be
vulnerable to attacks on backups.
 These threats are exacerbated by the following:
 Growing data volumes: Data capture, storage, and processing
continues to grow exponentially across nearly all organizations. Any
data security tools or practices need to be highly scalable to meet
near and distant future needs.
 Cybersecurity skills shortage: Experts predict there may be as
many as 8 million unfilled cybersecurity positions by 2022.
Why is database security important?
 Safeguarding the data your company collects
and manages is of utmost importance.
Database security can guard against a
compromise of your database, which can lead
to financial loss, reputation damage,
consumer confidence disintegration, brand
erosion, and non-compliance of government
and industry regulation.

You might also like