1 / 9

Data & Database Administration

Data & Database Administration. Security Overview Physical Protection Network Protection Permissions Management Views as a Security Tool. Database Security. Database security is the management of risks and tradeoffs The risk of a loss Destruction of data Theft of data

ccassell
Télécharger la présentation

Data & Database Administration

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Data & Database Administration • Security Overview • Physical Protection • Network Protection • Permissions Management • Views as a Security Tool

  2. Database Security • Database security is the management of risks and tradeoffs • The risk of a loss • Destruction of data • Theft of data • Privacy issues (including legal liability) • Database corruption • Loss of availability • The cost of data security efforts

  3. Database Security (cont.) Name some database security measures and their costs What sorts of risks to they protect against?

  4. Security Action Categories • Physical Protection • Access Protection • Protection in Transit • Loss Prevention • Backup and Recovery plans covered next week

  5. Physical Protection • Don’t forget the step of physically protecting access to your equipment and data • Lock the door! • Be aware of portable copies of data, who has them, where they are • Recent news stories

  6. Network Protection • Use appropriate network access protections to guard against hacking into the network • Be aware of security threats • Weaknesses in the operating system • Database vulnerabilities • Application vulnerabilities • Expert consultation is desirable

  7. Authorization Rules or Permissions • Authorization rules are permissions to perform certain actions on the database • Allow a user to view, edit, or add records to a table • Permissions are granted to • Individuals • Groups • Permissions are granted on • Entire database • Distinct objects (tables, views, indexes, etc.) • Specific columns or rows

  8. Permissions • DBA is usually granted authority to do anything in the database • DBA may GRANT or REVOKE permissions to other users • May include permission to grant or revoke permission to others • Users may be assigned to a group and permissions granted to a group • Applications usually have security privileges established by the userid used in the connection string • Application must have appropriate permissions

  9. Views as a Security Tool • Views are query definitions stored in the DB • A security measure may be to grant the user permission on the view but not to the underlying tables • WHERE clauses in the view definition query can restrict rows • Field list in the SELECT clause can restrict columns • Views may be used like any other table in the DB • See discussion of other security measures • Encryption, authentication

More Related