Database Security
Download
Report
Transcript Database Security
Database Security
David Nguyen
Dangers of Internet
Web based applications open up new threats
to a corporation security
Protection of information is critical to
success of a business
Analyzing the threat
Internet access
Port access
Server access
Network access
Internet access
If hackers can guess the IP address of a
server, they can telnet to the server and get a
login prompt. At this point, all they need is
a user ID and password to gain access to the
server
Port access
All Web applications are configured to
listen on a predefined port for incoming
connections, and they generally use a
listener daemon process to poll for
connections.
Server access
A four-tiered Web application incorporates a
series of Web servers, application servers,
and database servers. Each of these servers
presents a potential point of entry, and if
remote shell access is enabled, a hacker that
gets access to a single database may get
access to many servers.
Network access
OracleNet, as an example, allows for
incoming connect strings to the Oracle
listener process. If hackers know the port, IP
address, Oracle ID, and password, they can
gain direct access to the database.
Countermeasures
Restricting server access
Server account disabling
Trusted IP addresses
Restricting database access
Authentication of users
Restricting server access
Some companies use domain servers to
restrict server access to specified users.
However, hackers still might intercept user
IDs and passwords. To prevent this, many
companies employ tools that utilise secure
shell (ssh) technologies to encrypt external
Internet communications.
Trusted IP addresses
UNIX servers are configured to answer only
pings from a list of “trusted” hosts. In
UNIX, one can restrict server access to a list
of specific users
Server account disabling
If you suspend the server ID after three
password attempts, attackers are thwarted.
Without user ID suspension, an attacker can
run a program that generates millions of
passwords until it guesses the user ID and
password combination.
Authentication of users
Kerberos security
Virtual private databases
Role-based security
Grant-execute security
Port access security
Kerberos security
Kerberos is a network authentication
protocol. It is designed to provide strong
authentication for client/server applications
by using secret-key cryptography
Virtual private databases
VPD technology can restrict access to
selected rows of tables
Role-based security
Object privileges can be grouped into roles,
which can then be assigned to specific users
Grant-execute security
Execution privileges on procedures can be
tightly coupled to users. When a user
executes the procedures, they gain database
access, but only within the scope of the
procedure
Port access security
All Oracle applications are directed to listen
at a specific port number on the server. Like
any standard HTTP server, the Oracle Web
Listener can be configured to restrict access
Conclusion
Allowing outside access to critical
applications creates vulnerabilities to a
company’s security
These threats need to be dealt with due to
the importance of the information