Database Administration and Security

Download Report

Transcript Database Administration and Security

Database Administration and Security
Transparencies
1
Objectives
 The distinction between data administration and
database administration.
 The purpose and tasks associated with data
administration and database administration.
 The scope of database security.
 Why database security is a serious concern for an
organization.
 The type of threats that can affect a database system.
 How to protect a computer system using computerbased controls.
©Pearson Education 2009
2
Data administration and database
administration
 Data Administrator (DA) and Database
Administrator (DBA) are responsible for managing
and controlling activities associated with
corporate data and corporate database,
respectively.
 DA is more concerned with early stages of lifecycle
and DBA is more concerned with later stages.
©Pearson Education 2009
3
Data administration
 Management and control of corporate data, including:
 database planning;
 development and maintenance of standards, policies,
and procedures;
 conceptual and logical database design.
©Pearson Education 2009
4
Data administration tasks
©Pearson Education 2009
5
Database administration
 Management and control of physical realization of
a database system, including:
 physical database design and implementation;
 setting security and integrity controls;
 monitoring system performance;
 reorganizing the database.
©Pearson Education 2009
6
Database administration tasks
©Pearson Education 2009
7
Comparison of data and database
administration
©Pearson Education 2009
8
Database security
 Mechanisms that protect the database against
intentional or accidental threats.
 Not only apply to the data held in a database. Breaches
of security may affect other parts of the system, which
may in turn affect the database.
 Includes hardware, software, people, and data.
 Growing importance of security is the increasing
amounts of crucial corporate data being stored on
computer.
©Pearson Education 2009
9
Examples of threats and possible
outcomes
©Pearson Education 2009
10
Summary of threats to computer
systems
©Pearson Education 2009
11
Database security
 Threat is any situation or event, whether
intentional or unintentional, that may adversely
affect a system and consequently the organization.
 Outcomes to avoid:
 theft and fraud,
 loss of confidentiality (secrecy),
 loss of privacy,
 loss of integrity,
 loss of availability.
©Pearson Education 2009
12
Typical multi-user computer
environment
©Pearson Education 2009
13
Database security
 Computer-based countermeasures include:
 authorization,
 views,
 backup and recovery,
 integrity,
 encryption,
 redundant array of independent disks (RAID).
©Pearson Education 2009
14
Countermeasures - computer-based
controls
 Authorization
 The granting of a right or privilege that enables a
subject to have legitimate access to a database system
or a database system’s object.
 Authentication
 A mechanism that determines whether a user is, who
he or she claims to be. failure.
 Privilege
 A right granted by one user to allow another user or
group of users access to a database system or an object
in the database system.
©Pearson Education 2009
15
Countermeasures - computer-based
controls
 Views
 A view is a virtual table that does not necessarily exist
in the database but can be produced upon request by
a particular user, at the time of request.
 Backup and recovery
 Process of periodically taking a copy of the database
and log file (and possibly programs) onto offline
storage media.
©Pearson Education 2009
16
Countermeasures - computer-based
controls
 Journaling
 Process of keeping and maintaining a log file (or
journal) of all changes made to database to enable
recovery to be undertaken effectively in the event of
failure.
 Backup window
 The time period during which the database can be
backed up.
©Pearson Education 2009
17
Countermeasures - computer-based
controls
 Integrity
 Prevents data from becoming invalid, and hence
giving misleading or incorrect results.
 Encryption
 Encoding the data by a special algorithm that renders
the data unreadable by any program without the
decryption key.
©Pearson Education 2009
18
Countermeasures - computer-based
controls
 RAID
 A set or array of physical disk drives that appear to the
database user (and programs) as if they form one large
physical storage.
 Hardware that the DBMS runs on must be faulttolerant, meaning that the DBMS should continue to
operate even if one of the hardware components fails.
©Pearson Education 2009
19
Network security architecture three
tier database system architecture
©Pearson Education 2009
20
Countermeasures - network security
 Network security is the protect of servers from
intruders.
 Firewall is a server or router with two or more
network interfaces and special software that filters
or selectively blocks messages traveling between
networks.
 De-Militarized Zone (DMZ) is a special, restricted
network that is established between two firewalls.
©Pearson Education 2009
21