Data Base Security Module 7 

advertisement
Module 7
Data Base Security
MModified by :Ahmad Al Ghoul
PPhiladelphia University
FFaculty Of Administrative & Financial Sciences
BBusiness Networking & System Management Department
RRoom Number 32406
EE-mail Address: ahmad4_2_69@hotmail.com
Network Security
Philadelphia
Universityl
Ahmad Al-Ghoul 2010-2011
1
Contents
 Concept of a Data Base
 Components of Data Bases
 Advantages of Using Data Bases
 Security Requirements
 Integrity of the Data Base
 Element Integrity
 Field Checks
 Access Control
 Change Log
Network Security
Philadelphia
Universityl
Ahmad Al-Ghoul 2010-2011
2
Concept of a Data Base
 Collection of data and a set of rules that organise the data
by specifying certain relationships among the data.
 The data items are stored in a file
 User is not concerned with the precise physical format of
the file.
 A data base administrator is the person
– who defines the rules that organise the data
– Controls who should have access to what parts of the data
 The user interacts with the database through a program
called data base manager or DBMS (front-end).
Network Security
Philadelphia
Universityl
Ahmad Al-Ghoul 2010-2011
3
Components of Data Bases
 The data base file consists of
– Records: contains one related group of data
– Each record contains fields or elements
 A data base can be viewed as a two-
dimensional table
 The logical structure of a data base is called
a schema
Network Security
Philadelphia
Universityl
Ahmad Al-Ghoul 2010-2011
4
Components of Data Bases
 The name of each column is called an attribute of the data
base.
 A relation is a set of columns.
 Users interact with data base managers through commands
that retrieve, modify, add or delete fields and records of the
data base
– Commands are called a query
 DBMSs have precise rules of syntax for queries.
SELECT NAME = ‘AYŞE’
retrieves all records having the value AYŞE in the NAME field.
 The result of executing a query is a subschema
Network Security
Philadelphia
Universityl
Ahmad Al-Ghoul 2010-2011
5
Advantages of Using Data Bases
 Shared access
– Many users can use one common, centralised set of data
 Min. Redundancy
– Individual users do not have to collect and maintain their own sets
of data
 Consistency
– A change to data value affects all users of data value
 Integrity
– Values are protected against accidental or malicious incorrect
changes
 Controlled access
– Only authorised users are allowed to view or modify data values
Network Security
Philadelphia
Universityl
Ahmad Al-Ghoul 2010-2011
6
Security Requirements
 Physical data base integrity
– İmmune to power failures
 Logical data base integrity
– Structure is preserved
 Element integrity
– Data contained in each element is correct
 Auditibility
– Trace who accessed/ modified elements
 Access control
– User is allowed to access to only authorised data
 User authentication
– To ensure every user is positively identified
 Availability
– Users can access the data base in general and all the data for which they
are authorised
Network Security
Philadelphia
Universityl
Ahmad Al-Ghoul 2010-2011
7
Integrity of the Data Base
 Trust the accuracy of the data values
 Updates are performed only by authorised
individuals
 Data must be protected from corruption
– The whole data base is damaged
– Individual data items are unreadable
 Integrity of the data base is the responsibility of
the DBMS
 Periodic back-ups of a data base
 DBMS must maintain a log of transactions
Network Security
Philadelphia
Universityl
Ahmad Al-Ghoul 2010-2011
8
Element Integrity
 Authorised users are responsible for putting
correct data into the data base
– Mistakes in collecting data
– Mistakes in computing results
– Mistakes in entering data
 The DBMS maintains the integrity by:
– Applying field checks
– Access control
– Change log
Network Security
Philadelphia
Universityl
Ahmad Al-Ghoul 2010-2011
9
25060
Field Checks
 Test for appropriate values in a position
– Numeric
– Uppercase letter
– A set of acceptable characters
 The check ensures that a value falls within
specified bounds or is not greater thatn the sum
of the values in two other fields
 Prevents simple errors as the data is enetered.
Network Security
Philadelphia
Universityl
Ahmad Al-Ghoul 2010-2011
10
Access Control
 A data base may contain data from different
sources
– Redundant data might have been stored in
many places
 Data bases have led to the collection and
control of this data at one central source
– Who has authorisation to update which
elements
– Policy issues
Network Security
Philadelphia
Universityl
Ahmad Al-Ghoul 2010-2011
11
Change Log
 A list of every change made to the data base
 The log contains
– Original
– Modified values
 With this log a data base administrator can
undo any changes that were in error.
Network Security
Philadelphia
Universityl
Ahmad Al-Ghoul 2010-2011
12
Download