S06 AdvDB DBSecurity
S06 AdvDB DBSecurity
Lecture
6
6
Database Security
Database Security
Faculty of Science and Technology Advanced Database 2/52
Outlines
Outlines
Introduction
Access Control Methods
Discretionary Access Control (DAC)
Mandatory Access Control (MAC)
Role Based Access Control
Introduction to Statistical Database Security
Reference: Chapter 24
Faculty of Science and Technology Advanced Database 3/52
Introduction to Database Security Issues Introduction to Database Security Issues
Security issues
Legal and ethical: the right to access certain information. Some
information may be deemed to be private and cannot be
accessed legally by unauthorized persons.
Policy: at the governmental, institutional, or corporate level as
to what kinds of information should not be made publicly
available
System-related: system levels. The physical hardware level, the
operating system level, or the DBMS level
The need to identify multiple security levels: top secret, secret,
confidential, and unclassified.
Faculty of Science and Technology Advanced Database 4/52
Introduction to
Introduction to
(3)
(3)
To protect databases against these types of threats four
kinds of countermeasures can be implemented:
Access control
creating user accounts and passwords to control login process by
the DBMS
Inference control
The countermeasures to statistical database security problem
Flow control
Prevents information from flowing in such a way that it reaches
unauthorized users
Encryption
protect sensitive data that is being transmitted via some type
communication network.
Faculty of Science and Technology Advanced Database 5/52
Access Control
Access Control
Subject: active entity that requests access to an object
e.g., user or program
Object: passive entity accessed by a subject
e.g., record, relation, file
Access right (privileges): how a subject is allowed to access
an object
e.g., subject s can read object o
Faculty of Science and Technology Advanced Database 6/52
Database Security and the DBA
Database Security and the DBA
The database administrator (DBA) is the central
authority for managing a database system.
The DBAs responsibilities include
granting privileges to users who need to use the
system
classifying users and data in accordance with the policy
of the organization
The DBA is responsible for the overall security of the
database system.
Faculty of Science and Technology Advanced Database 7/52
DBA
DBA
The DBA has a DBA account in the DBMS
Sometimes these are called a system or superuser account
These accounts provide powerful capabilities such as:
1. Account creation
2. Privilege granting
3. Privilege revocation
4. Security level assignment
Action 1 is access control, whereas 2 and 3 are discretionarym
and 4 is used to control mandatory authorization
Faculty of Science and Technology Advanced Database 8/52
Access Protection, User Accounts,
Access Protection, User Accounts,
and Database Audits
and Database Audits
Whenever a person or group of persons need to access a
database system, the individual or group must first apply for a
user account.
The DBA will then create a new account id and password for
the user if he/she thinks there is a legitimate need to access the
database
The user must log in to the DBMS by entering account id
and password whenever database access is needed.
Faculty of Science and Technology Advanced Database 9/52
Access Protection, User Accounts,
Access Protection, User Accounts,
and Database Audits
and Database Audits
(2)
(2)
The database system must also keep track of all
operations on the database that are applied by a
certain user throughout each login session.
To keep a record of all updates applied to the database
and of the particular user who applied each update, we
can modify system log, which includes an entry for each
operation applied to the database that may be required for
recovery from a transaction failure or system crash.
Faculty of Science and Technology Advanced Database 10/52
Access Protection, User Accounts,
Access Protection, User Accounts,
and Database Audits
and Database Audits
(3)
(3)
If any tampering with the database is suspected, a
database audit is performed
A database audit consists of reviewing the log to examine
all accesses and operations applied to the database
during a certain time period.
A database log that is used mainly for security purposes
is sometimes called an audit trail.
Faculty of Science and Technology Advanced Database 11/52
Access Control Methods
Access Control Methods
The typical method of enforcing discretionary access
control in a database system is based on the granting
and revoking privileges.
Discretionary Access Control (DAC)
grants privileges to users, including the capability to
access specific data files, records, or fields in a specific
mode (such as read, insert, delete, or update).
Mandatory Access Control (MAC)
classifies users and data into multiple levels of security,
and then enforces appropriate rules
Role-Based Access Control (RBAC)
Faculty of Science and Technology Advanced Database 12/52
DAC
DAC