0% found this document useful (0 votes)
5 views14 pages

Chapter1 Intro

The document discusses the complexities of database security and outlines approaches to protect critical data assets by identifying risks and implementing appropriate measures. It emphasizes the importance of evolving security technologies, understanding data categorization, and adhering to security principles to maintain a balance between usability and protection. Additionally, it highlights the necessity of layered security policies and the ongoing adaptation of security strategies to address changing threats.

Uploaded by

lionosama621
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views14 pages

Chapter1 Intro

The document discusses the complexities of database security and outlines approaches to protect critical data assets by identifying risks and implementing appropriate measures. It emphasizes the importance of evolving security technologies, understanding data categorization, and adhering to security principles to maintain a balance between usability and protection. Additionally, it highlights the necessity of layered security policies and the ongoing adaptation of security strategies to address changing threats.

Uploaded by

lionosama621
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

DATABASE SECURITY

CSEC3360
Chapter 1: Security for Today’s World

Dr. Ruba Awadallah

Textbook: David C. Knox, William Maroulis, and Scott Gaetjen:Oracle Database 12c
Security.Thanks to Engineer Saif

01/03/2025 Dr. Ruba Awadallah


2
Dr. Ruba Awadallah

Introduction

▪ Computer security is a vast and complex subject.


▪ Ensuring the security of information within database systems
can be challenging.
▪ Good News: approaches to implement security are available.
▪ Covers the most relevant topics but not everything about
database security, there is more!

01/03/2025
3
Dr. Ruba Awadallah

The Security Landscape


➢ Security Approach:
• Identify your critical data assets
• Understand the risks and vulnerabilities to those assets
• Mitigate the risks to those assets.

➢ Understand WHAT you need to secure and WHY.


➢ Your job is to match the security measures you plan with the
goals you want them to achieve.

01/03/2025
4
Dr. Ruba Awadallah

The Security Landscape


➢ In most cases, money, time and effort are wasted on low-risk systems.
➢ High-risk areas are often overlooked.

❖ General guidelines:
1. Assume Compromise: start with the assumption that malicious people
can penetrate your networks and get to your databases.
2. It’s About the Data: Databases often hold much of important data.
3. The Insider Threat Is Always Present: Insider threats are serious
problems.

01/03/2025
5
Dr. Ruba Awadallah

Database Security Today


Examples:
1. The creation of record- or column-level access controls via
transparent query modifications (virtual private database).
2. The ability to perform conditional auditing—aka (fine-grained
auditing).

➢ Many of the security design patterns are focused on the security


needs of about 15 years ago
➢ Oracle Database 12c has incorporated significant advances in
allowing these outdated architectures to be retired.

01/03/2025
6
Dr. Ruba Awadallah

Evolving Security Technologies

There are many useful ways to think about the elements and
dimensions of security.
1. Integrity of the data and the system.
2. Ensuring the availability of the system.
3. Confidentiality of the data stored.

❖ Security can be described as an understanding of who gets


access to what, from where, when, and how.

01/03/2025
7
Dr. Ruba Awadallah

The Evolving Four

Authentication Access
Present an identity (who is Separation of
trying to perform what action) duties
and verify it is authentic.
Authentication is the technique
used to prove a user is who he
says he is.
Auditing, and Monitoring
Authorization Tracking, analyzing,
ensuring compliance,
Determines whether the protection. Auditing captures
system should allow or action successes and failures
prevent users from for accountability purposes.
performing specific actions or
accessing specific data.
(who gets access to what).

01/03/2025
8
Dr. Ruba Awadallah

❑ Difference between Authorization and Control:

✓ Authorizations do not actually control who gets access to what.

✓ Database security controls enforce access between user and data.

✓ Authorizations and the controls that ensure the enforcement of the


authorizations are not the same.

01/03/2025
9
Dr. Ruba Awadallah

How security has evolved over time

Proxy Authentication
Allow applications to use Enterprise User Security (EUS)
connection pools and pre- The end users (or application
create database connections, users) are managed in a central
i.e. Real Application Security Lightweight Directory Access
(RAS) Protocol (LDAP) with role
mapping

Multifactor Identity
No Anonymity
Security and access control can
Identity preservation: be based on authorization
process of maintaining the models that use roles and groups
end user’s identity from the because users might be
end user’s device to the unknown.
database

01/03/2025
Dr. Ruba Awadallah

Security Motivators
➢ Many applications are focused on functions with no consideration
for creating a security design in the overall architecture.
❑ Reasons:
1. Security may not make it into the first version of the application.
2. Adding security after the first version can be more costly than it
would be if it were designed from the start.
➢ Many believe that security is more important than ever,
reasons are:
3. Regulatory compliance.
4. The negative impacts that a compromise or data breach can have
on an organization.

01/03/2025
Dr. Ruba Awadallah

Sensitive Data Categorization

➢ Categorizing data and understanding how it is used helps us:


1. Understand its importance and subsequently derive a protection
plan.
2. Dictate how to protect the data.
3. Guidance for which database technologies and techniques to use.

➢ Categories of data:
• Personally identifiable information (PII).
• Protected health information (PHI), i.e. HIPAA in USA.
• Proprietary information and intellectual property.

01/03/2025
Dr. Ruba Awadallah

Principles
➢ You should adhere to a few principles when considering a solution to
your security challenges.
➢ Implementing the right amount of security is a delicate balance of
preserving:
✓ Ease of use
✓ Performance
✓ Manageability
➢ Doing so may assist you in preserving:
✓ Company brand.
✓ Reputation
✓ Viability
✓ Protecting your reputation and employability

01/03/2025
Dr. Ruba Awadallah

Layers of Common Security Policies

➢ Design your system with multiple layers of security wherever possible


❖ Security technologies such as Transparent Data Encryption (TDE) can
add a layer of security (encryption at rest)
❖ Adding a second layer of security by encrypting network packets to
and from the Database (encryption in motion) increases the security
posture of the system even more.

➢ Also, apply a security layer as close to the data as possible

01/03/2025
Dr. Ruba Awadallah

Summery

➢ Threatsto computersystemsarecontinuallychanging, so

security technologiesmustadapt accordingly

➢ Security landscaperhas changed

➢ Understand what youare toaccomplish

➢ Commonsecurity motivatorsserveas good referencemarkers

01/03/2025

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy