Unit 1
Unit 1
Database security refers to the range of tools, controls, and measures designed to
establish and preserve database confidentiality, integrity, and availability.
Database security must address and protect the following:
The data in the database
The database management system (DBMS)
Any associated applications
The physical database server and/or the virtual database server and the underlying
hardware
The computing and/or network infrastructure used to access the Database security
is a complex and challenging endeavor that involves all aspects of information
security technologies and practices.
The more accessible and usable the database, the more vulnerable it is to security
threats; the more invulnerable the database is to threats, the more difficult it is to
access and use
Why is it important
• How much harm a data breach inflicts on your enterprise depends on a number of
consequences or factors:
• Devising and implementing a system for verifying the identity of users who
connect to the web server to view their bank statements, a process also known
as authentication.
• Analyzing the programs and scripts that operate the web site for flaws and
vulnerabilities (e.g., making sure that a web page that leads to the display of
one user’s account can’t be tricked into displaying the account of another user).
• Providing for secure, off-site backup of user information.
• Creating a secure logging and auditing facility that can be used for billing,
conflict resolution, and so-called “non repudiation” and investigation of
misuse.
• Balancing the load among multiple servers to protect against usage spikes
and hardware failures, and to provide responsive service.
• Creating a second data center so that in the event of a disaster (e.g., an
earth quake, blizzard, explosion, or invasion from outer space) affecting
the primary data center, services will continue.
• Providing for redundant Internet connections, using multiple service
providers, to minimize the chances that a service disruption on the Internet
will prevent users from reaching the web site.
• Securing your Domain Name Service (DNS) service so that an attacker
can’t change the domain name to point to another organization’s server
Securing the Web Server
• First, the computer itself must be secured using traditional computer security
techniques.
• Finally, you need to examine the operating system and the web service to see if
there are any unexpected interactions between the two that might compromise
• One of the best strategies for improving a web server’s security is to minimize
the number of services provided by the host on which the web server is
running. If we need to provide both a mail server and a web server, the safest
strategy is to put them on different computers. On the system that runs our
web service, design the system to run only our web services.
• Another good strategy for securing the information on the web server is to
restrict access to the web server. The server should be located in a secure
location, so that unauthorized people do not have physical access to the
equipment.
Policing copyright
• Many web developers also want to protect the information that they
put on their websites from unauthorized use.
13
How does a security risk
assessment work?
• Factors such as size, growth rate, resources, and asset portfolio affect
the depth of risk assessment models.
• Organizations can carry out generalized assessments when
experiencing budget or time constraints.
• However, generalized assessments don’t necessarily provide the
detailed mappings between assets, associated threats, identified
risks, impact, and mitigating controls.
• If generalized assessment results don’t provide enough of a
correlation between these areas, a more in-depth assessment is
necessary.
14
What problems does a security risk
assessment solve?
A comprehensive security assessment allows an organization to:
• Identify assets (e.g., network, servers, applications, data centers, tools, etc.)
within the organization.
• Create risk profiles for each asset.
• Understand what data is stored, transmitted, and generated by these assets.
• Assess asset criticality regarding business operations. This includes the
overall impact to revenue, reputation, and the likelihood of a firm’s
exploitation.
• Measure the risk ranking for assets and prioritize them for assessment.
• Apply mitigating controls for each asset based on assessment results.
15
Risk Analysis and Best Practices
• One traditional way to approach this problem is with the process of risk analysis, a
technique that involves gauging the likelihood of each risk, evaluating the potential for
damage that each risk entails, and addressing the risks in some kind of systematic order.
• the application of risk analysis to the field of computer security has been less successful.
• Risk analysis depends on the ability to gauge the likelihood of each risk, identify the
factors that enable those risks, and calculate the potential impact of various choices
Because of the difficulty inherent in risk analysis, another approach for securing
computers has emerged in recent years called best practices, or due car
• The 4 steps of a successful security risk assessment model:
• 1. Identification. Determine all critical assets of the technology
infrastructure.
• Next, diagnose sensitive data that is created, stored, or transmitted by
these assets. Create a risk profile for each.
• 2. Assessment. Administer an approach to assess the identified security
risks for critical assets. After careful evaluation and assessment, determine
how to effectively and efficiently allocate time and resources towards risk
mitigation. The assessment approach or methodology must analyze the
correlation between assets, threats, vulnerabilities, and mitigating controls.
• 3. Mitigation. Define a mitigation approach and enforce security controls
for each risk.
• 4. Prevention. Implement tools and processes to minimize threats and
vulnerabilities from occurring in your firm‘s resources
A comprehensive security assessment allows an organization to:
Identify assets (e.g., network, servers, applications, data centers, tools, etc.)
within the organization.
Create risk profiles for each asset.
Understand what data is stored, transmitted, and generated by these
assets.
Assess asset criticality regarding business operations. This includes the
overall impact to revenue, reputation, and the likelihood of a firm‘s
exploitation.
Measure the risk ranking for assets and prioritize them for assessment.
Apply mitigating controls for each asset based on assessment results
Cryptography and Web Security
• Today, cryptography is the fundamental technology used to
protect information as it travels over the Internet.
• Every day, encryption is used to protect the content of web
transactions, email, newsgroups, chat, web conferencing, and
telephone calls as they are sent over the Internet.
• Without encryption any crook, thief, Internet service provider,
telephone company, hostile corporation, or government
employee who has physical access to the wires that carry
your data could eavesdrop upon its contents.
• With encryption, it is possible to protect a message in such a
way that all of the world’s computers working in concert until
the end of time would be unable to decipher its contents.
• Cryptography can be used for more than scrambling
messages. Increasingly, systems that employ
cryptographic techniques are used to control access to
computer systems and to sign digital messages.
• Authentication Digital signatures can be used to identify a participant
in a web transaction or the author of an email message; people who
receive a message that is signed by a digital signature can use it to
verify the identity of the signer.
• Digital signatures can be used in conjunction with passwords and bio
metrics or as an alternative to them.
• Authorization Whereas authentication is used to determine the
identity of a participant, authorization techniques are used to
determine if that individual is authorized to engage in a particular
transaction. Cryptographic techniques can be used to distribute a list of
authorized users that is all but impossible to falsify.
• Confidentiality Encryption is used to scramble information sent over
networks and stored on servers so that eavesdroppers cannot access
the data’s content. Some people call this quality
Working Cryptographic Systems and Protocols
These systems fall into two categories.
The first category of cryptographic programs and protocols is used for
encryption of offline messages—mostly email.
The second category of cryptographic protocols is used for confidentiality,
authentication, integrity, and nonrepudiation for online communications.
PGP/OpenPGP PGP (Pretty Good Privacy)* is a complete working system for
the cryptographic protection of electronic mail and files.
OpenPGP is a set of standards (RFC 2440) that describe the formats for
encrypted messages, keys, and digital signatures.
PGP offers confidentiality, integrity, and nonrepudiation.
PGP was the first widespread public key encryption program.
• PGP is available in two ways: as a command-line program, which can be
run on many different operating systems, and as an integrated
application, which is limited to running on the Windows and Macintosh
platforms.
• With these plug-ins, the standard email packages can automatically send
and receive PGP-encrypted messages.
• S/MIME When we send an email with an attachment over the
Internet, the attachment is encoded with a protocol called the
Multipurpose Internet Mail Extensions,* or MIME.
• The MIME standard codifies the technique by which binary files, such
as images or Microsoft Word documents, can be encoded in a format
that can be sent by email. Secure/MIME† (S/MIME) extends the
MIME standard to allow for encrypted email. On the surface, S/MIME
offers similar functionality to PGP; both allow email messages to be
encrypted and digitally signed.
• Online Cryptographic Protocols and Systems Online cryptographic
protocols generally require real-time interplay between a client and a
server to work properly. The most popular online protocol is SSL,
which is used to protect information as it is sent between a web
browser and a web server.
Security professionals have identified five different roles that encryption
can play in modern information systems. In the interest of sharing a
common terminology, each of these different roles is identified by a
specific keyword. The roles are:
Authentication
Digital signatures can be used to identify a participant in a web
transaction or the author of an email message; people who receive a
message that is signed by a digital signature can use it to verify the
identity of the signer. Digital signatures can be used in conjunction
with passwords and biometrics (see Chapter 6) or as an alternative to
them.
Authorization
Whereas authentication is used to determine the identity of a participant,
authorization techniques are used to determine if that individual is
authorized to engage in a particular transaction. Crytographic
techniques can be used to disbribute a list of authorized users that is
Confidentiality
Encryption is used to scramble information sent over networks and stored on
servers so that eavesdroppers cannot access the data’s content. Some
people call this quality “privacy,” but most professionals reserve that word
for referring to the protection of personal information (whether confidential
or not) from aggregation and improper use.
Integrity
Methods that are used to verify that a message has not been modified while in
transit. Often, this is done with digitally signed message digest codes.
Nonrepudiation
Cryptographic receipts are created so that an author of a message cannot
realistically deny sending a message.
• Strictly speaking, there is some overlap among these areas. For
example, when a message is encrypted to provide confidentiality, an
unexpected byproduct is often integrity. That‘s because many
encrypted messages will not decrypt if they are altered.
Working cryptographic systems and protocols
• That is, one PGP key can be used to sign a second key.
Essentially, this means that the first person is using his key
to attest to the validity of the second person.
SSL is the encryption system that is used by web browsers such as Netscape
Navigator and Microsoft’s Internet Explorer, but it can be used with any TCP/IP
service.
SSL connections are usually initiated with a web browser using a special URL prefix.
For example, the prefix https: is used to indicate an SSL-encrypted HTTP connection,
whereas snews: is used to indicate an SSL-encrypted NNTP connection.
SSL offers confidentiality through the use of:
•User-specified encryption algorithms
•Integrity, through the use of user-specified cryptographic hash functions
•Authentication, through the use of X.509 v3 public key certificates
•
PCT
• The SSL 2.0 problems were also addressed in SSL 3.0 and,
as a result, use of PCT is decreasing.
DNSSEC creates a parallel public key infrastructure built upon the DNS
system.
• The DNSSEC standard is built into the current version of bind , the DNS
• IPsec works with IPv4, the standard version of IP used on today’s Internet. IPv6,
the “next generation” IP, includes IPsec.
Kerberos
• Kerberos is a network security system developed at
MIT and used throughout the United States.
• Kerberos does not use public key technology.
• Instead, Kerberos is based on symmetric ciphers and
secrets that are shared between the Kerberos server
and each individual user. Each user has his own
password, and the Kerberos server uses this password
to encrypt messages sent to that user so that they
cannot be read by anyone else.
• Support for Kerberos must be added to each program
that is to be protected.
• Currently, “Kerberized” versions of Telnet, FTP, POP,
SSH, and Sun RPC are in general use
• Kerberos is a difficult system to configure and administer.
• All in all, the legal issues with cryptography fall into the following three
categories:
1.Export Control Issues.
The US government treats certain forms of cryptographic
software and hardware as munitions and has placed them
under export control.
What it means is that a commercial entity seeking to export
certain cryptographic libraries or other software using these
libraries must obtain an export license first.
In recent years, the export laws have eased somewhat and it
has become possible to export freely a number of commercial
grade cryptographic software packages.
Most of the software and capabilities included in J2SE v1.4
falls under this category. However, it is possible to have
a JCE provider with capabilities that warrant review by export
control authorities and perhaps, an export license. A practical
manifestation of this fact is that a vendor of JCE provider
must get export clearance.
2.Import Control Issues.
Somewhat less intuitive is the fact that certain countries restrict the use of
certain types of cryptography within their jurisdiction. Under the jurisdiction
of these countries,
it is the responsibility of the user to ensure proper adherence to the law.
J2SE v1.4 handles this by tying cryptographic capabilities to jurisdiction
policy files.
The jurisdiction files shipped with the J2SE v1.4 allow "strong" but "limited"
cryptography by limiting the size of keys and other parameters. Those in
the US must download and install separate policy files to be able to use
"unlimited" capabilities.
• 3.Patent Related Issues.
A digital identity is the body of information about an individual, organization or electronic device
information is often used by website owners and advertisers to identify and track users for
the shadow data created by the individual’s actions online. A digital identity may be
unique ID. Digital identities are seen as contextual in nature since a user gives selective