CIS 512
Professor: Angela Gabriel
Advanced Data and Computer Architectures
A discussion of some of the nuances
Of
Database Security
James A. Wallace
June 09, 2006 ABSTRACT:
When it comes to the topic of database security head just do not turn the way benchmarking world records and reports of ever-shorter downtimes do. However, security breaches do turn heads as well as undermine customer confidence, as the well-publicized thefts of credit card numbers from a few e-businesses showed in 2000. Databases introduce a number of unique security requirements for their users and administrators. On one hand, databases are designed to promote open and flexible access to data. On the other hand, this same open access makes databases vulnerable to many kinds of malicious activity. Moreover, as more businesses participate in the e-space, it becomes particularly important to separate private from public data. Securing a database involves not only establishing a strong policy, but also establishing adequate access controls. In this paper, we will discuss several of the various nuances of Database security.
TABLE OF CONTENTS
I. INTRODUCTION
II. UNDERSTANDING VULNERABILITIES
A. VENDOR BUGS
B. POOR ARCHITECTURE
C. MISCONFIGURATIONS
D. INCORRECT USAGE
E. SERVER SECURITY
F. DATABASE CONNECTIONS
G. TABLE ACCESS CONTROL
III. WHO NEEDS ASSESS TO THE DATABASE?
IV. BASIC SECURITY STRUCTURE
V. LEVELS OF ACCESS
VI. PRIVILEGES
VII. SECURING A DATABASE INVOLVES
VIII. AUTHENTICATION
IX. SECURE SOCKET LAYERS
X. SUMMARY
INTRODUCTION
Security is a journey, not a destination. You should never assume that any product or technique is secure, because you cannot possibly know what new attacks will become possible in the future. One of the more recent evolutions in network security has been the movement away from protecting the perimeter of the network to protecting data at the source. The reason behind this change has
Cited: Coronel, Carolo and Rob, Peter, “Database systems: Design, implementation, & Management “Sixth edition: Boston, MA, Thompson, 2004 Plew, Ronald R. and Stephens, Ryan K., “Database Design”, Indianapolis, IN: Sams Publishing, 2001 APPLICATION SECURITY, INC. “Database Security A Key Component of Application Security” Wiedman, Blake “Database Security (Common-sense Principles)”, Government Security org. “Database security breaches on the increase” 7th August 2002