Database Security in DBMS... 22

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 15

Database Security in

DBMS
GROUP MEMBERS:
Abdul Majeed: F2022065308
Muhammad Shahzad: F2022065281
Muhammad Zaroon : F2022065097
Muhammad Faruk : F2022065022
Jawad Ahmad: F2022065036
Introduction:

 DBMS (Database Management System) is a software that helps


store and manage data.
 DBMS is important because it helps organizations keep their data
organized and secure.
 However, DBMS faces threats like hacking, data theft, and
viruses, which can compromise data security.
 The goal of this project is to discuss ways to protect DBMS from
these threats.
Database Security Threats:

 Unauthorized access: someone accessing the database


without permission.
 Datatampering: someone modifying or deleting data
without permission.
 Databreaches: sensitive data falling into the wrong
hands.
 Malware and phishing: viruses and scams that can
harm the database.
Access Control:
 Authentication: (Verifying who are you)It's like showing your
library card at the entrance. The librarian checks your card to
make sure you're a member before letting you in.
 Authorization:(what you can do once you in) Once you're
inside, the librarian tells you what you're allowed to do. Maybe
you can borrow books, but not access restricted sections.
 Access Control Models: (rules that govern who can access
what) (e.g., DAC, MAC, RBAC). Think of this as the library's
rules. For instance, some areas might be off-limits to everyone
except librarians (like behind the counter). .
.
Data Encryption

 Encryption: Encryption is like putting that message in a locked


box. Only someone with the right key can open the box and read
the message.
 Types of encryption: symmetric (same key for locking and
unlocking) and asymmetric (different keys).
 Encryption algorithms: example, AES (Advanced Encryption
Standard) is like a super secure lock that's widely used for
keeping things safe. And RSA(Rivest-Shamir-Adleman) is
another type of lock that's good for sharing public keys securely
Data Backup and Recovery

 Backup: making a copy of data in case something goes


wrong.
 Importance of backups: so you don't lose data if the
database crashes or gets hacked.
 Recovery techniques: ways to restore data from
backups.
Recovery techniques:
 1. Backup Recovery: restoring a database from a backup copy.
 2. Checkpoint Recovery: recovering a database using periodic checkpoints.
 3. Shadow Recovery: maintaining a duplicate database for real-time
recovery.
 4. Mirroring Recovery: maintaining a duplicate database on a separate server
for real-time recovery.
 5. Point-in-time Recovery: restoring data to a specific point in time using
backups or logs.
 6. Disaster Recovery: restoring operations quickly after a catastrophic
failure, such as a server crash or natural disaster.1
 7. Backup Retention Policies: managing the retention of backups, including
frequency, storage, and duration.
Firewalls and Intrusion Detection Systems

 Firewalls: These are like protective walls around your database


that stop unauthorized people from getting in.
 - Network Firewalls: They're like guards at the entrance of your
network, checking who's coming in and going out.
 - Application Firewalls: These are like guards for specific
programs or apps, making sure they're safe from intruders.
 Intrusion Detection Systems (IDS): These are like watchful
dogs that bark when they sense something suspicious.
Firewalls and Intrusion Detection Systems

 - Network-based IDS (NIDS): They're like dogs sniffing around


your network, watching for any strange activity.
 - Host-based IDS (HIDS): These are like dogs guarding
individual computers, making sure nothing fishy is happening on
each one.
 Importance: Firewalls and IDS are super important because they
stop bad guys from getting into your database and warn you if
they try. It's like having locks on your doors and security cameras
in your house to keep burglars out.
Secure Sockets Layer (SSL) and Transport Layer
Security (TLS):

 SSL/TLS:
 SSL/TLS are like secret codes for messages sent over the internet. They turn
your messages into secret codes that only the sender and receiver can
understand.
 When you visit a secure website (like a bank), SSL/TLS ensures that your
login details and other sensitive information are encrypted, keeping them safe
from hackers.
 Importance in DBMS:
SL/TLS encrypts data in a DBMS, turning it into secret codes while it travels
between your computer and the database server, keeping it safe from hackers
trying to snoop on your information. It's like putting your data in a locked
box before
sending it, ensuring it stays scrambled and secure during transmission.
Database Security Policies:

 Importance: security policies provide guidelines for database


security
 Types of security policies:
 - Access control policies
 - Password policies
 - Encryption policies
 Example of a database security policy: a company's rules for
accessing and protecting sensitive data
Implementing Database Security in DBMS:

 Secure database design: The process of designing a database to


protect it from unauthorized access, data breaches, and other
security threats.
 -Normalization:The process of organizing data in a database to
minimize data redundancy(repeated data) and improve data
integrity(accuracy)
 -de-normalization:Combining tables to improve database
performance, especially for read-heavy operations.
 Secure database implementation: using secure features in DBMS
like Oracle, MySQL, and Microsoft SQL Server
 Security features in DBMS: access control, encryption, and
auditing (tracking database activity)
Case Study:

 Company Example:
 XYZ Corporation, a big financial company, worked hard to make sure their
database was super safe.
 Security Measures:
 They used special tools like locks and secret codes to keep their data safe from
hackers. These tools made sure only the right people could access their
important information.
 Benefits:
 By doing this, XYZ Corp stopped bad guys from stealing their data, protected
people's private info, and followed all the rules, making everyone happy and
safe.
Conclusion:

 In this project, we have delved into the world of database


security, discussing threats and how to counter them. We have
stressed the importance of securing databases within systems like
DBMS due to the wealth of sensitive information they hold. By
bolstering security measures, organizations can ensure the safety
and reliability of their data.
 Looking ahead, as technology advances, maintaining up-to-date
security protocols will be crucial in staying ahead of evolving
cyber threats.
References:

 That are links where we take data:


 https://ieeexplore.ieee.org/Xplore/home.jsp
 https://scholar.google.com.pk/
 https://link.springer.com/
 https://thoughtleadership.org/global-digital-library/

You might also like