SlideShare a Scribd company logo
2
Most read
3
Most read
16
Most read
Database
Security And
Privacy
1
➢Database security issues
➢Discretionary access control based on grant & revoking
privilege.
➢Mandatory access control and role based access
➢Control for multilevel security
➢Encryption & public key infrastructures
Security and Privacy
Types of Security:
▶ Legal & Ethical issues regarding the right to access certain
information.
▶ System related issues such as the system levels at which various security
functions should be enforced , for e.g whether a security function should be
handled at the physical hardware level, the operating system level or the
DBMSlevel.
▶ The need in some organizations to identify multiple security levels & to
categorize the data & users based on these classifications , for e,g top
secret, secret, confidential, & unclassified.
▶ Policy issues at the governmental, institutional or corporate level as to what
kind of information should be made publicly available, for e.g credit ratings &
personal medical records.
Database Security Issues
Threats to database result in loss or degradation of
following security goals:
▶ Loss of Integrity: Database Integrity refers to the requirement that
information be protected from improper modification.
▶ Loss of Availability: Database availability refers to making objects
available to the user or a program to which they have a legitimate right.
▶ Loss of Confidentiality: Refers to the protection of data from
unauthorized disclosure.
▶ Unauthorized , unanticipated or unintentional disclosure could result in
loss of public confidence
▶ Modification of data includes creation, insertion , modification, changing
the status of data & deletion.
▶ Integrity is lost if unauthorized changes are made to the data by either
intentional or accidental acts.
By:-Gourav Kottawar 4
Threats to Database
To protect database against these types of threats
four countermeasures can be implemented:
▶ Access Control
▶ Flow Control
▶ Encryption
▶ Decryption
By:-Gourav Kottawar 5
Threats to Database(Cont.)
In a multi-user Database System , DBMS must provide techniques to enable
certain users or user groups to access selected portions of a database without
granting access to the rest of the database.
❖ There are two types of security mechanisms:
▶ Discretionary security Mechanisms: These are used to grant privileges to
users, including the capability to access specific data files, records , or
fields in a specific mode (such as read, insert, delete or update)
▶ Mandatory Security Mechanisms: These are used to enforce multilevel
security by classifying data & users into various security classes.
▶ Example: A role based security, which enforces policies & privileges based on
the concept of roles.
By:-Gourav Kottawar 6
Methods for Database Security
▶ A major problem to all computer systems is that of preventing
unauthorized persons from accessing the system itself.
▶ The security mechanisms of DBMS must include provisions for restricting
access to the database system as a whole.
▶ The function is called Access Control & is handled by creating user accounts
& passwords to control the login process by the DBMS.
By:-Gourav Kottawar 7
Access Control
DBA is the central authority for managing a database system.
DBA’s responsibilities include:
▶ Account Creation
▶ Privilege granting
▶ Privilege revocation
▶ Security level assignment
Access Control (Cont.)
▶ The typical method of enforcing discretionary access control in a database
system is based on the granting & revoking of privileges.
Types of Discretionary Privileges:
▶ There are two levels for assigning privileges to use the database system:
◦ The account level: DBA specifies the particular privileges that each
account holds independently of the relations in the database.
◦ The relation (table) level: DBA can control the privileges to access
each individual relation in the database.
9
Discretionary Access Control
▶ A user who creates a view has precisely those privileges on the view that he
or she has on the base tables used to define the view.
▶ The user creating the view must have the SELECT privilege on each
underlying table ,so is always granted the SELECT privilege on the view.
▶ The creator of the view has the SELECT privilege with the grant option only
if he or she has the SELECT privilege with the grant option on every
underlying table.
▶ The user automatically gets the same privilege on the view.
▶ A view may be dropped as a SELECT privilege is revoked from the user who
created the view.
▶ If the creator of the view gains additional privilege on the underlying
tables, he or she automatically gains additional privileges on the
view.
By:-Gourav Kottawar 10
Grant & Revoke on views & Integrity
Constraints
◦ In this method a user either has or does not have a certain privilege.
◦ This approach is known as mandatory access control.
◦ It is important to note that most of the commercial DBMSs currently
provide mechanisms only for discretionary access control.
However the need for multilevel security exists in government, military &
intelligence applications , as well as in many industrial & corporate
applications.
Typical security classes are:
◦ Top secret (TS)
◦ Secret (S)
◦ Confidential( C)
◦ Unclassified (U)
12
Mandatory Access Control
▶ Subjects: Individuals who perform some activity on the database. Might include
specific people or a group of users.
▶ Objects: Database units that require authorization in order to manipulate.
Database units might include an entire table, specific columns in a table, specific
rows in a table, etc.
▶ Actions: Any activity that might be performed on an object by a subject. For
example: Read, Modify, Insert, Write, Delete, Grant .
▶ Constraint: A more specific rule regarding an aspect of the object and action.
By:-Gourav Kottawar 12
Mandatory Access Control(Cont.)
▶ RBAC emerged in 1990s as a proven technology for managing & enforcing security
in large scale enterprise wide systems.
▶ Its basic notion is that permissions are associated with roles, & users are
assigned to appropriate roles.
▶ Roles can be created using CREATE ROLE & DESTROY ROLE
commands.
▶ RBAC appears to be a viable alternative to traditional discretionary &
mandatory access controls; it ensures that only authorized users are given
access to certain data or resources.
▶ User create sessions during which they may activate a subset of roles to which
they belong.
By:-Gourav Kottawar 13
Role Based Access Control
▶ The previous access control mechanisms
being strong countermeasures, may
not be able to protect databases from
some threats.
▶ Suppose we communicate data, but our data
falls into the hands of some invalid user.
▶ In this situation , by using encryption we can
disguise the message so that even if the
transmission is diverted, the message will not
be revealed.
▶ Encryption is a means of securing data
in a insecure environment.
▶ Encryption consists of applying an encryption
algorithm to
data using some pre specified encryption key.
▶ The resulting data has to be decrypted using a
decryption key. By:-Gourav Kottawar 14
Encryption & Public Key Infrastructure
▶ The DES (Data Encryption Standard) is a system
developed by the U.S government for use by
the general public.
▶ The DES algorithm is a careful & complex
combination of two of the fundamental
building blocks of encryption: Substitution &
Transposition
▶ The AES is a symmetric block cipher chosen by
U.S government to protect classified
information and is implemented in software
and hardware throughout the world to
encrypt data.
By:-Gourav Kottawar 15
The Data & Advanced Encryption Standards
▶ Public-key systems are becoming popular for transmitting
information via the Internet. They are extremely secure and
relatively simple to use. The only difficulty with public-key systems
is that you need to know the recipient's public key to encrypt a
message for him or her.
▶ Private-key system are known as a secrete type of key. It is created
as a part of Public-key. Public-key and Private-key are created are
paired for secured communication.Such as an Email.
Public-Key and Private-key
The Public key Encryption scheme:
◦ Plain Text
◦ Encryption Algorithm
◦ Public key & Private key : Public key is used for encryption &
Private key used for decryption.
◦ Cipher Text
◦ Decryption Algorithm
By:-Gourav Kottawar 17
Public Key Encryption
▶ Ciphertext (or cyphertext) is the result of encryption performed on
plaintext using an algorithm, called a cipher .
Ciphertext is also known as encrypted or encoded information because it
contains a form of the original plaintext that is unreadable by a human or
computer without the proper cipher to decrypt it. Decryption, the inverse
of encryption, is the process of turning ciphertext into readable plaintext.
By:-Gourav Kottawar 18
Cipher text
▶ Plaintext is information a sender wishes to transmit to a receiver.
Cleartext is often used as a synonym. Plaintext has reference to the
operation of cryptographic algorithms, usually encryption algorithms
Plaintext
Thank
You

More Related Content

PDF
Ch05
PDF
Database backup and recovery
PPTX
Directory structure
PPTX
File Organization
PPTX
Concurrency Control in Database Management System
PPSX
Functional dependency
PDF
Introduction to Database Management System
PDF
Dbms 3: 3 Schema Architecture
Ch05
Database backup and recovery
Directory structure
File Organization
Concurrency Control in Database Management System
Functional dependency
Introduction to Database Management System
Dbms 3: 3 Schema Architecture

What's hot (20)

PPTX
Database indexing techniques
PPTX
Data Dictionary
PDF
Sql grant, revoke, privileges and roles
PPTX
Integrity Constraints
PPTX
Object relational database management system
PPTX
Register allocation and assignment
PPTX
Three Address code
PDF
Users of dbms
PPT
12. Indexing and Hashing in DBMS
PPSX
Parallel Database
PPTX
Principal source of optimization in compiler design
PPTX
Introduction to distributed database
PDF
Chapter 6 Database Security and Authorization (4).pdf
PPTX
Recovery techniques
PPTX
Error Detection & Recovery.pptx
PPTX
1.4 data independence
PPS
Architecture of-dbms-and-data-independence
PPTX
Dbms 4NF & 5NF
PPT
11 Database Concepts
PPTX
Syntax-Directed Translation into Three Address Code
Database indexing techniques
Data Dictionary
Sql grant, revoke, privileges and roles
Integrity Constraints
Object relational database management system
Register allocation and assignment
Three Address code
Users of dbms
12. Indexing and Hashing in DBMS
Parallel Database
Principal source of optimization in compiler design
Introduction to distributed database
Chapter 6 Database Security and Authorization (4).pdf
Recovery techniques
Error Detection & Recovery.pptx
1.4 data independence
Architecture of-dbms-and-data-independence
Dbms 4NF & 5NF
11 Database Concepts
Syntax-Directed Translation into Three Address Code
Ad

Similar to Database security and privacy (20)

PPTX
Presentation on Database Security in DBMS
PPTX
Database Security Methods, DAC, MAC,View
PPTX
security and privacy in dbms and in sql database
PPTX
Security of the database
PPT
8034.ppt
PPTX
Database managementsystemes_Unit-7.pptxe
PPTX
databasemanagementsystemsecuritycyb.pptx
PPT
UNIT-1-Security.ppt
PDF
ch23-Database Security and Authorization.pdf
PDF
ch23-Database Security and Authorization.pdf
PPT
Security and Authorization introductory notes.ppt
PDF
UNIT 3- DATABASE INTEGRITY AND SECURITY CONCEPTS (1).pdf
PPTX
01 database security ent-db
PPTX
3130703_DBMS_GTU_Study_Material_Presentations_Unit-8_16102020044754AM.pptx
PPT
Data base security
PPTX
Database Security and Management Systems
PPTX
Group 8 - Database Security Version 1.pptx
PPT
UNIT 1 DBMS Security made by me it hrlps you to makr your future bright.ppt
PPTX
unit 5 in the database for master of Engineering
PPTX
Database security
Presentation on Database Security in DBMS
Database Security Methods, DAC, MAC,View
security and privacy in dbms and in sql database
Security of the database
8034.ppt
Database managementsystemes_Unit-7.pptxe
databasemanagementsystemsecuritycyb.pptx
UNIT-1-Security.ppt
ch23-Database Security and Authorization.pdf
ch23-Database Security and Authorization.pdf
Security and Authorization introductory notes.ppt
UNIT 3- DATABASE INTEGRITY AND SECURITY CONCEPTS (1).pdf
01 database security ent-db
3130703_DBMS_GTU_Study_Material_Presentations_Unit-8_16102020044754AM.pptx
Data base security
Database Security and Management Systems
Group 8 - Database Security Version 1.pptx
UNIT 1 DBMS Security made by me it hrlps you to makr your future bright.ppt
unit 5 in the database for master of Engineering
Database security
Ad

Recently uploaded (20)

PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
PPTX
Sustainable Sites - Green Building Construction
PPTX
Safety Seminar civil to be ensured for safe working.
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPT
Mechanical Engineering MATERIALS Selection
PPT
Project quality management in manufacturing
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
web development for engineering and engineering
PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
Sustainable Sites - Green Building Construction
Safety Seminar civil to be ensured for safe working.
Model Code of Practice - Construction Work - 21102022 .pdf
Mechanical Engineering MATERIALS Selection
Project quality management in manufacturing
OOP with Java - Java Introduction (Basics)
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
web development for engineering and engineering
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
CH1 Production IntroductoryConcepts.pptx
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx

Database security and privacy

  • 2. ➢Database security issues ➢Discretionary access control based on grant & revoking privilege. ➢Mandatory access control and role based access ➢Control for multilevel security ➢Encryption & public key infrastructures Security and Privacy
  • 3. Types of Security: ▶ Legal & Ethical issues regarding the right to access certain information. ▶ System related issues such as the system levels at which various security functions should be enforced , for e.g whether a security function should be handled at the physical hardware level, the operating system level or the DBMSlevel. ▶ The need in some organizations to identify multiple security levels & to categorize the data & users based on these classifications , for e,g top secret, secret, confidential, & unclassified. ▶ Policy issues at the governmental, institutional or corporate level as to what kind of information should be made publicly available, for e.g credit ratings & personal medical records. Database Security Issues
  • 4. Threats to database result in loss or degradation of following security goals: ▶ Loss of Integrity: Database Integrity refers to the requirement that information be protected from improper modification. ▶ Loss of Availability: Database availability refers to making objects available to the user or a program to which they have a legitimate right. ▶ Loss of Confidentiality: Refers to the protection of data from unauthorized disclosure. ▶ Unauthorized , unanticipated or unintentional disclosure could result in loss of public confidence ▶ Modification of data includes creation, insertion , modification, changing the status of data & deletion. ▶ Integrity is lost if unauthorized changes are made to the data by either intentional or accidental acts. By:-Gourav Kottawar 4 Threats to Database
  • 5. To protect database against these types of threats four countermeasures can be implemented: ▶ Access Control ▶ Flow Control ▶ Encryption ▶ Decryption By:-Gourav Kottawar 5 Threats to Database(Cont.)
  • 6. In a multi-user Database System , DBMS must provide techniques to enable certain users or user groups to access selected portions of a database without granting access to the rest of the database. ❖ There are two types of security mechanisms: ▶ Discretionary security Mechanisms: These are used to grant privileges to users, including the capability to access specific data files, records , or fields in a specific mode (such as read, insert, delete or update) ▶ Mandatory Security Mechanisms: These are used to enforce multilevel security by classifying data & users into various security classes. ▶ Example: A role based security, which enforces policies & privileges based on the concept of roles. By:-Gourav Kottawar 6 Methods for Database Security
  • 7. ▶ A major problem to all computer systems is that of preventing unauthorized persons from accessing the system itself. ▶ The security mechanisms of DBMS must include provisions for restricting access to the database system as a whole. ▶ The function is called Access Control & is handled by creating user accounts & passwords to control the login process by the DBMS. By:-Gourav Kottawar 7 Access Control
  • 8. DBA is the central authority for managing a database system. DBA’s responsibilities include: ▶ Account Creation ▶ Privilege granting ▶ Privilege revocation ▶ Security level assignment Access Control (Cont.)
  • 9. ▶ The typical method of enforcing discretionary access control in a database system is based on the granting & revoking of privileges. Types of Discretionary Privileges: ▶ There are two levels for assigning privileges to use the database system: ◦ The account level: DBA specifies the particular privileges that each account holds independently of the relations in the database. ◦ The relation (table) level: DBA can control the privileges to access each individual relation in the database. 9 Discretionary Access Control
  • 10. ▶ A user who creates a view has precisely those privileges on the view that he or she has on the base tables used to define the view. ▶ The user creating the view must have the SELECT privilege on each underlying table ,so is always granted the SELECT privilege on the view. ▶ The creator of the view has the SELECT privilege with the grant option only if he or she has the SELECT privilege with the grant option on every underlying table. ▶ The user automatically gets the same privilege on the view. ▶ A view may be dropped as a SELECT privilege is revoked from the user who created the view. ▶ If the creator of the view gains additional privilege on the underlying tables, he or she automatically gains additional privileges on the view. By:-Gourav Kottawar 10 Grant & Revoke on views & Integrity Constraints
  • 11. ◦ In this method a user either has or does not have a certain privilege. ◦ This approach is known as mandatory access control. ◦ It is important to note that most of the commercial DBMSs currently provide mechanisms only for discretionary access control. However the need for multilevel security exists in government, military & intelligence applications , as well as in many industrial & corporate applications. Typical security classes are: ◦ Top secret (TS) ◦ Secret (S) ◦ Confidential( C) ◦ Unclassified (U) 12 Mandatory Access Control
  • 12. ▶ Subjects: Individuals who perform some activity on the database. Might include specific people or a group of users. ▶ Objects: Database units that require authorization in order to manipulate. Database units might include an entire table, specific columns in a table, specific rows in a table, etc. ▶ Actions: Any activity that might be performed on an object by a subject. For example: Read, Modify, Insert, Write, Delete, Grant . ▶ Constraint: A more specific rule regarding an aspect of the object and action. By:-Gourav Kottawar 12 Mandatory Access Control(Cont.)
  • 13. ▶ RBAC emerged in 1990s as a proven technology for managing & enforcing security in large scale enterprise wide systems. ▶ Its basic notion is that permissions are associated with roles, & users are assigned to appropriate roles. ▶ Roles can be created using CREATE ROLE & DESTROY ROLE commands. ▶ RBAC appears to be a viable alternative to traditional discretionary & mandatory access controls; it ensures that only authorized users are given access to certain data or resources. ▶ User create sessions during which they may activate a subset of roles to which they belong. By:-Gourav Kottawar 13 Role Based Access Control
  • 14. ▶ The previous access control mechanisms being strong countermeasures, may not be able to protect databases from some threats. ▶ Suppose we communicate data, but our data falls into the hands of some invalid user. ▶ In this situation , by using encryption we can disguise the message so that even if the transmission is diverted, the message will not be revealed. ▶ Encryption is a means of securing data in a insecure environment. ▶ Encryption consists of applying an encryption algorithm to data using some pre specified encryption key. ▶ The resulting data has to be decrypted using a decryption key. By:-Gourav Kottawar 14 Encryption & Public Key Infrastructure
  • 15. ▶ The DES (Data Encryption Standard) is a system developed by the U.S government for use by the general public. ▶ The DES algorithm is a careful & complex combination of two of the fundamental building blocks of encryption: Substitution & Transposition ▶ The AES is a symmetric block cipher chosen by U.S government to protect classified information and is implemented in software and hardware throughout the world to encrypt data. By:-Gourav Kottawar 15 The Data & Advanced Encryption Standards
  • 16. ▶ Public-key systems are becoming popular for transmitting information via the Internet. They are extremely secure and relatively simple to use. The only difficulty with public-key systems is that you need to know the recipient's public key to encrypt a message for him or her. ▶ Private-key system are known as a secrete type of key. It is created as a part of Public-key. Public-key and Private-key are created are paired for secured communication.Such as an Email. Public-Key and Private-key
  • 17. The Public key Encryption scheme: ◦ Plain Text ◦ Encryption Algorithm ◦ Public key & Private key : Public key is used for encryption & Private key used for decryption. ◦ Cipher Text ◦ Decryption Algorithm By:-Gourav Kottawar 17 Public Key Encryption
  • 18. ▶ Ciphertext (or cyphertext) is the result of encryption performed on plaintext using an algorithm, called a cipher . Ciphertext is also known as encrypted or encoded information because it contains a form of the original plaintext that is unreadable by a human or computer without the proper cipher to decrypt it. Decryption, the inverse of encryption, is the process of turning ciphertext into readable plaintext. By:-Gourav Kottawar 18 Cipher text
  • 19. ▶ Plaintext is information a sender wishes to transmit to a receiver. Cleartext is often used as a synonym. Plaintext has reference to the operation of cryptographic algorithms, usually encryption algorithms Plaintext