tailieunhanh - Database Systems: Lecture 12 - Database Security An Introduction

Database Systems: Lecture 12 - Database Security An Introduction Introduction to Database Security Issues, Discretionary Access Control, Mandatory Access Control, RBAC (Role-Based Access Control), Encryption & PKI (Public Key Infrastructure). | Database Security: An Introduction Outline Introduction to Database Security Issues Types of Security Threats to databases Database Security and DBA Access Protection, User Accounts, and Database Audits Discretionary Access Control Types of Discretionary Privileges Specifying Privileges Using Views Revoking Privileges Propagation of Privileges Using the GRANT OPTION An example Weakness Mandatory Access Control Bell-LaPudula Model Comparing DAC and MAC RBAC (Role-Based Access Control) Encryption & PKI (Public Key Infrastructure) Introduction to Database Security Issues Types of Security Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels System-related issues: hardware level, os level, DBMS level The need to identify multiple security levels: classification (pha^ng ) Three Basic Concepts Authentication: a mechanism that determines whether a user is who he or she claims to be Authorization: the granting of a . | Database Security: An Introduction Outline Introduction to Database Security Issues Types of Security Threats to databases Database Security and DBA Access Protection, User Accounts, and Database Audits Discretionary Access Control Types of Discretionary Privileges Specifying Privileges Using Views Revoking Privileges Propagation of Privileges Using the GRANT OPTION An example Weakness Mandatory Access Control Bell-LaPudula Model Comparing DAC and MAC RBAC (Role-Based Access Control) Encryption & PKI (Public Key Infrastructure) Introduction to Database Security Issues Types of Security Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels System-related issues: hardware level, os level, DBMS level The need to identify multiple security levels: classification (pha^ng ) Three Basic Concepts Authentication: a mechanism that determines whether a user is who he or she claims to be Authorization: the granting of a right or privilege, which enables a subject to legitimately have access to a system or a system’s objects Access Control: a security mechanism (of a DBMS) for restricting access to a system’s objects (the database) as a whole Introduction to Database Security Issue(2) Threats Any situation or event, whether intentional or unintentional, that will adversely affect a system and consequently an organization Threats to: Computer systems Databases Threats to Computer Systems Blackmail: de doa Amendment: sua doi Scope of Data Security Needs Must protect databases & the servers on which they reside Must administer & protect the rights of internal database users Must guarantee the confidentiality of ecommerce customers as they access the database With the Internet continually growing, the threat to data traveling over the network increases exponentially Introduction to Database Security Issues (3) Threats to databases Loss of integrity Loss of availability Loss of .

TỪ KHÓA LIÊN QUAN
crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.