Professional Documents
Culture Documents
SECURITY
NAME – KAJAL RAJU PAWAR
CLASS – MA psychology PART 1
SERIAL NUMBER – 25
SUBJECT – INTRODUCTION TO CYBER SECURITY
OUTLINE
2: Fraudulent threat
Authorized users
• Those who abuse the privileges and authority.
Hostile agents
• Those improper users(outsider or insider)
• Who attack the software and/or hardware system , or read or write data in a database.
DATABASE PROTECTION
REQUIREMENTS
1. Protection from improper access.
2. Protection from inference.
3. Integrity of the database.
4. User authentication.
5. Multilevel protection.
6. Confinement.
7. Management and protection of sensitive data.
SECURITY CONTROLS
METHODS OF SECURING THE
DATABASE
Data encryption enables to encrypt sensitive data, such as credit card numbers,
stored in table columns.
Encrypted data is decrypted for a database user who has access to the data.
Data encryption helps protect data stored on media in the event that the storage
media or data file gets stolen.
ADVANTAGES OF DATA ENCRYPTION
As a security administrator, one can be sure that sensitive data is safe in case
the storage media or data file gets stolen.
you do not need to create triggers or views to decrypt data. Data from tables is
decrypted for the database user.
Database users need not be aware of the fact that the data they are accessing is
stored in encrypted form. Data is transparently decrypted for the database
users and does not require any action on their part.
Applications need not be modified to handle encrypted data. Data encryption /
decryption is managed by the database.
AUTHORIZATION
Select : allows read access to relation, or the ability to query using the view
Insert : the ability to insert tuples.
Update : the ability to update using SQL update statement.
Delete : the ability to delete tuples.
REFERENCE
Google
https://www.slideshare.net/mobile/amirkhanzada33/database-security-38334769
THANK YOU