Documente Academic
Documente Profesional
Documente Cultură
Policy issues
as to what kinds of information should not be made publicly
available-for example, credit ratings and personal medical
records
System-related issues
whether a security function should be handled at the physical
hardware level, the operating system level, or the DBMS level
Threats to Databases
Loss of integrity
Improper modification of information.
Modification creation, insertion, modification, changing
the status of data, and deletion. by either intentional or
accidental acts.
If not corrected may contaminate system corrupt data
inaccuracy
Loss of availability
Objects unavailable to user with legitimate right.
Loss of confidentiality
unauthorized disclosure of confidential information
intentional, unanticipated, or unintentional could result
in loss of public confidence, embarrassment, or legal action
Countermeasures
To protect databases against these types
of threats four kinds of countermeasures
can be implemented:
Access control
Inference control
Flow control
Encryption
Countermeasures: Inference
control
The security problem associated with databases is
that of controlling the access to a statistical
database, which is used to provide statistical
information or summaries of values based on various
criteria.
Must allow access to certain information needed but not all
Inference Control
The process of performing queries and deducing
unauthorized information from the legitimate
responses received
Example: Inference
Countermeasures: Perturbation
Example: Perturbation
14
15
Countermeasures: Encryption
A final security issue is data encryption,
which is used to protect sensitive data
(such as credit card numbers) that is being
transmitted via some type communication
network.
The data is encoded using some
encoding algorithm.
An unauthorized user who access encoded
data will have difficulty deciphering it, but
authorized users are given decoding or
decrypting algorithms (or keys) to decipher
data.
16
DBA
The DBA has a DBA account in the DBMS
Sometimes these are called a system or superuser
account
These accounts provide powerful capabilities such
as:
1.
2.
3.
4.
Account creation
Privilege granting
Privilege revocation
Security level assignment
Database Audits
The database system must also keep
track of all operations on the database
that are applied by a certain user
throughout each login session.
To keep a record of all updates applied to the
database and of the particular user who
applied each update, we can modify system
log, which includes an entry for each operation
applied to the database that may be required
for recovery from a transaction failure or
system crash.
19
Animated DataBase
Courseware
http://adbc.kennesaw.edu/
20
Database Audits
If any tampering with the database is
suspected, a database audit is performed
A database audit consists of reviewing the log
to examine all accesses and operations applied
to the database during a certain time period.
21
Application Security
22
Application Security
Application Security, the protection of an application against
security threats.
The current state of Application Security security has
been an afterthought.
Rather than focus on application focus on surrounding
environment
Application Security
In developing an application, you must look at all
possible threats
Attacker only needs to focus on 1
Misconceptions:
I have firewall I am safe
Firewall is good but it is not a complete solution by itself
25
26
A holistic approach to
security
"A vulnerability in a network will allow a
malicious user to exploit a host or an
application.
Avulnerability in a host will allow a
malicious user to exploit a network or an
application.
Avulnerability in an application will allow a
malicious user to exploit a network or a
host."
27
Carlos Lyons, Corporate Security,
Microsoft
A holistic approach
to
protect from TCP/IP-based
attacks
implement countermeasures
security
ensuring traffic integrity
http://msdn.microsoft.com/en-us/library/ff648636.aspx
Apply secure
configuration settings
e.g. Patches, updates,
registry, etc
28
Anatomy of an Attack
The basic approach used by attackers to target your Web application:
Survey and assess
survey the potential target to identify and assess its characteristics,
its vulnerabilities, potential entry points
Exploit and penetrate
Exploit vulnerabilities, get in usually through normal entry (logon
page, common pages)
Escalate privileges
They immediately attempt to escalate privileges e.g.
administration privileges
Maintain access
Having gained access to a system, an attacker takes steps to make
future access easier and to cover his or her tracks backdoor, take
over weak accounts
Deny service
Attackers who cannot gain access often mount a denial of service attack to
prevent others from using the application .
29
Application Threats
30
Fail securely
If an application fails, do not leave sensitive data
accessible.
Do not include details that may help an attacker exploit
vulnerabilities in your application.