8. Database Security and Administration

Why do we care?
Data is valuable! it must be strictly controlled and managed, as with any corporate resource
The DBMS must ensure that the database is secure
Database security covers not only DBMS, but also its environment,

Security

Database Security

Protect against:

Computer-Based Controls
Authorisation

The granting of a right or privilege, which enables a subject to legitimately have access to a system or a system’s object

Access Control

Methods used to enforce authorisation

GRANT SELECT, UPDATE (salary)
ON Staff
TO Personnel, Director;

GRANT SELECT
ON Branch
TO PUBLIC
Views

Hiding parts of the database from certain users

Backup & Recovery

Backup data at regular intervals to a secure location
Journaling

Integrity Constraints

Through enforcing integrity constraints

Encryption

Public-key Infrastructure (PKI)
A set of roles, policies, hardware, software and procedures needed to create, manage, use, store, and revoke digital certificates and manage public-key encryption
CA - Certificate Authority

Hashing

Process of taking a group of characters, apply a hash function to it, to generate a fixed length hash value

DBMSs and Web Security

Internet communication relies on TCP/IP as the underlying protocol. However, TCP/IP and HTTP were not designed with security in mind. Without special software, all internet traffic travels ‘in the clear’ and anyone who monitors traffic can read it

You must ensure transmission over the Internet is:

Security measures include:

Data & DB Administration

Data administrator (DA)

Data Administration Tasks
Database Administration Tasks