DBMS - MODULE - 5
DBMS - MODULE - 5
MODULE 5:
Database Security
1. ACCESS CONTROLS
These are security features that control how people can interact with systems and
resources.
Goal is to protect from unauthorized access.
These are models which are associated with certain access control technologies and
security mechanisms to enforce their rules and objectives.
Three main types
a) Discretionary Access Control ((DAC)
b) Mandatory Access Control ((MAC)
c) Role Based Access Control (RBAC)
(
[1]
DBMS Notes Prepared By - Gautam Nath , Asst Professor , BVEC , Karimganj , Assam
[2]
DBMS Notes Prepared By - Gautam Nath , Asst Professor , BVEC , Karimganj , Assam
For example : Umair can access secret level data from Finance
Finance records are secret level data under Finance
[3]
DBMS Notes Prepared By - Gautam Nath , Asst Professor , BVEC , Karimganj , Assam
Note : RBAC is used by the majority of enterprises with more than 500
employees
4. INTRUSION DETECTION
An Intrusion Detection System (IDS) monitors our network for possible dangerous
activity, including malicious acts and violations of security protocols.
When such a problem is detected, an IDS alerts the administrator but doesn’t
necessarily take any other action.
There are several types of IDS and several methods of detection employed.
[4]
DBMS Notes Prepared By - Gautam Nath , Asst Professor , BVEC , Karimganj , Assam
Signature-based:
• Signature-based IDS relies on a preprogrammed list of known attack behaviors.
• These behaviors will trigger the alert.
• These “signatures” can include subject lines and attachments on emails known to
carry viruses.
Anomaly-based:
• Anomaly-based IDS begins at installation with a training phase where it “learns”
normal behavior on the network. It alerts an admin anytime it detects any deviation
from that model of normal behavior. AI and machine learning have been very
effective in this phase of anomaly-based systems.
5. SQL INJECTION
• Usually the purpose of this malicious code is to access data to steal it (like user
credentials) or delete it (to harm a business).
• There are a few different SQL injection types, including:
a) In-band: Here attacker uses the same channel to both inject the attack and
obtain their desired data results.
b) Out-of-band: Here attacker uses two different channels to send the attack and
then receive the results.
c) Inferential: Here attacker doesn’t transfer data through the web application
but instead send payloads to the database server to look at how it responds
and use the resulting information to infer information about the database. For
example response time of SQL query inferring to likely data volume.
System should be designed to prevent SQL injection by detecting user input and
interfaces.
By reviewing our existing code to check for possibility of vulnerabilities.
By using tools or software to keep an eye on the security of our system. E.g - Security
Event Manager , Netsparker Vulnerability Scanner etc.
[6]
DBMS Notes Prepared By - Gautam Nath , Asst Professor , BVEC , Karimganj , Assam
[7]