DBS unit 1 notes
DBS unit 1 notes
DBS unit 1 notes
UNIT 1 - NOTES
Regardless of the type of information system and purpose, an information system consists of the
following components:
Data – The information stored in the Database for future references or processing
People – DBA, System Admin, Programmers, Users, Business Analyst, System Analyst
DBMS:
Set of programs to access the database for data manipulation or processing
DBMS contains information about a particular enterprise
DBMS provides an environment that is both convenient and efficient to use
Purpose of DBMS:
1. Data redundancy and inconsistency
2. Difficulty in accessing data
3. Data isolation – multiple files and format
4. Integrity problems
5. Atomicity of updates
6. Concurrent access by multiple users
7. Security problems
DBMS Architecture:
INFORMATION SECURITY ARCHITECTURE:
Information Security:
Information is one of the most valuable asset in an organization. Many companies have
Information Security Department.
Information Security consists of the procedures and measures taken to protect each component of
the information systems involved in protecting information.
This means protecting data, hardware, software, networks, procedures and people. According to the
National Security Telecommunications and Information Systems Security Committee (NSTISSC) , the
concept of CIA Triangle , in which
“C” stands for“Confidentiality”,
“I” stands for“Integrity” and
“A” stands for “Availability”
CIA TRIANGLE:
Confidentiality Integrity
Information is classified Information is accurate
into different levels of and protected from
confidentiality to ensure tampering by
that only authorised unauthorised persons
Information is consistent
and validated
Availability
Information is available all the times only for
authorised and authenticated personsSystem is
protected from being shut down due to external
or internal threats or attacks
ISA
Confidentiality Integrity Availability
Privacy Laws
Security Technology
Threats and Attacks
Confidential
Security Models
System
Classification
Cryptography
Vulnerabilities
Technology
Policies and Authorization
Procedures
DBMS Technology
methodology
Access Rights
Database and Data
Authentication
Design
Customer Technology
Concerns
Application
Network Interface
Technology
Logical and
Physical Assets
Components of Information Security Architecture:
1. Policies and Procedures - Documented procedures and company policies that elaborate on how
security is to be carried out.
2. Security personnel and Administrators - People who enforce and keep security in order.
3. Detection equipment - Devices that authenticate employees and Detect equipment that is
prohibited by the company.
4. Security Programs - Tools that protect computer systems’ server.
5. Monitoring Equipment - Devices that monitor physical properties, employees and other important
assets.
6. Monitoring Applications - Utilities and applications used to monitor network traffic and Internet
activities.
7. Auditing Procedures and Tools - Checks and Controls put in place to ensure that security measures
are working.
DATABASE SECURITY:
One of the functions of DBMS is to empower DBA to implement and enforce security at all levels of
security.
A security access point is a place where database security must be protected and applied – in other
words implemented, enforced, and audited.
The Security access points illustrated in the below figure
People – Individuals who have been granted privileges and permissions to access networks, workstations,
servers, databases, data files and data
Applications – Application design and implementation, which includes privileges and permissions granted
to people
Network – One of the most sensitive security access points. Protect the network and provide network
access only to applications, operating systems and databases.
Operating Systems – This access point is defined as authentication to the system, the gateway to the
data DBMS – The logical structure of the database, which includes memory, executable and other
binaries
Data files – Another access point that influences database security enforcement is access to data
files where data resides. Data – The data access point deals with data design needed to enforce
data Integrity
Security gaps are points at which security is missing and the systems is vulnerable.
Vulnerabilities are kinks in the system that must be watched because they can be come threats.
In the world of information security, a threat is defined as a security risk that has high possibility of
becoming a system breach.
The structure of the database is organized in levels, and each level can be protected by a
different security mechanism.
MENACES TO DATABASES:
Security Vulnerability:
A weakness in any of the information system components that can be exploited to violate the integrity ,
confidentiality, or accessibility of the system.
Security Threat
A security violation or attack thatcan happen any time becauseofa security vulnerability
Security risk
A known security gap that a company intentionally leaves open
TYPES OF VULNERABILITIES:
Vulnerability means “ Susceptible to Attacks” ( Source :www.dictionary.com)
Intruders, Attackers and Assailers exploit vulnerabilities in Database environment to prepare and
start their attacks.
Hackers usually explore the weak points of a system until they gain entry
Once the intrusion point is identified , Hackers unleash their array of attacks
Virus
Malicious Code
Worms
Other Unlawful violations
To protect the system the administrator should understand the types of vulnerabilities The below
TYPES OF VULNERABILITIES:
Category Description Example
Installation and Configuration Results from default Incorrect application
installation Configuration configuration Failure to
that is known publicly Does change default
not enforce any security passwords Failure to
measures change default
Improper configuration or privileges
Installation may Using default installation which
result in security risks does not
enforce highsecurity measures
User Mistakes Security vulnerabilities are tied to Lack of Auditing controls
humans too Carelessness in Untested recovery plan Lack of
implementing procedures Failure activity monitoring Lack of
to follow through protection against malicious
Accidental errors code
Lack of applying patches as
they are released Bad
authentication or
implementation Social
Engineering
Lack of technical
information Susceptibility to
scam
Software Vulnerabilities found in Software patches that are not
commercial software for all types applied Software contains
of programs ( Applications, OS, bugs
DBMS, etc.,
System Administrators do not
keep track of
patches
Design and Implementation Related to improper software System design errors Exceptions
analysis and design as well as and errors are not handled in
coding problems and development
deficiencies Input data is not validated
TYPES OF THREATS:
Threat is defined as “ An indication of impending danger or harm” Vulnerabilities can escalate into
threats.
DBA , IS Administrator should be aware of vulnerabilities and threats.
Types of Risks:
People always tend to protect assets regardless of what they are, Corporations treat their assets in the
same way.
Assets are the infrastructure of the company operation.
Depending on the type of asset and how much the company values it, the company builds security policies
and procedures and execute actions to protect these assets.
There are four main types of assets
1. Physical assets – Also known as tangible assets, these include buildings, cars,hardware and so on
2. Logical assets – Logical aspects of an information system such as business applications, in-
house programs, purchased software, OS, DBs, Data
3. Intangible assets – Business reputation, quality, and public confidence
4. Human assets – Human skills, knowledge and expertise
Security measures are implemented based on the value of each asset.
For instance, if a company employs a scientist working on an important invention, the
company may take extra measures to avoid losing the intellectual asset she represents.
Similarly, every component in the database environment is protected according to its value.
31
The below diagram presents database security methodology side by side with the
software development life cycle (SDLC) methodology:
The following list presents the definition of each phase of the database security methodology:
Identification – Entails the identification and investigation of resources required and
policies to be adopted.
Assessment – This phase includes analysis of vulnerabilities, threats and risks for both
aspects of DB security.
Physical – Data files.
Logical – Memory and Code.
Design – This phase results in a blueprint of the adopted security model that is
used to enforce the security. Implementation – Code is developed or tools are
purchased to implement the blue print outlined in the previous phase.
Evaluation – Evaluate the security implementation by testing the system against attacks,
hardware failure, natural disasters and human errors.
Auditing – After the system goes into production, security audits should be performed
periodically to ensure the security state of the system.
32
OS is one of the main access point in DBMS.
An OS is having number of key functions and capabilities as outlined in the following list
Multitasking
Multi sharing
Managing computer resources
Controls the flow of activities
Provides a user interface to operate the computer
Administers user actions and accounts
Runs software utilities and programs
Provides functionalities to enforce the security measures
Schedules the jobs and tasks to be run
Provides tools to configure the OS and hardware
Model :
Bank Building – OS
Safe – DB
Money - Data
33
The Components of an OS Security Environment:
The three components (layers) of the OS are represented in the figure.
1. Memory component is the hardware memory available on the system.
2. Files component consists of files stored on the disk.
3. Service component compromise such OS features and functions as N/W services,
File Management and Web services.
SERVICES:
34
The main component of OS security environment is services.
It consists of functionality that the OS offers as part of its core utilities.
Users employ these utilities to gain access to OS and all the features the users are authorized
to use.
If the services are not secured and configured properly, each service becomes a
vulnerability and access point and can lead to a security threat.
FILES:
Files are another one component of OS. It has more actions
File Permission
File Transfer
File Sharing
File Permission:
Every OS has a method of implementing file permission to grant read, write or
execute privileges to different users. The following figure gives how the file
permissions are assigned to a user in Windows:
In UNIX, file permissions work differently than windows. For each file there are three
permission settings
Each setting consists of rwx ( r – read, w – write and x – execute)
First rwx is Owner of the file
Second rwx is Group to which owner belongs Third rwx is All other users
The below images gives the details of UNIX file permission:
35
File Transfer:
File Transfer – moving the file from one location to another location in a disk/web/cloud
FTP is an Internet service that allows transferring files from one computer to another
FTP clients and servers transmit usernames and passwords in plain text format (Not
Encrypted). This means any hacker can sniff network traffic and be able to get the logon
information easily.
Files also transferred as plain text format
A root account cannot be used to transfer file using FTP
Anonymous FTP is the ability to log on to the FTP server without being authenticated.
This method is usually used to provide access to files in the public domain. Here are some
best practices for transferring files
Never use the normal FTP Utility. Instead, use the secure FTP utility , if possible.
Make two FTP directories: one for file uploads with write permission only and
another one file is for file downloads with read permission.
Use specific accounts for FTP that do not have access to any files or directories
outside the file UPLOAD and DOWNLOAD directories.
Turn on logging , and scan the FTP logs for unusual activities on a regular basis.
Allow only authorized operators to have FTP privileges.
File Sharing:
Sharing files naturally leads to security risks and threats
The peer-to-peer technology is on rise( very well developed now) Peer-to-Peer programs
allow users to share the files over internet
36
If you were conduct a survey of users that use Peer-to-Peer programs,majority of the users’
machines are infected with some sort of virus,spyware, or worm.
Most companies prohibit the use of such programs. The main reason for blocking these
programs are:
Malicious Code
Adware and spyware
Privacy and confidentiality
Pornography
Copyright issues
Memory:
You may wonder how memory is an access points to security violations
There are many badly written programs and utilities that could change the content of
memory. Although these programs do not perform deliberate destructions acts.
On the other hand, programs that intentionally damage or scan data in memory are the type
that not only can harm the data integrity, but may also exploit data for illegal use.
AUTHENTICATION METHODS:
Authentication is the fundamental service of the OS. It is a process to very the user
identity
Most security administrators implement two types of authentication methods:
1. Physical authentication method allows physical entrance to the company
properties. Most companies use magnetic cards and card readers to control the
entry to a building office, laboratory or data center.
2. The Digital authentication method is a process of verifying the identify of the
user by means of digital mechanism or software
Digital Certificate:
Widely used in e-commerce
Is a passport that identifies and verifies the holder of the certificate.
Is an electronic file issued by a trusted party ( Known as certificate authority ) and cannot be
forged or tampered with.
37
Is a small electronic device that users keep with them to be used for authentication to a
computer or network system.
This device displays a unique number to the token holder, which is used as a
PIN( Personal Identification Number) as the password.
Digital Card:
Also known as security card or smart card.
Similar to credit card in dimensions but instead of magnetic strip.
It has an electronic circuit that stores the user identification information.
Kerberos:
Developed by Massachusetts Institute of Technology (MIT) , USA
It is to enable two parties to exchange information over an open network by assigning a
unique key. Called ticket to each user. The ticket is used to encrypt communicated
messages.
Easy to maintain
Can be employed for multiple purposes LDAP architecture is Client / Server based
38
Employs challenge / response authentication protocol uses an encryption and decryption
mechanism to send and receive passwords over the network.
This method is no longer used orsupported by newversionsof Windows OS
Authorization:
Authentication is the process of providing that users really are who they claim to be.
Authorization is the process that decides whether users are permitted to perform
the functions to they request. Authorization is not performed until the user is
authenticated.
Authorization deals with privileges and rights that have been granted to the user.
39
User Administration:
Authentication and authorization are essential services that every operating system
provides in order to secure access to the computer’s logical and physical resources. Another
related service is user administration.
Administrators use this functionality to create useraccounts, set password policies and
grant privileges to user.
Improper use of this feature can lead to security risks and threats.
The following is a compilation of best practices for user administration, in no specific order:
Use a consistent naming convention by adopting a combination of first name and
last name for the user account.
Always provide a password to an account and force the user to change it at the first
login.
Create a specific file system for users, separate from applications and data.
Lock accounts that are not used for a specific period of time.
Password Policies:
A good password policy is the first line of defense against the unwanted accessing of an
operating system.
The following password policies can be employed to devise a policy plan that suits a
company:
Password Aging
Password Reuse
Password History
Password Encryption
Password Storage
Password Complexity
Logon Retries
40
Password Protection
Single Sign-on
VULNERABILITIES OF OS:
E- MAIL SECURITY:
41
Benefits of Email Security
Shielding Against Phishing and Spoofing Attacks: Email security isn’t just about
tech jargon; it’s like having a digital bodyguard. It helps spot and tackle threats like
phishing or spoofing. These sneaky attacks can lead to serious breaches and even
unleash malware or other nasty viruses.
Locking Down Data: Think of email encryption as a virtual vault. It keeps sensitive
info—like credit card numbers, bank accounts, and employee details—safe from prying
eyes. No more accidental leaks or costly data breaches!
Whispers Only: Secure email encryption ensures that only the right people get the
message. It’s like passing a secret note in class—except the teacher won’t intercept it.
Your confidential content stays confidential.
Spotting the Bad Apples: Email security acts like a spam filter on steroids. It sniffs out
malicious or spammy emails that might sneak past regular defenses. No more falling for
those “You’ve won a million dollars!” scams!
Top-Secret Protection: Imagine your company’s secrets—intellectual property,
financial records, and classified info—wrapped in a digital force field. Email security
shields them from cyber villains like hackers and cyber criminals.
Real-Time Guardian: Zero-day exploits? Not on our watch! Email security solutions
provide real-time protection. It’s like having a superhero squad that fights off malware
and spam before they even knock on your inbox.
Locking Up Identity Theft: Email encryption keeps attackers from swiping your login
credentials or personal data. No more compromised accounts or identity theft
nightmares.
Email Security best practices
Building a Strong Email Security Foundation: Think of email security like
constructing a sturdy fortress. Start by layering your defenses:
o Effective Email Protection Solutions: These are like the castle walls. Choose
tools that can spot threats and keep your inbox safe.
o Threat Detection and Reporting: Imagine sentries on the lookout, alerting you
to any suspicious activity.
o Regular Updates: Keep your defenses sharp—like sharpening swords—to fend
off the latest cyber threats.
Guarding Sensitive Data: Picture a vault door. Implement policies to prevent users
from accidentally emailing sensitive info to outsiders. It’s like saying, “No, you can’t
send that secret recipe to the rival chef!”
Training Your Troops: Educate your team! Teach them to spot phishing and spoofing
emails (those digital shape-shifters), create rock-solid passwords, and avoid clicking on
sketchy links or mysterious attachments.
Encrypting Messages: Encrypting emails is like sealing them in an enchanted
envelope. Only the intended recipients can unlock the magic inside. No more
eavesdroppers!
Layered Defenses: Imagine shields, armor, and magical spells all working together.
Authentication, encryption, and isolation form your multi-layered defense. They’ll fend
off elaborate phishing plots, ransomware attacks, and other sneaky threats.
Stay Updated: Think of it as patching up your castle walls. Regularly update your
email security solutions to stay ahead of the cyber dragon’s fire-breath.
Types of Email threats
Phishing: Imagine a crafty imposter pretending to be your bank or favorite online store.
They send you an email, asking for your sensitive info—like passwords or credit card
details. Sneaky, right?
42
Social Engineering: Think of it as digital manipulation. The bad guys sweet-talk or
scare people into revealing confidential stuff. It’s like a cyber con artist pulling off a
heist.
Spear Phishing: This one’s like a sniper attack. Instead of casting a wide net, the
attacker aims at specific individuals or organizations. They craft personalized emails,
luring victims into their trap.
Ransomware: Picture your files locked up in a digital vault. The villain—malicious
software—holds them hostage until you pay a ransom. It’s like a cyber kidnapper!
Malware: Sneaky software that infiltrates your computer without asking permission.
It’s like a digital ninja wreaking havoc behind the scenes.
Spoofing: Imagine someone wearing a disguise at a masquerade ball. Attackers forge
email headers, making messages look legit—even when they’re not. Trust no masked
stranger!
Man-in-the-Middle Attack: Visualize a sneaky eavesdropper intercepting your
messages. They can read, alter, or inject new content.
Data Exfiltration: Sophisticated thieves sneak into an organization’s email system.
They swipe sensitive data—like secret recipes from a chef’s kitchen. Recipe theft,
anyone?
Denial of Service: Attackers flood email servers with a deluge of messages. Servers
buckle under the pressure, like a dam bursting. Chaos ensues!
Account Takeover: Imagine a cyber burglar breaking into your email house. They use
your account to send spam, phishing emails, or snoop around your secrets.
Identity Theft: Someone swipes your personal info—name, address, social security
number. They wear your identity like a stolen cloak, committing digital crimes.
Steps should be taken to Secure Email
Choose a secure password: Password must be at least 12 characters long, and contains
uppercase and lowercase letters, digits, and special characters.
Two-factor authentication: Activate the two-factor authentication, which adds an
additional layer of security to your email account by requiring a code in addition to your
password.
Use encryption: It encrypts your email messages so that only the intended receiver can
decipher them. Email encryption can be done by using the programs like PGP or
S/MIME.
Keep your software up to date. Ensure that the most recent security updates are installed
on your operating system and email client.
Beware of phishing scams: Hackers try to steal your personal information by
pretending as someone else in phishing scams. Be careful of emails that request private
information or have suspicious links because these are the resources of the phishing
attack.
Choose a trustworthy email service provider: Search for a service provider that
protects your data using encryption and other security measures.
Use a VPN: Using a VPN can help protect our email by encrypting our internet
connection and disguising our IP address, making it more difficult for hackers to
intercept our emails.
Upgrade Your Application Regularly: People now frequently access their email
accounts through apps, although these tools are not perfect and can be taken advantage
of by hackers. A cyber criminal might use a vulnerability, for example, to hack accounts
and steal data or send spam mail. Because of this, it’s important to update your
programs frequently.
43
Email Security Policies
The email policies are a set of regulations and standards for protecting the privacy, accuracy,
and accessibility of email communication within the organization. An email security policy
should include the following essential components:
Appropriate Use: The policy should outline what comprises acceptable email usage
inside the organization, including who is permitted to use email, how to use it, and for
what purpose email we have to use.
Password and Authentication: The policy should require strong passwords and two-
factor authentication to ensure that only authorized users can access email accounts.
Encryption: To avoid unwanted access, the policy should mandate that sensitive
material be encrypted before being sent through email.
Virus Protection: The policy shall outline the period and timing of email messages and
attachment collection.
Retention and Detection: The policy should outline how long email messages and their
attachments ought to be kept available, as well as when they should continue to be
removed.
Training: The policy should demand that all staff members take a course on email best
practices, which includes how to identify phishing scams and other email-based threats.
Incident Reporting: The policy should outline the reporting and investigation
procedures for occurrences involving email security breaches or other problems.
Monitoring: The policy should outline the procedures for monitoring email
communications to ensure that it is being followed, including any logging or auditing
that will be carried out.
Compliance: The policy should ensure compliance with all essential laws and
regulations, including the health
Insurance rules, including the health portability and accountability act and the General
Data Protection Regulation (GDPR)(HIPPA).
Enforcement: The policy should specify the consequences for violating the email
security policy, including disciplinary action and legal consequences if necessary.
Hence, organizations may help safeguard sensitive information and lower the risk of data
breaches and other security incidents by creating an email security strategy.
Now, Let’s look at how to enable the confidential mode in our Gmail account. With
Gmail.com, there is a feature called confidential mode that we may use to safeguard our
email. These are the steps to use this feature:
Step 1: On your computer, go to Gmail and click compose as shown in the below screenshot.
44
Step 2: If you have already enabled confidential mode for an email, click Edit in the bottom
right corner of the window to add an expiration date and a passcode. These setting impact
both the message text and any attachments.
If you select “No SMS passcode,” recipients using the Gmail app will be able to open it
directly and those who don’t use Gmail will receive an email with a passcode.
On the other hand, if you select the “SMS passcode” recipients will get a passcode by a text
message for that you have to provide the recipient’s phone number.
Step 3: After providing the phone number click the save button.
Step 4: In the next step write the email and sent it to the recipient.
45
Remove Access before Expiration:
We can prevent the receiver from viewing the email before it does. Prior to the
message’s expiration date or until the sender removes access, the recipient may examine the
message and any attached files. This mode disables attachments and prevents us from
copying, pasting, downloading, printing, or forwarding message text. Even so, while this
mode aids in preventing receivers from unintentionally sharing your email, it does not stop
them from capturing screenshots or images of your messages or attachments.
It does not stop receivers from capturing screenshots or images of your emails or
attachments, though this mode does make it more difficult for them to unintentionally share
your emails with others. The message or attachment can still be downloaded by the recipient
even if they have malicious software installed on their computer.
46