Database Recovery and Security Presentation (1)
Database Recovery and Security Presentation (1)
Security
Ensuring Data Availability, Integrity,
and Confidentiality
Presented by: [Your Name]
Date: [Insert Date]
Introduction
• • Database Recovery: Restoring a database
after a failure.
• • Database Security: Protecting data from
unauthorized access.
• • Importance: Maintains trust, prevents data
loss, ensures compliance.
What is Database Recovery?
• • Ensures database consistency after failures.
• • Maintains ACID properties.
• • Crucial after power loss, crashes, or
corruption.
Types of Failures
• • Transaction Failure: Logical/system errors.
• • System Crash: Sudden halt due to power or
software.
• • Media Failure: Physical damage to storage.
• • Application Error and Natural Disasters.
Recovery Techniques
• • Deferred Update: Changes post-commit.
• • Immediate Update: Changes logged before
commit.
• • Shadow Paging: Backup page versions.
• • Checkpointing: Periodic state saves.
Backup Strategies
• • Full Backup: Entire DB.
• • Incremental: Since last backup.
• • Differential: Since last full backup.
• • Point-in-Time: Restore to a specific time.
Database Security Overview
• • Objective: Confidentiality, Integrity,
Availability (CIA).
• • Prevent unauthorized access and ensure
data accuracy.
Threats to Database Security
• • External Attacks: Malware, exploits.
• • SQL Injection: Code injection.
• • Insider Threats: Misuse of access.
• • DoS Attacks, Privilege Escalation.
Security Mechanisms
• • Authentication & Authorization.
• • Access Control Policies.
• • Encryption (At Rest & In Transit).
• • Auditing and Logging.
Role of DBMS in Security
• • Manages users and roles.
• • Implements RBAC.
• • Supports encryption.
• • Logs activity and integrates with LDAP/AD.
Best Practices
• • Regular Backups and Off-site Storage.
• • Multi-Factor Authentication.
• • Patching and Updates.
• • Least Privilege Access.
• • Pen Testing and Audits.
Real-World Examples
• • Equifax (2017): Breach due to unpatched
vulnerability.
• • AWS Outage (2020): Recovery planning.
• • Sony PSN: Poor encryption led to data
breach.
Summary & Conclusion
• • Recovery ensures availability and
consistency.
• • Security defends against threats.
• • Critical for continuity, compliance, and trust.
Q&A
• • Questions?
• • Open floor for discussion.