0% found this document useful (0 votes)
6 views

Database Security

Uploaded by

patilvilohith20
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views

Database Security

Uploaded by

patilvilohith20
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Here’s an overview of the topics related to

database security:
1. Security Issues
Threats to Databases:
• Unauthorized Access: Gaining access to
database systems or data without
permission. This could be due to weak
passwords, lack of proper access controls, or
exploited vulnerabilities.
• Data Breaches: Unauthorized exposure of
sensitive data, which can occur through
hacking, insider threats, or other security
lapses.
• SQL Injection: A technique used by attackers
to manipulate SQL queries to gain
unauthorized access or execute malicious
commands.
• Data Loss or Corruption: Accidental or
intentional deletion, modification, or
corruption of data due to system failures,
malware, or other issues.
• Denial of Service (DoS) Attacks: Disrupting
the normal functioning of a database by
overwhelming it with a flood of illegitimate
requests.
Access Control:
• User Authentication: Verifying the identity of
users accessing the database, typically
through usernames and passwords, but can
also involve multi-factor authentication
(MFA).
• User Authorization: Granting or restricting
access rights and permissions to different
users based on their roles or needs. This
involves defining roles, privileges, and access
levels.
• Database Roles: Assigning specific roles to
users (e.g., admin, read-only) to control what
actions they can perform on the database.
2. Encryption
Methods for Securing Data:
• Data-at-Rest Encryption: Encrypting data
stored in the database to protect it from
unauthorized access if physical security is
compromised.
• Data-in-Transit Encryption: Encrypting data
as it is transmitted between the database and
other systems or users to prevent
interception or eavesdropping.
• Column-Level Encryption: Encrypting specific
columns in a database table to protect
sensitive information while leaving other data
accessible.
Encryption Techniques:
• Symmetric Encryption: Uses the same key for
both encryption and decryption (e.g., AES -
Advanced Encryption Standard). It’s fast and
efficient but requires secure key
management.
• Asymmetric Encryption: Uses a pair of keys
(public and private) for encryption and
decryption (e.g., RSA - Rivest-Shamir-
Adleman). It’s more secure for key
distribution but slower compared to
symmetric encryption.
• Hashing: A one-way encryption technique
used to securely store passwords and ensure
data integrity (e.g., SHA-256). Hashes are
irreversible, making it difficult to retrieve the
original data from the hash.
3. Database Auditing
Techniques for Auditing Database
Activities:
• Audit Trails: Maintaining records of database
activities, such as login attempts, query
executions, and data modifications. This helps
in tracking user actions and identifying
potential security breaches.
• Log Monitoring: Regularly reviewing and
analyzing audit logs to detect unusual or
unauthorized activities. Automated tools can
assist in monitoring and generating alerts for
suspicious behavior.
• Access Logs: Tracking which users accessed
which parts of the database and what actions
they performed. This includes login times,
query execution, and data changes.
• Compliance Audits: Ensuring that the
database security practices comply with
industry regulations and standards (e.g.,
GDPR, HIPAA). Regular audits help in
identifying gaps and improving security
measures.
Let me know if you need more detailed
information on any of these topics!

You might also like