IS unit 3 notes
IS unit 3 notes
•Database Security means protecting the database and the data inside it from:
It ensures that only the right people can access or change the data, and it stays safe and private.
Identity theft
Business losses
Legal issues
So, database security helps in keeping data safe, correct, and available.
1. Unauthorized Access – Hackers or even insiders trying to view or change data without
permission.
2. SQL Injection Attack – A trick where hackers put harmful code into input fields (like login forms)
to access data.
5. Loss or Theft of Backup – If backups are not secure, anyone can copy the database.
6. DoS Attacks (Denial of Service) – Attackers crash the database server by overloading it.
Example:
In a school database:
•Network Security means protecting computer networks (like internet or Wi-Fi connections) from:
Unauthorized access
Misuse
Hacking
Data theft
Attacks (like viruses or DoS)
•It ensures that the devices, data, and communications in a network stay safe and secure.
Share files
Access the internet
Send emails
Store and transfer personal or business data
Example:
In a college network:
To ensure:
Example:
With integration, all of this data is combined so the admin can see everything about a student in
one place.
3. Middleware Integration – Special programs (middleware) connect and exchange data between
systems.
4. Uniform Database – All data is moved into a single, new database structure.
Better decision-making
Data accuracy
Faster data access
Saves time and effort
Improved coordination between departments
•It ensures that only authorized users can view, update, or delete the data.
•In simple words, keeping the data private and safe from hackers or people who shouldn't see it.
Identity theft
Loss of trust
Legal actions
Example:
In a hospital database:
•Inferential controls are security techniques used in databases to prevent users from guessing
(inferring) sensitive data by analyzing available non-sensitive data.
•Even if some data is not directly shown (like someone's salary), a user might try to infer it by
combining or comparing different allowed queries.
•So, inferential controls stop users from making such indirect guesses.
Example:
Let’s say a college database hides students' individual marks but allows queries like:
Now if a class has only one student, the average = student’s mark, and secrecy is broken.
Query Restriction :-Blocks queries that return results from very few records (like 1 or 2
people
Noise Addition :-Adds random small errors to data (e.g., +/- 2 marks) to hide exact value
Data Suppression:- Hides or removes some query answers to prevent inferenc
Rounding :-Rounds off numerical answers (e.g., salary = 50,000 becomes ~50K
Audit Logs:- Tracks unusual query patterns that may lead to inference
•Sensitive data refers to important personal or confidential information that must be protected
from unauthorized access because it can cause harm or loss if leaked or misused.
Types of Sensitive Data:
Example:
In a college system:
A student's marksheet, ID number, and address are sensitive. Only the student and the admin
should have access—not everyone.
IS unit 3 notes
•Inference means figuring out secret or sensitive information by using non-sensitive or allowed
data.
•Even if a user is not allowed to see private data, they may still try to guess (infer) it using smart
queries or combining publiMultilevel Database – Explained Simply
Simple Example:
If Class A has only 1 student, then the average = that student’s marks, which is private.
So, even though the student’s marks are not directly shown, they can be inferred.
•Query Restrictions :-Blocks queries with too few records (e.g., 1 person)
•Noise Addition :-Adds small errors to hide exact results
•Data Suppression:- Hides results that might leak private data
•Audit Logs:- Monitors suspicious query activity
•It stores data at multiple classification levels (like confidential, secret, public), and only allows
users to see what they are authorized to see.
Example:
In a government database:
Each user sees only the data they are allowed, even though all data is stored in one system.
Main Components:
Benefits:
Challenges:
•Several proposals and models have been developed to implement and improve MLS, especially in
databases and operating systems.
Rules:
•No Read Up (NRU) – A user can’t read data above their clearance.
•No Write Down (NWD) – A user can’t write data to a lower level.
Rules:
•No Read Down (NRD) – A user can’t read data from a lower level.
Use: Useful in financial and medical systems where data accuracy matters.
Network security means protecting a computer network and the data flowing through it from
unauthorized access, misuse, hacking, data theft, or damage.
It ensures that:
Network threats are any actions or events that can harm, steal, disrupt, or damage a computer
network or the data being sent across it.
1. Unauthorized Access
2. Phishing Attacks
Fake emails or websites trick users into giving passwords or personal info
Example: “Your bank account is locked” emails
6. Sniffing (Eavesdropping)
Monitoring or capturing data packets flowing over a network
Often done on unsecured (open) Wi-Fi
7. Spoofing
8. Ransomware
Malware that locks your files and asks for money to unlock them
9. SQL Injection
Attacker puts harmful code into a website’s form to steal or delete data
An attacker uses newly discovered vulnerabilities before the software developer can fix them
Network security control means all the steps and tools used to protect a network from hackers,
viruses, and unauthorized access. These controls help to keep:
1. Physical Controls
2. Technical Controls
Firewall: Like a security guard – blocks harmful data from entering your network.
Antivirus: Detects and removes viruses and malware.
Encryption: Changes data into a secret code so that even if someone steals it, they can’t
read it.
VPN: Makes your internet connection private and secure, even on public Wi-Fi.
IDS (Intrusion Detection System): Monitors the network and gives alerts if it finds anything
suspicious.
3. Administrative Controls
These are rules and policies made by organizations to ensure network safety.
Example: A rule that all users must change their passwords every month.
Other examples:
Training employees not to click on unknown links
Giving limited access to new employees
Regular audits to check for risks
Because they:
What is a Firewall?
•A firewall is like a security guard between your computer/network and the outside world (like the
internet).
•It monitors, filters, and blocks unwanted or dangerous traffic based on rules.
Purpose of a Firewall:
Types of Firewalls:
3. If safe → lets it in
4. If unsafe → blocks it
Firewall Examples:
•An Intrusion Detection System (IDS) is like a watchman or security alarm for a network or
computer system.
•It keeps an eye on all the activity and gives a warning if it sees anything suspicious or
unauthorized.
Detection Methods:
1. Signature-Based Detection:
2. Anomaly-Based Detection:
Detects unusual behavior (e.g., a user logging in at midnight).
Can catch new attacks but may give false alarms.
Example:
3. Signature-Based IDS
Works like an antivirus: It checks traffic against known patterns of attacks (signatures).
Good for: Detecting known attacks quickly.
Limitation: Can’t detect new or unknown threats.
Example: Detecting a virus that’s already in the database.
4. Anomaly-Based IDS
Learns normal behavior of the system or user.
Detects anything unusual (e.g., logging in at odd hours).
Good for: Catching new or unknown attacks.
Limitation: Can give false alarms.
Example: Alerting if a user uploads a huge file at midnight.
5. Hybrid IDS
•Secure email is a way of sending and receiving emails in a safe and private manner, so that:
1. Encryption:
2. Digital Signature:
3. Authentication:
ProtonMail
Tutanota
Zoho Mail (with encryption options)
Gmail (uses TLS, but not end-to-end by default)