Chapter-3 - Database Security
Chapter-3 - Database Security
• Lecture-2
• Database Security Threats
• Aug 13, 2020 Thursday
Database Security Threats
• Security threat is any situation or event, whether intentional or
accidental, that may adversely affect a system and consequently the
organization.
• A threat may be caused by a situation or event involving a person,
action, or circumstance that is likely to bring harm to an organization.
• The harm may be tangible, such as loss of hardware, software, or data
• Or the harm may be intangible, such as loss of credibility or client
confidence.
Database Security Threats
• The problem facing any organization is to identify all possible threats.
• Therefore, as a minimum an organization should invest time and
effort in identifying the most serious threats.
• Any threat must be viewed as a potential breach of security which, if
successful, will have a certain impact.
• The following are the various types of threats.
Database Security Threats
• Using another person’s means of access
• Unauthorized amendment or copying of data
• Program alteration
• Inadequate policies and procedures that allow a mix of confidential
and normal output
• Wire tapping
• Illegal entry by hacker
Database Security Threats
• Creating ‘trapdoor’ into system
• Theft of data, programs, and equipment
• Failure of security mechanisms, giving greater access than normal
• Staff shortages or strikes
• Inadequate staff training
• Viewing and disclosing unauthorized data
Database Security Threats
• Electronic interference and radiation
• Data corruption owing to power loss or surge Fire (electrical fault,
lightning strike, arson), flood, bomb
• Physical damage to equipment
• Breaking cables or disconnection of cables
• Introduction of viruses
Database Security Threats
• The extent that an organization suffers as a result of a threat’s
succeeding depends upon a number of factors, such as the existence
of countermeasures and contingency plans.
• For example, if a hardware failure occurs corrupting secondary
storage, all processing activity must cease until the problem is
resolved.
• The recovery will depend upon a number of factors, which include
when the last backups were taken and the time needed to restore the
system.
Database Security Threats
• Obviously, it may not be cost-effective to spend considerable time,
effort, and money on potential threats that may result only in minor
inconvenience
• However, those events should be taken into account, particularly if
their impact would be significant.