Lecture 1
Lecture 1
2
Why Database Security?
• Most databases provide access spanning several
networks and across the world
• Most online transactions involve a database
• Water supplies, electricity grids, and gas and oil
production depend on a computer network to thrive
– Breach could have catastrophic impact
• Network intruders are well trained and growing more
sophisticated
3
A Secure Data Environment
• Database security
– Set of established procedures, standards, policies,
and tools
– Helps in protecting against theft, misuse, and attacks
– Deals with permission and access to the data structure
• Computer security
– Necessary element of database security
– Typically defined by the operating system (OS)
6
A Secure Data Environment (cont’d.)
• Network security
– Outermost layer of the database
– Arguably biggest security concern
– Set of established procedures, standards, policies,
and tools
– Goal: protect network from theft, misuse, and attacks
• Hardware and software devices used to secure a
network
– Firewalls, antivirus programs, network monitors,
intrusion detections systems, proxy servers, and
authentication servers
7
Database Security, Computer Security
and Network Security
8
Database Security Objectives
• Security measures
– Keep information private (privacy) from outside viewing
– Maintain consistency of data (integrity)
– Ensure resources remain at a high degree of
availability
• Key to achieving effective data security architecture
– Organization must maintain confidentiality, integrity,
and availability of its environment. These are called the
C.I.A features.
9
Figure 1-1 C.I.A. triangle
Courtesy Course Technology/Cengage Learning
10
Database Security Objectives (cont’d.)
• Confidentiality requirements
– Ensure information remains private by limiting
authorized access to resources
– Block unauthorized access to resources
• Confidentiality protected using authentication and
access controls
– State and federal laws may apply to these measures
• Breaches in confidentiality could result in:
– Stolen identity
– Exposed business trade secrets
11
Database Security Objectives (cont’d.)
• Integrity
– Reliable, accurate, and consistent data stored in and
retrieved from the database
– Protected by preventing accidental or
deliberate modifications
– Most difficult item to measure
• Auditing used to compare data with older, backed-
up versions of the data
• Results of integrity breaches
– Unreliable data, flawed programs, system failures
12
Database Security Objectives (cont’d.)
• Availability
– Maintaining accessible network or
database resources
– Business cannot operate without it
• Must identify potential threats to availability
– Assess threat level
– Plan appropriate intervention
– Example of threats: technical failures, natural
disasters, intrusions, user-caused harm
13
Who Are We Securing Ourselves
Against?
• Must understand what poses a threat
– More threats exist on the inside of a network than on
the outside
restriction access
14
Hackers
• Hacker
– Person who has mastered firmware and software
of modern computer systems
– Person who enjoys exploration and analysis
of network security without intent to cause
harm
• Cracker
– Person who breaks into a network to destroy or
steal information with intent to cause harm
15
Table 1-1 Types of online intruders 16
Social Engineers
• People who manipulate others to gain access to
systems, unauthorized areas, or confidential
information
– Often build trust with authorized user
– Use deception and trickery to convince
people to break normal security policies
– Example: asking for a
password, shoulder surfing, etc.
17
Computer Users
• Common mistake
– Not removing a user’s rights and account credentials
19
The Internet
• Spoofing
– Fraudulent Web site made to look identical to legitimate
Web site (e.g., Bank Phishing Website)
– Objective: draw in a user to gather personal information
(such as a password)
– Can be easy as registering a domain name that is a
slight misspelling of legitimate site (example: gogle
instead
google) of 22
The Internet (cont’d.)
• Web browser
– Application that interfaces client machine to Internet
– Responsible for sending and receiving user pages
– Has built-in programming language that can be manipulated
– Examples of Internet Web browser are like Chrome,
Firefox, Safari, etc.
23
The Internet (cont’d.)
• SQL injection
– Intruders append malicious code onto a
database- directed URL
– Intended to manipulate database into
sending confidential information
24
The Internet (cont’d.)
25
How DNS Works
26
Table 1-2 Common characteristics for dangerous Web sites
27
Misleading Applications
• Applications designed to deceive users into
believing their computer’s security has been
breached
– User downloads and purchases fake antivirus tools
– Tools deliver malware to user’s computer
– User has no knowledge of true security breach
28
E-mails
29
E-mails (cont’d.)
• Attachments
– Difficult to identify a fake attachment
– Crackers use attachment names and file
extensions to gain trust
• Spoofing e-mail address
– Using a false e-mail address in the “from” and
“reply” fields
– Increases likelihood that user will open
the attachment
30
E-mails (cont’d.)
• Phishing
– Attempt to obtain PII using spoofed e-
mail addresses and URLs
– Act of trying to fish information out of people
– May include convincing a user to click a link to
a cracker-owned Web site
– Common technique: fake holiday and birthday
card e-mails
• Web-embedded HTML
– HTML allows email to be formatted like a word
procession application
31
Instant Messages
32
Malware
• Capable of performing harmful and destructive
tasks on victim’s computers
• Can be written in many programming languages
• Types of malware
– Computer viruses
– Worms
– Trojans
– Spyware
– Adware
– Bots
– Ransomware
33
Computer Viruses
• Form of malware designed to spread from one
computer to another without detection
• Degree of danger varies:
– From annoying disturbances to destruction of
entire systems
• Characteristics found in malicious code
– Self-encryption
• Virus disguises the way it appears to a network
– Stealth
• Viruses make changes to the system
• Need to avoid detection by antivirus programs
34
Computer Viruses (cont’d.)
– Stealth (cont’d.)
• Intercepts requests from antivirus programs
and answers them, instead of the OS
– Polymorphism
• Ability to change forms to avoid detection
• Code changes signature each time it infects a file
– Residence (automated)
• Virus installs itself directly in computer’s main
system memory
• Virus does not need a user to make it active
35
Computer Viruses (cont’d.)
• Classes of viruses
– Logic bombs: viruses that corrupt data when
certain conditions are met
– Time bombs: time-delayed viruses
– Spyware: software that intentionally monitors
user’s activities
– Adware: malware used for marketing purposes
• Virus types
– Boot sector viruses load themselves onto the hard
drive’s boot sector
36
Computer Viruses (cont’d.)
37
Worms
• Self-replicating malware
• Do not need users to travel from one computer to
another
– Propagate across networks
• Elements of a worm’s travel
– Find a weak target
– Take control of the machine
– Interrogate the machine
– Test a new target
38
Table 1-3 Types of worms
39
Trojan Viruses
40
Trojan Viruses (cont’d.)
44
Phase 1: Assessment and Analysis
(cont’d.)
• Risk assessment steps
– List all devices and resources within a
database environment
– Identify vulnerabilities and assets involved with each
resource and device
– Define asset value and cost of damage from the
threats
– Create security measures to counteract the threats
– Prioritize the security measures
45
Phase 2: Design and Modeling
• Create policies and prototype security architecture
to fit business needs
• Entire organization should be included in the
process
– Policies must be realistic for user and business
needs
46
Phase 2: Design and Modeling
(cont’d.)
• Design steps
– Define needed policies and procedures
– Identify firmware and software changes to
support the policies
– Create an implementation plan
– Create baselines to determine success and failure
– Define a plan for user training and awareness
47
Phase 3: Deployment
48
Phase 4: Management and Support
49
Global Policies for the Database
Environment
• Operational information security
– Ensures secure operation of an organization
– Uses reliable policies and procedures
– Has necessary component for maintaining
database environment
• Aspects of information security
– Security policies
– Change management
– Update management
– Disaster recovery plan
50
Security Policies
• Update
– Small change to already installed software
or firmware
• Upgrade
– Replacement for older version of software
• Components of an update management policy
– Patch update procedures
– Software update procedures
– OS upgrade procedures
– Firmware change procedures
52
Update and Upgrade Management
(cont’d.)
• Upgrades should not be applied to a database
immediately after release
– Good practice to wait months or years until stable
• Questions to ask
– Is the update/upgrade really necessary?
– What are the possible repercussions of the install?
• Create a test environment to test the upgrade
• Put a recovery and restore plan in place to reverse
the upgrade if needed
– Back up files in case reversal does not work
53
Update and Upgrade Management
(cont’d.)
• Types of updates and upgrades
– Patch
• Small program used to fix or update
software programs or firmware devices
• Often created in response to newly
discovered vulnerability
– Software upgrade
– OS upgrade
• Most significant and risky upgrade
• Involves radical changes to both clients and servers
54
Backup Management Plan
• Backup
– Intentional copy of data, files, and
system configurations
– Used to archive and store information
– Used to replace files after network failure or attack
• Backup management plan
– Process to ensure safety of network data
• Backup solutions
– Many available today
– Choose best fit for data and business goals
55
Backup Management Plan (cont’d.)
• Questions to answer when choosing backup
strategy
– What media should I use?
– Where will backup be placed?
– What should be backed up?
– How often should information be saved?
– What time of day should backup occur?
– What type of backup should be completed?
56
The Disaster Plan
• Plan developed to ensure quick reinstatement of a
network after a human-caused or natural disaster
– Goal: restore most critical aspects of the business
• Plan should include:
– Contact information for emergency responders
– Roles and responsibilities of response staff
– Location and details of network backups
– Agreements with national service carriers
– Communications strategies
– Contract information for disaster recovery services
57
The Disaster Plan (cont’d.)
58
Summary
• Database security refers to policy, procedure, and
design efforts to mitigate threats to a database
system
• Effective database security requires confidentiality,
integrity, and availability
• Malware can exist in many forms
• Viruses spread from computer to computer without
detection
• Worms self-replicate by harnessing power of
networks and using power to attack networks
59
Summary (cont’d.)
61