0% found this document useful (0 votes)
16 views38 pages

Chap - 01 - Part 1

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views38 pages

Chap - 01 - Part 1

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 38

Database

Security
Chapter One
Security and Information Technology
Objectives
▪ Define the nature of database and information systems security
▪ Identify the three main security objectives when protecting
information systems
▪ Identify security threats
▪ Define and identify the characteristics of viruses and how they
infiltrate systems
▪ Identify specific types of operational security and describe how
to implement them

Database Security 2
Objectives (cont’d.)
▪ Describe the information security life cycle
▪ Describe the multilayered nature of security architecture

Database Security 3
Why Database Security?
▪ Most databases provide access spanning several networks and
across the world
▪ Most online transactions involve a database
▪ Water supplies, electricity grids, and gas and oil production
depend on a computer network to thrive
▪ Breach could have disastrous impact

▪ Network intruders are well trained and growing more


sophisticated

Database Security 4
A Secure Data
Environment
▪ Multiple layers of security / Defense In Depth
▪ The more security layers that we can apply, the more secure our
environment will be.
▪ Most effective approach to minimizing risk of data breach
▪ Requires intruders to bypass several layers of security controls

▪ Example of multiple security layers to protect against malicious


e-mail attachments
▪ User awareness training
▪ Filter on exchange server to remove known malicious attachments
▪ Firewall configured to deny certain types of traffic

Database Security 5
A Secure Data
Environment

Database Security 6
A Secure Data
Environment
▪ Policies, Procedures, and Awareness
▪ Password policies, security
training, data classification,
and enforcement of security
guidelines.
▪ It’s often called administrative
or procedural controls.
▪ Physical Controls
▪ This includes tangible
safeguards like locks, fences,
security guards etc
▪ Perimeter (Network Edge)
▪ Protects against external
threats using tools such as
firewalls, VPNs, and packet
filters to inspect and regulate
network traffic.

Database Security 7
A Secure Data
Environment
▪ Internal Network Security
▪ Inside the perimeter: IDS, IPS, internal
firewalls, and encryption used to secure
traffic within the network.
▪ Host Security
▪ Focuses on individual systems: patch
management, endpoint protection
(antivirus, EDR), hardening practices, and
secure configurations.
▪ Application Security
▪ Ensures secure operation of apps: single
sign-on (SSO), authentication and
authorization, supporting secure code and
SDLC integration.
▪ Data Security (Core Layer)
▪ Database encryption, access controls etc.

Database Security 8
A Secure Data Environment

Database Security 9
Class Activity
▪ Identify the
different types of
technical controls ?

Database Security 10
3 Database Security
Domains
Our Security strategy should
address the following three
areas:

- Database Security
- Computer Security
- Network Security

Database Security 11
A Secure Data
Environment
(cont’d.)
▪ Database security
▪ Set of established procedures, standards,
policies, and tools
▪ Protects against theft, misuse, and attacks
▪ Deals with permission and access to the data
structure

▪ Common vendor features for database security


▪ Database-level access control
▪ Database-level authentication
▪ Data storage encryption

Database Security 12
A Secure Data
Environment (cont’d.)

Are security controls applied


only at the database level
sufficient on their own?

Database Security 13
A Secure Data
Environment
(cont’d.)
▪ Computer security
▪ The hardware and software upon which
the database is installed.
▪ Necessary element of database security
▪ A set of established procedures,
standards, policies, and tools that are
used to protect a computer from theft,
misuse, and unwanted intrusions,
activities, and attacks.

▪ Common computer security features


▪ Operating system-level access control
▪ Operating system-level authentication
▪ Hardware and software monitors and
logs

Database Security 14
A Secure Data
Environment
(cont’d.)
▪ Network security
▪ Outermost layer of the database
▪ Arguably biggest security concern as
it is a gate way for adversaries
▪ Set of established procedures,
standards, policies, and tools
▪ Goal: protect network from theft,
misuse, and attacks

▪ Hardware and software devices


used to secure a network
▪ Firewalls, network monitors,
intrusion detections systems,
proxy servers, and
authentication servers

Database Security 15
What are the objectives of
database security ?

Database Security 16
Database Security
Objectives
▪ Security measures
▪ Keep information private from outside viewing
▪ Maintain consistency of data
▪ Ensure resources remain at a high degree of availability

▪ Key to achieving effective data security architecture


▪ Organization must maintain confidentiality, integrity, and availability
of its environment
▪ CIA triangle

Database Security 17
Figure 1-1 C.I.A. triangle

Database Security 18
Database Security
Objective 1
▪ Confidentiality requirements
▪ Ensure information remains private by limiting authorized access to
resources
▪ Block unauthorized access to resources

▪ Confidentiality protected using authentication and access


controls
▪ State and federal laws may apply to these measures

▪ Breaches in confidentiality could result in:


▪ Stolen identity
▪ Exposed business trade secrets

Database Security 19
Database Security
Objective 2
▪ Integrity
▪ Reliable, accurate, and consistent data stored in and retrieved from
the database
▪ Protected by preventing accidental or deliberate modifications
▪ Most difficult item to measure

▪ Auditing used to compare data with older, backed-up versions of


the data
▪ Results of integrity breaches
▪ Unreliable data, flawed programs, system failures

Database Security 20
Database Security
Objective 3
▪ Availability
▪ Maintaining accessible network or database resources
▪ Business cannot operate without it

▪ Must identify potential threats to availability


▪ Assess threat level
▪ Plan appropriate intervention
▪ Example of threats: technical failures, natural disasters, intrusions,
user-caused harm

Database Security 21
Who Are We Securing
Ourselves Against?
Key Points to understand:
▪ Must understand what poses a threat
▪ More threats exist on the inside of a network than on the outside

▪ Overly restrictive databases are as ineffective as those that give


too much access
▪ Healthy balance is needed

Database Security 22
Security Threats

• Cracker
• Social Engineers
• Computer Users
• Network and Database Administrators
• The Internet
• E-mails
• Instant Messages
• Tweets
• Misleading Applications
• Malware
Hackers

▪ Hacker
▪ Person who has mastered firmware
and software of modern computer
systems
▪ Person who enjoys exploration and
analysis of network security without
intent to cause harm
▪ Cracker
▪ Person who breaks into a network
to destroy or steal information

Database Security 24
Table 1-1 Types of online intruders
Database Security 25
Social Engineers
▪ People who manipulate
others to gain access to
systems, unauthorized
areas, or confidential
information
▪ Often build trust with
authorized user
▪ Use deception and trickery
to convince people to break
normal security policies
▪ Example: asking for a
password

Database Security 26
Computer Users
▪ Network users cause over half of
security breaches
▪ Everyone is a security threat (Zero Trust)

▪ Major contributing factors


▪ Lack of education
▪ Disregard of policy

▪ Examples of most common user errors


▪ Opening unknown e-mail
attachments
▪ Disregard for company policy
(downloading unauthorized
software)
▪ Poor habits (computers unlocked
and unattended)
▪ Writing passwords on sticky notes)

Database Security 27
Computer Users (cont’d.)
▪ Inappropriate disclosure
(giving information over the
phone to a social engineer)
▪ Procrastination (failing to
report computer issues in a
timely manner)
▪ Computer-literate users
may take risks and find
shortcuts to security
measures
▪ Disgruntled employee on a
network can abuse access
rights and destroy files

Database Security 28
Network and Database
Administrators
▪ Not often viewed as threats to networks they run
▪ Room for error exists
▪ Their mistakes have consequences for
integrity, availability, and reliability of the
network

▪ Dynamic nature of the data environment


▪ Employees gets hired, retired, fired etc.
▪ Users are added, removed and permissions
changes all the time.
▪ Can cause new security flaws to be created
▪ Network components must be regularly
audited

▪ Common mistake
▪ Not removing a user’s rights and account
credentials

Database Security 29
Class Activity
What are the biggest errors of all times made by
database administrators ?
▪ Accidentally destroyed production database on
first day of a job, and was told to leave, on top
of this i was told by the CTO that they need to
get legal involved, how screwed am i?
▪ Summary of the December 24, 2012 Amazon ELB
Service Event in the US-East Region

Database Security 30
The Internet

▪ 5.6 billion Internet users (according to


Statista)
▪ 1.13 billion websites (According to
Forbes)
▪ Hundreds of Millions of US residents have
Internet access
▪ More and more services are offered
online
▪ Threats on the Internet continue to
increase
▪ Opens up an opportunity for criminal
groups to steal financial recourses,
intellectual properties, information etc.

Database Security 31
The Internet (cont’d.)
▪ The internet infrastructures have security flaws/vulnerabilities
and can be targeted and manipulated.
▪ Hijacking
▪ Web pages rewritten to distribute malicious code or redirect user to
attacker’s Web site
▪ Malware
▪ Malicious software
▪ Often intended to be harmful and destructive

Database Security 32
The Internet (cont’d.)
▪ Domain name server (DNS)
▪ Database of domain names and their respective IP addresses

▪ DNS poisoning
▪ Cracker gains control over DNS server
▪ Cracker substitutes their site IP address for the legitimate domain
name IP address
▪ User may be fooled into providing personally identifiable information
(PII)
▪ Browser menu settings can also be manipulated

Database Security 33
Misleading Applications
▪ Applications designed to
deceive users into believing
their computer’s security has
been breached
▪ User downloads and purchases
fake antivirus tools
▪ Tools deliver malware to user’s
computer
▪ User has no knowledge of true
security breach

Database Security 34
E-mails
▪ One of most common forms
of communication today
▪ Biggest threat to network
and database environment
▪ Simple channel of attack for
crackers
▪ Most common way malicious
code gains access to a
business

Database Security 35
E-mails (cont’d.)
▪ Attachments
▪ Difficult to identify a fake attachment
▪ Crackers use attachment names and file extensions to gain trust
▪ Invoice.pdf.exe with hidden extension
▪ Scripts delivered as a document.
▪ Once run, the script downloads additional malware from a remote
server

▪ Spoofing e-mail address


▪ Using a false e-mail address in the “from” and “reply” fields
▪ Increases likelihood that user will open the attachment

Database Security 36
E-mails (cont’d.)
▪ Phishing
▪ Act of trying to fish
information out of people or
an attempt to obtain PII
▪ May include convincing a
user to click a link to a
cracker-owned Web site
▪ Common technique: fake
holiday and birthday card e-
mails

Database Security 37
▪ Capable of performing
harmful and destructive tasks
on victim’s computers
▪ Can be written in many
programming languages
▪ Types of malware
Malware
▪ Computer viruses
▪ Worms
▪ Trojans
▪ Spyware
▪ Adware
▪ Bots

Database Security 38

You might also like