database_security_overview_short

database_security_overview_short - Database Security...

Info iconThis preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon
1 Database Security Information/Data Security • More Data than ever is Stored and Managed by Computer Systems • Largely Satisfied by Database Management Systems • DBMSs – Access Efficiently Application Defined Subsets – Manage Simultaneous Transactions (Concurrency Control)
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
2 A--> D B--> E C--> F D--> G E--> H F--> I G--> J H--> K I--> L J--> M K--> N L--> O M--> P N--> Q O--> R P--> S Q--> T R--> U S--> V T--> W U--> X V--> Y W--> Z X--> A Y--> B Z--> C Caesar’s Substitution Cipher ET TU BRUTE Encryption HWWXEUXWH Source: Computer Security Basics, Russell and Gangemi Rot 13 found on Unix systems is a substitution cipher Security (Confidentiality) Authentication Non -Repudiation Integrity Availability Transmission Storage Processing Technology Management Operational An Information/Data Security Model Controls Services Information Drivers Regulations Threats (Adapted from McCumber) Culture
Background image of page 2
3 Information/Data Security • Security/Privacy = Confidentiality: Non- Disclosure (preventing/detecting/deterring disclosure) • Integrity: No Unauthorized Modification (preventing/detecting/deterring improper modification • Availability: Avoiding Denial of Service (preventing/detecting/deterring improper denial of access) Databases and Database Management •A database is a persistent collection of interrelated data items. •A database management system (DBMS is the software that maintains databases and provides access to them. •A data description language (DDL) is the facility for defining databases. •A schema is a database description. •A data manipulation language (DML) is used for querying and manipulating the database. •A data control language (DCL) support security and other control functions
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
4 Three Schema Architecture External Level Conceptual Level Internal Level Storage level External/conceptual mapping Specific data model Conceptual Schema Internal Schema External View2 External View1 Stored Database Data Dictionary Data Dictionary Database Administrators Application Programmers End Users HUMAN INTERFACES SOFTWARE AND DBMS INTERFACES Security and Authorization Subsystem Query Optimizer Integrity Constraint Enforcer Application Programs/Report generators Compilers/Pre compilers
Background image of page 4
5 Relational Data Model Deptno Dname Dloc Dmg r Dept A Dept B Dept C Empno Ename Etitle Esalary Deptno Emp 1 Emp 2 Emp 3 Emp 4 Emp 5 Emp 6 Dept A Dept A Dept B Dept B Dept C Dept B Department Table Employee Table Operations on Relations Select - Forms a new relation consisting of tuples that satisfy some formula Project - Forms a new relation by including only some attributes and removing duplicate tuples. Union
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 6
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 12/22/2009 for the course DBST dbst 668 taught by Professor Yelena - ta during the Spring '09 term at MD University College.

Page1 / 23

database_security_overview_short - Database Security...

This preview shows document pages 1 - 6. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online