Implementing Security For Databases Computer Science Essay

Published:

This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

Server Security: This is one of the most basic and most important components of database security. If an organizations database server is supplying information to a web server, then it should be configured to allow connections only from that server. Protect sensitive data that is being transmitted via some type of communications[ DataEncryption]

Access Control: Access control is the process of meditating every request to resource and data maintained by system and determined weather request should be granted or denied. Access control works with an access control list, which is a table that tells a computer operating system which access rights each user has to a particular system object.

Restricting Database Access: Unauthorized access to database can also be taken by conducting a "port scan" to look for ports that are open database systems are using by default. The ports that are used by default can be changed. There are additional security measures that can be implemented to prevent open access from the Internet, such as

Server account disabling - The server ID can be suspended after three password attempts.

ref: http://download.oracle.com/docs/cd/B19306_01/server.102/b14220/security.htm

2)What is Database Encapsulation? Explain with an example.

Encapsulation is a design issue that deals with how functionality is compartmentalized within a system. A database encapsulation layer hides the implementation details of database(s), including their physical schemas, from business code.  This layer also provides business objects with persistence services - the ability to read data from, write data to, and delete data from - data sources. 

An effective database encapsulation layer will provide several benefits:

It reduces the coupling between your object schema and your data schema, increasing your ability to evolve either one.  

It implements all data-related code in one place. 

It simplifies the job of application programmers. 

It allows application programmers to focus on the business problem and Agile DBA(s) can focus on the database. 

It gives a common place to implement data-oriented business rules. 

It takes advantage of specific database features, increasing application performance.

3)List down the different System Level permissions and explain any two with appropriate example?

System privileges allow the user to perform system level activities. This might include such things as being able to actually connect to the system, or it might include the ability to do things like create objects in schemas other than your own schema.

Granting Oracle System Level Privileges

The grant command is used to grant system level privileges. For example we are granting system level privileges to a user:

* Connect to the database (create session)

* Create objects (create table, create index)

* Perform DBA activities, like backup the database (SYSDBA, SYSOPER)

4) Which Data Dictionary would you use to check the objects within a schema and Why?

The Advantage Data Dictionary introduces additional features and functionality that compliment the advantage database server and advantage local server. With the Advantage Data Dictionary, a database can be clearly defined with its associated tables and indexes. Access to the database table can be more securely guarded by the Advantage servers because users and user groups can be defined in the database and specific rights can be assigned to the users and user groups. The Advantage Data Dictionary allows the Advantage server to ensure the logical validity of the data in the database through the use of field level constraints, record level constraint, and referential integrity with ADT tables. The Advantage Data Dictionary also supports the use of stored procedures. Descriptions of the database, tables, fields, indexes, and default field values can be stored in the Advantage Data Dictionary to allow developers to develop and deploy applications more efficiently. Much of the Advantage Data Dictionary functionality is available to both ADT and DBF tables.

http://devzone.advantagedatabase.com/dz/webhelp/advantage9.0/server1/advantage_data_dictionary.htm

5) How can you perform Database Auditing by verifying security access?

Database auditing can be a crucial component of database security.

At a high level, database auditing is basically a facility to track the use of database resources and authority. When auditing is enabled, each audited database operation produces an audit trail of information including information such as what database object was impacted, who performed the operation and when. The comprehensive audit trail of database operations produced can be maintained over time to allow DBAs and auditors, as well as any authorized personnel, to perform in-depth analysis of access and modification patterns against data in the DBMS.

Database Access Auditing Techniques

There are several popular techniques that can be deployed to audit your database structures.

The first technique is trace-based auditing. This technique is usually built directly into the native capabilities of the DBMS. Although each DBMS offers different auditing capabilities, some common items that can be audited by DBMS audit facilities include:

Login and logoff attempts (both successful and unsuccessful attempts)

Database server restarts

Commands issued by users with system administrator privileges

Attempted integrity violations (where changed or inserted data does not match a referential, unique, or check constraint)

Select, insert, update, and delete operations

Stored procedure executions

Changes to system catalog tables

Row level operations

ref: http://www.tdan.com

Writing Services

Essay Writing
Service

Find out how the very best essay writing service can help you accomplish more and achieve higher marks today.

Assignment Writing Service

From complicated assignments to tricky tasks, our experts can tackle virtually any question thrown at them.

Dissertation Writing Service

A dissertation (also known as a thesis or research project) is probably the most important piece of work for any student! From full dissertations to individual chapters, we’re on hand to support you.

Coursework Writing Service

Our expert qualified writers can help you get your coursework right first time, every time.

Dissertation Proposal Service

The first step to completing a dissertation is to create a proposal that talks about what you wish to do. Our experts can design suitable methodologies - perfect to help you get started with a dissertation.

Report Writing
Service

Reports for any audience. Perfectly structured, professionally written, and tailored to suit your exact requirements.

Essay Skeleton Answer Service

If you’re just looking for some help to get started on an essay, our outline service provides you with a perfect essay plan.

Marking & Proofreading Service

Not sure if your work is hitting the mark? Struggling to get feedback from your lecturer? Our premium marking service was created just for you - get the feedback you deserve now.

Exam Revision
Service

Exams can be one of the most stressful experiences you’ll ever have! Revision is key, and we’re here to help. With custom created revision notes and exam answers, you’ll never feel underprepared again.