Database security presentation in easy way

ArsalanMaqsood1 84 views 11 slides May 19, 2024
Slide 1
Slide 1 of 11
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11

About This Presentation

it is Database security presentation which is easy to read and understandable


Slide Content

Database security
By Arsalan Maqsood (14454)

TABLE OF CONTENTS
01
Overview to Database
Security
02
What is Database
Security
03
Why need of Database
Security
05
Security Problem
04
Concept of Database
Security
06
Security Controls

■In today’s world, we need
everything secured whether it
is your mobile phone,
computer or almost anything.
OVERVIEW TO DATABASE SECURITY

■DATABASE:
It is a collection of information stored in a computer.
■DATABASE SECURITY:
It is a mechanism that protect the database against
intentional or accidental threats.
WHAT IS DATABASE SECURITY

■If there is no security to database what happens???
Data will be easily corrupted.
Database can easily hacked.
WHY NEED OF DATABASE SECURITY

•Confidentiality
•Integrity
•Availability
CONCEPT OF DATABASE SECURITY
Three are 3 main concept

CONFIDENTIALITY
•It is protecting the database from unauthorized users.
•Ensures that users are allowed to do the things they are trying to
do.
•Encryption is a technique or a process by which the data is
encoded in such a way that only that authorized users are able to
read the data.

INTEGRITY
•Protecting the database from authorized users.
•Ensures that what users are trying to do is correct.
-For examples,
-An employee should be able to modify his or her own information.

AVAILABILITY
•Database must have not unplanned downtime.
•To ensure this, following steps should be taken
•Restrict the amount of the storage space given to each user in
the database.
•Limit the number of concurrent sessions made available to each
•database user.
•Back up the data at periodic intervals to ensure data recovery in
case of application users.

SECURITY PROBLEM
There are two kinds of threat.
•Non-fraudulent Threat
•fraudulent Threat
1. Non-fraudulent Threat
•Natural or accidental disasters.
•Errors or bugs in hardware or software. . Human errors.
2. Fraudulent Threat
•Those improper users (outsider or insiders).
•who attack the software and/or hardware system, or read or write data in a
database.

SECURITY CONTROLS
User Authentication: Require strong passwords.
Access Control: Give users only the access they need.
Encryption: Encrypt data to keep it safe.
Regular Backups: Back up data regularly.
Audit Logs: Track all database activities.
Update Software: Apply security patches regularly.
Network Security: Use firewalls and intrusion detection.
User Training: Teach users about security best practices.
Least Privilege: Limit user access to only what's necessary.