Verified Document

Database Security Term Paper

Database Security The focus of this study is that of database security. Databases and database technology are such that play critical roles in the use of computers whether it be in business, electronic commerce, engineering, medicine, genetics, law, education or other such entities requiring the use of computer technology. A database is quite simply a collection of data that is related such as a database containing customer information, supplier information, employee information, project databases, and the sort. Some databases are small while others are of a great size and quite complex. A database management system is "a general purpose software system that facilitates the processes of defining, constructing, manipulating, and sharing databases among various users and applications." (Oracle Security, 1998, p.1) Defining a database is reported to involve "specifying the data types, structures and constraints of the data to be stored in the database." (Oracle Security, 1998, p.1)

I. Database Security Plan

Securing the database system and its data requires several steps and the first step is the development of a security policy outlining and mapping the security plan enforcement. The security policy, contained within a security plan, assist with ensuring that everyone understands the needs and requirement of the company. A security policy that is firm ensures that employees understand what is expected, what the rules to using the system are, and how implementation of the requirements takes place. Limitations are defined clearly and guidance is consistent and set out for each user of the system.

II. Security Policy

The security policy must be enforceable and management at the highest level must be committed to enforcing the security policy. After it is determined what is required for the company security plan a-team of individuals should be formed. The team will be formed by those who will administer the system. The system administrator and the database administrator should have the same goals, which are ensuring the system is unable to be compromised.

III. Database Security Requirements

Following the team being assembled there is a need to conduct identification of the requirements of the organization relating to the system and database security. Requirements are likely to include but are not limited to the following:

A uniform approach to security across computer systems and databases

Identification of the form and style of authorization required to initiate the creation of an account

A determination of who will create user accounts on the operating system, within each application if necessary, and within the databases

How those accounts will be created

Whether a standard convention for usernames and passwords should be imposed and what it should be

Whether password aging will be enabled and in what time frame

A determination of access requirements on an application-by-application basis

Identification of how users will be tracked to ensure that as an employee's job description or location changes, the access to applications remains correct

Identification of sensitive information and an outline of steps to take for data protection

A determination of penalties to be enforced as a result of different levels of security breaches. (Oracle Security, 1998, p.1)

IV. Operating System Security

Operating system security mechanisms requires considering the native security mechanisms that may be used on each platform since most operating systems make a requirement that each user interacting with the system to have a username and password that is unique. User access on a UNIX or Open VMS system is likely to be under a requirement of a username and password that is unique as well. In addition there may be an additional restriction since users are likely to be divided into specific user groups. The groups are divided based upon what directories the group will be using on the system all of which is specified in the security plan. (Oracle Security, 1998, paraphrased)

A spreadsheet approach should be used in identifying the components that the security plan covers. Examples stated include the following:

(1) Each division within the corporation to be included in the policy

(2) Each platform within the division

(3) Each database housed on each platform along with its function (development, test, pre-production, or production)

(4) Each application supported within each database

(5) The "owner" of the application, or person responsible for authorization of users within the application

(6) Required security controls for each application, such as roles or grants required

(7) Username and password composition

(8) Type(s) of accessibility (Telnet, client server, external identification)

(9) What form of authorization will be accepted for that application (electronic authorization, verbal, email, hard-copy form, World Wide Web)

(10) Person authorized to create accounts for...

User Accounts
Users connect to the database through use of user accounts of which there are several including operating system and database accounts:

(1) Although they are created with the CREATE USER command, some accounts are used to house application schemas. These accounts own objects like tables, views, indexes, triggers, procedures, etc.

(2) Another type of account is used by the system itself to enable the database engine work to be performed; these accounts are sys and system.

(3) In later versions of the RDBMS, an account to enable the intelligent agent to connect to each database is automatically created during database creation. This account is dbsnmp and carries full DBA privileges.

(4) Each application might need one or more accounts to enable work to be performed.

(5) Each user in your system may require an individual account with specific privileges to enable the user to work with an application.

(6) One or more accounts may be needed to enable one or more DBAs to perform database maintenance and duties.

(7) Each account type must be considered and a decision reached on whether that account type will be used and how it will be set up and administered. In smaller organizations, there may be little need for some types of accounts discussed in this section. In very large organizations, there may be a need for more extensive divisions of database account types. (Oracle Security, 1998, p.1)

VI. Database Administration

One of the account types is the database administration account. Smaller companies have only one person acting as the system administrator and network administration while larger companies are likely to have several individuals in this capacity. A decision has to be made as to who will have the access to the code area for installation and maintenance of the company software. One or more accounts must be established for the varied tasks of administration of the account including privilege sets for operating system and database privileges to perform the required tasks. (Oracle Security, 1998, paraphrased)

VI. Security Breaches

Security breaches are a growing problem and since more databases are made accessible through the Internet and web-based applications the exposure of the databases to security threats will continue to grow. The objective is to "reduce susceptibility to these threats." (Murray, 2010) The most publicized database application vulnerability is the SQL injection. SQL injections are reported to make provision of "excellent examples for discussing database security issues, risks inherent to non-validated user input. The threat occurs when users enter malicious code that 'tricks' the database into executing unintended commands. The vulnerability occurs primarily because of the features of the SQL language that allow such things as embedding comments using double hyphens (- -), concatenating SQL statements separated by semicolons, and the ability to query metadata from database data dictionaries. The solution to stopping an SQL injection is input validation." (Murray, 2010) It is reported that SQL injection vulnerabilities are a result of the "dynamic creation of SQL queries in application programs that access a database system. The SQL queries are built incorporating user input and passed to the database system as a string variable. SQL injections can be prevented by validating user input. Three approaches are commonly used to address query string validation: using a black list, using a white list, or implementing parameterized queries. The black list parses the input string comparing each character to a predefined list of non-allowed characters. The disadvantage to using a black list is that many special characters can be legitimate but will be rejected using this approach. The common example is the use of the apostrophe in a last name such as O'Hare." (Murray, 2010) The white list approach is stated to be similar "except that each character is compared to a list of allowable characters. The approach is preferred but special considerations have to be made when validating the single quote. Parameterized queries use internally defined parameters to fill in a previously prepared SQL statement. The importance of input validation cannot be overstated. It is one of the primary defense mechanisms for preventing database vulnerabilities including SQL injections." ( ) It is reported that a subtle vulnerability found within database technologies is "inference, or the ability to derive unknown information based in retrieved information." (Murray, 2010) The problem stated with inference is that no ideal solution exists to the problem and the only solution recommended includes the controls "related to queries (suppression) or controls related to individual items in a query." (Murray, 2010) Sensitive data…

Sources used in this document:
Bibliography

Database Security Best Practices (2012) Applicure Technologies Ltd. Retrieved from: http://www.applicure.com/blog/database-security-best-practice

Developing a Database Security Plan (1998) Oracle Security. Chapter 7. Retrieved from: http://oreilly.com/catalog/orasec/chapter/ch07.html

Murray, MC (2010) Database Security: What Students Need to Know. Journal of Information Technology Education: Innovations In Practice. Vol. 8. Retrieved from: http://www.jite.org/documents/Vol9/JITEv9IIPp061-077Murray804.pdf

Yang, L. 2009. Teaching database security and auditing. Proceedings of the 40th ACM Technical Symposium on Computer Science Education, Chattanooga, TN, USA.
Cite this Document:
Copy Bibliography Citation

Related Documents

Database Security Plan and Requirements Definition for
Words: 2108 Length: 8 Document Type: Research Paper

Database Security Plan and Requirements Definition for a University Department The database security plan and requirements definition were developed. The plan included, at the outset, the inclusion of major stakeholder at the University and described their roles in initiating, implementing, and maintaining the plan. Individuals responsible for daily and other periodic tasks were developed. A major consideration in planning the security was the policy that governs granting of access. The need-to-know,

Database Security Design of an
Words: 2976 Length: 11 Document Type: Term Paper

With optimistic concurrency control, the database checks resources to determine if any conflicts have occurred only when attempting to change data. If a conflict occurs, the application must read the data and attempt the change again. Pessimistic concurrency, on the other hand, control locks resources as they are required, for the duration of a transaction. Unless deadlocks occur, a transaction is assured of successful completion 5.5 Audit Tracking Although auditing does

Database Security and SQL Injection
Words: 364 Length: 1 Document Type: Research Proposal

Database designers and administrators can work concomitantly with it professionals and researchers to implement the security measures necessary to mitigate risks to data. I have been a database user at my company for a number of years. As such, I am allowed access from only a limited number of locations; one static connection at home, one at work, and one laptop connection that I carry with me when traveling. Each

Database Security Over the Last
Words: 904 Length: 2 Document Type: Article Review

Strengths vs. Weaknesses The article 2007 Survey on Database Security; highlights the most pressing issues that could be facing an organization (someone from within who could have access to the data). Where, this strength points out a situation that many it managers are overlooking. However, the weakness of the article is that it points out the problem, while at the same time saying there is no effective solution. In many ways

Case Study of Database Security
Words: 1297 Length: 4 Document Type: Case Study

Database Security Case Study Database Security: Case Study The objective of this study is to answer specific questions following have read the case study which is the focus of this work in writing including naming the concepts which are illustrated in the case study and why a customer database is useful for companies related in the case study under review. This work will additionally answer as to what would occur if the

Database Development
Words: 814 Length: 3 Document Type: Case Study

Database Development The objective of this study is to recommend three specific tasks that could be performed to improve the quality of datasets using the Software Development Life Cycle (SDLC) methodology and to recommend the actions that could be performed to optimize record selections and to improve database performance from a quantitative data quality assessment. Finally, this work will suggest three maintenance plans and three activities that could be performed in

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now