Database Security: An Introduction
Outline
Introduction to Database Security Issues
Three Basic Concepts
Introduction to Database Security Issue(2)
Threats to Computer Systems
Scope of Data Security Needs
Introduction to Database Security Issues (3)
Introduction to Database Security Issues (4)
Introduction to Database Security Issues 5)
Introduction to Database Security Issues (6)
Introduction to Database Security Issues (7)
Introduction to Database Security Issues (8)
Database Security and the DBA
Database Security and the DBA (2)
Access Protection, User Accounts, and Database Audits
Access Protection, User Accounts, and Database Audits(2)
Access Protection, User Accounts, and Database Audits(3)
Slide 19
Discretionary Access Control
Types of Discretionary Privileges
Types of Discretionary Privileges(2)
Types of Discretionary Privileges(3)
Types of Discretionary Privileges(4)
Types of Discretionary Privileges(5)
Types of Discretionary Privileges(6)
Specifying Privileges Using Views
Revoking Privileges
Propagation of Privileges using the GRANT OPTION
An Example
An Example(2)
An Example(3)
An Example(4)
An Example(5)
An Example(6)
An Example(7)
DAC: Weakness
Slide 38
Mandatory Access Control
Bell-LaPudula Model
Mandatory Access Control(2)
Mandatory Access Control(3)
Mandatory Access Control(4)
Comparing DAC and MAC
Comparing DAC and MAC (2)
Slide 46
Role-Based Access Control
Slide 48
Encryption
Slide 50
Encryption & PKI (Public Key Infrastructure)
Summary
Q&A