Database Security
The focus of this study is that of database security. Databases and database technology are such that play critical roles in the use of computers whether it be in business, electronic commerce, engineering, medicine, genetics, law, education or other such entities requiring the use of computer technology. A database is quite simply a collection of data that is related such as a database containing customer information, supplier information, employee information, project databases, and the sort. Some databases are small while others are of a great size and quite complex. A database management system is "a general purpose software system that facilitates the processes of defining, constructing, manipulating, and sharing databases among various users and applications." (Oracle Security, 1998, p.1) Defining a database is reported to involve "specifying the data types, structures and constraints of the data to be stored in the database." (Oracle Security, 1998, p.1)
I. Database Security Plan
Securing the database system and its data requires several steps and the first step is the development of a security policy outlining and mapping the security plan enforcement. The security policy, contained within a security plan, assist with ensuring that everyone understands the needs and requirement of the company. A security policy that is firm ensures that employees understand what is expected, what the rules to using the system are, and how implementation of the requirements takes place. Limitations are defined clearly and guidance is consistent and set out for each user of the system.
II. Security Policy
The security policy must be enforceable and management at the highest level must be committed to enforcing the security policy. After it is determined what is required for the company security plan a-team of individuals should be formed. The team will be formed by those who will administer the system. The system administrator and the database administrator should have the same goals, which are ensuring the system is unable to be compromised.
III. Database Security Requirements
Following the team being assembled there is a need to conduct identification of the requirements of the organization relating to the system and database security. Requirements are likely to include but are not limited to the following:
A uniform approach to security across computer systems and databases
Identification of the form and style of authorization required to initiate the creation of an account
A determination of who will create user accounts on the operating system, within each application if necessary, and within the databases
How those accounts will be created
Whether a standard convention for usernames and passwords should be imposed and what it should be
Whether password aging will be enabled and in what time frame
A determination of access requirements on an application-by-application basis
Identification of how users will be tracked to ensure that as an employee's job description or location changes, the access to applications remains correct
Identification of sensitive information and an outline of steps to take for data protection
A determination of penalties to be enforced as a result of different levels of security breaches. (Oracle Security, 1998, p.1)
IV. Operating System Security
Operating system security mechanisms requires considering the native security mechanisms that may be used on each platform since most operating systems make a requirement that each user interacting with the system to have a username and password that is unique. User access on a UNIX or Open VMS system is likely to be under a requirement of a username and password that is unique as well. In addition there may be an additional restriction since users are likely to be divided into specific user groups. The groups are divided based upon what directories the group will be using on the system all of which is specified in the security plan. (Oracle Security, 1998, paraphrased)
A spreadsheet approach should be used in identifying the components that the security plan covers. Examples stated include the following:
(1) Each division within the corporation to be included in the policy
(2) Each platform within the division
(3) Each database housed on each platform along with its function (development, test, pre-production, or production)
(4) Each application supported within each database
(5) The "owner" of the application, or person responsible for authorization of users within the application
(6) Required security controls for each application, such as roles or grants required
(7) Username and password composition
(8) Type(s) of accessibility (Telnet, client server, external identification)
(9) What form of authorization will be accepted for that application (electronic authorization, verbal, email, hard-copy form, World Wide Web)
(10) Person authorized to create accounts for...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now