Security Issues for a Database System
The biggest questions that any database system must check to ensure the proper operations of the system and the security of data within the system can be understood by following the three guidelines. The first question is to check whether the system administrators themselves are following the guidelines that have been established for the proper operations of the system. The second important question is to ensure the application of the latest patches by all the administrators of the system, This is very important as all the system administrators are not at one place and cannot directly check on each other, and the checks are essential for the security of the system. The final important question is to ensure that all the latest patches are properly tested out before they are used. If this is not done, then instead of solving the present glitches with the system, they may end up causing more problems. (Database Security)
These are very serious issues and must be dealt with in all seriousness as the fastest growing crime in the United States today is the theft of identities by outsiders who really do not possess those identities. This is only the gateway to obtain unauthorized information from the organization. This can cause misuse of information in various ways like borrowing or paying out large sums of money to different people who are not entitled to it, transferring personal purchases to other identities and thus causing harm to the individual or the organization, or even stealing large amounts of confidential data. How is this done? The normal procedure is that an individual steals somebody else's identity, and then uses that identity to collect the information from his database which is stored on the computer. There are certain security portals that the person must pass through to get at this information, and this process of gaining access is through a process known as authentication. This process is supposed to identify the individual whose database is being accessed. This process of authentication is not a part of the database itself, but is a part of the outside security facility. This may be a part of the operating system of the total system like it is in AIX, Solaris, Linux, HP-UX, Windows 2000/NT, etc. (Database Security)
In certain cases, this security is being provided by an add-on product like Distributed Computing Environment Security Services. In some of the systems there are no checks at all like Windows 95, Windows 98 and Windows Millennium. It is important for the security of the database to ensure that a security facility be made proper for access to the database. The general process of using a unique user ID and a corresponding password must be used. This must be known to only the user and the security checking people only. The user ID identifies the user to the security people or system, and the password confirms that the user is indeed the person claiming to have that user ID. (DB2 Universal Database Security) This process must be carried out in the organization as a whole, from coast to coast, as otherwise the security achieved one part of the organization will be nullified by the laxity of another part. It is very easy to approach the database of the other office from the not so secure office, and his firewall has not been configured properly. This can damage the entire database of the organization, and this can be achieved only if the seniors are looking at the total picture and not only at the small parts of the organization. (Database Security)
The flaws in the security system for any database come from the securities at different points - server security, database connections, table access control and restriction of database access. The first point mentioned is the most important. In...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now