+ security concerns chapter 10.1. + security types physical security access security database...

13
+ Security Concerns Chapter 10.1

Upload: natalie-ellis

Post on 13-Dec-2015

249 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: + Security Concerns Chapter 10.1. + Security types Physical security Access security Database security

+

Security Concerns

Chapter 10.1

Page 2: + Security Concerns Chapter 10.1. + Security types Physical security Access security Database security

+Security types

Physical security

Access security

Database security

Page 3: + Security Concerns Chapter 10.1. + Security types Physical security Access security Database security

+Physical security

Page 4: + Security Concerns Chapter 10.1. + Security types Physical security Access security Database security

+Data security – Backup Strategies

Page 5: + Security Concerns Chapter 10.1. + Security types Physical security Access security Database security

+Backup strategies

Transactions and commits – recovery from failure – next class – inside the DBMS

Mirroring of hard drives – avoid loss of data if a drive fails (pretty common practice)

Periodic backups of data (change vs full)

Off site backup of data (disaster recovery)

Page 6: + Security Concerns Chapter 10.1. + Security types Physical security Access security Database security

+Access security

Require network users to authenticate to reach network resources

JMU has secure VPN access…must authenticate to reach JMU network resources (some)

Page 7: + Security Concerns Chapter 10.1. + Security types Physical security Access security Database security

+Database security

Who makes the decisions?

What features in the db support security?

What mysql statements address security?

Page 8: + Security Concerns Chapter 10.1. + Security types Physical security Access security Database security

+Application security

Log on ?

Secure entry information

include statements

Page 9: + Security Concerns Chapter 10.1. + Security types Physical security Access security Database security

+Database security

Security subsystem

Access control Views Audit trail Triggers Encryption of database

Page 10: + Security Concerns Chapter 10.1. + Security types Physical security Access security Database security

+MySQL – Support for security

Users CREATE USER abc IDENTIFIED BY PASSWORD(‘somepass’); GRANT ALL PRIVILEGES ON X.* to abc; GRANT GRANT ON X.* to abc;

Creates a user, giving them access to everything in database X including the right to provide access to other users.

Privileges

Page 12: + Security Concerns Chapter 10.1. + Security types Physical security Access security Database security

+Next time

Transactions in SQL

Spend 5 min / team reporting on project status Can show screens if present What is going well? What is challenging? Do you need any help?

Page 13: + Security Concerns Chapter 10.1. + Security types Physical security Access security Database security

+Tuesday Overview of some front ends that make database

management easier

A look at a couple of other Relational DBMS

A brief overview of XML

Thursday Project demonstrations