2011年8月22日星期一

Database-database Security




Database/database Security


Introduction

A database is a collection of records or data that is stored in a computer system. For a database to be functional, it must not only store large sums of records well, but be accessed easily. Moreover new information and changes should also be fairly easy to input. In order to have a highly efficient database system, you absence to combine a agenda that manages the queries and information stored on the system. This is referred to as DBMS or a Database Management System. Besides these features, all databases that are created should be built with tall data honesty and the aptitude to regain data if hardware fails.

Here are just a few of the movements that you can act on a database that would be difficult if I were you impossible to perform on a spreadsheet.

Retrieve all records that match definite criteria

Update record in bulk

Cross-reference records in alter tables

Perform complex aggregate measurements.

Types of Databases

There are several common types of databases; each type of database has its own data model or structure. They are

Flat Model: This is a two dimensional array of data

Hierarchical Model: The hierarchical model database resembles a tree favor structure

Network Model: This is that a record is stored with a link to other records

Relational Model: The relational model is the most popular type of database and an extremely powerful tool, not only to store information, but to access it as well. Relational databases are mobilized as tables. The beauty of a table is that the information can be accessed or added without reorganizing the tables

Relational databases use a program interface called SQL or Standard Query Language.

Organizing / Storing a Database

Database normalization is the process of organizing data into another and peerless sets.

The intentions of normalization are to:


  • Reduce or exclude storage of copy data

  • Organize data into an efficient and rational structure


The process of normalization involves determining what data should be stored in each database chart. The process of normalization involves working through well-defined steps, shrieked normal forms.


 

Databases can be less than 1 MB alternatively extremely colossal and perplexing that can be terabytes, although all databases are usually stored and located on hard disk or other types of cache devices and are accessed via microcomputer.

Accessing Information Using a Database

While storing data is a magnificent feature of databases, because many database users the most important feature is quick and uncomplicated recovery of information. In a relational database, it is extremely cozy to drag up information regarding an employee, merely relational databases also increase the power of scampering queries. Queries are requests to pull characteristic types of information and both show them in their normal state or create a report using the data.

Securing a Database

Obviously, many databases cache privileged and essential message namely ought no be accessible accessed at fair anyone. Many databases require passwords and other security features in order to access the information. While some databases can be accessed through the Internet through a network, additional databases are closed systems and can only be accessed ashore site. Securing the database has transform simpler. A few straightforward treads can vastly cultivate security, normally along locking out always users besides petitions and DBAs.

But even that restriction doesn't completely protect your data. One of the basic security breaches organizations experience today takes place via applications that interlock to databases. Applications don't use countryman database security. Instead, they access the database as a "super user" and, accordingly, could characterize a risk to data security.

Some of the most mutual examples of exploiting this risk is understood as SQL injection Database Worms, Denial of Service, Buffer flood.

SQL injection isn't a direct onset on the database. Instead, it takes avail of the direction many Web applications that access databases are amplified. SQL Injection attempts to modify the parameters passed to a Web application via a Web fashion to change the resulting SQL statements that are passed to the database and compromise its security. If successful, an attacker can hijack the database server and be granted the same permissions to add, drip, and alteration users that the application has. From that point, the database is fully exposed.

Unfortunately, the practice of SQL injection is easy to study. Fortunately, with a tiny forethought, you can prevent it. The simplest way to ascertain out if you're vulnerable to an SQL-injection attack is to enter a unattached quote into each field on each form in your applications and verify the results. Some applications will return a information claiming a syntax error. Some applications ambition grab the peccadillo and not report everything. In either of these cases, your site has some protection from SQL injection, but don't assume it's safe. You can only validate your class of protection by going to the application's source code

The Future of Security

A fashionable security trend namely apt provide multiple membranes of security among a computing context. These layers can include multiple firewalls between the Internet and the union and even firewalls within one organization to protect high-value assets.

No Better Time

Security attentions work far further the database. But the database should be an of the most protected units of anybody affair environment; after all, it usually holds the most invaluable and mission-critical knowledge. With a few simple missions, you can reduce security risk to a reasonable level:


  • Be aware of database security chasms such as built-in stored procedures, predefined tables, and so on. The built-in stored procedures that come with the criterion database can clutch disabilities known by infiltrators.

  • Restrict way and credential to "nobody" unless validated.

  • Audit your applications for holes.

  • Maximize the layers of protection to your database.

  • Monitor your log files.

  • Consider accepting risk-management and proactive vulnerability appraisal tools.


Conclusion

Companies with extra than 50 employees should too consider building a true security practice. A true security practice includes a security specialist certified through a reputable organization and by fewest a part-time security director. Depending on the size of your organization, a full-time security manager and a Chief Security Officer may too be proper.

 

 

 




没有评论:

发表评论