What Is Database Security? — ExploitByte

Exploitbytes
4 min readMar 13, 2022

--

it involves various types of categories of controls, such as technical, procedural/administrative and physical.

Data Security Requirements?

Unauthorized or unintended activity or misuse by authorise database users, database administrators, or network/system managers, or by unauthorized users or hackers eg in appropriate access to sensitive data, metadata or function within databases, or inappropriate changes to the database programs, structures or security configurations)

What Is Database Security?

Malware infections causing incidents sucha as unauthorized access, leakage or disclosure of personal or propritary data deletion of or damage to the data or programs,interupption or denial of authorized access to the database, attacks on other system and systems and the unauthorized failure of database services.

Overloads, performance constraints and capacity issues resulting in the inahability of authorized users to use database as intended.

Physical damage to database servers caused by computer room fires or floods, overheatingm lightning, accidental liquid soils, static discharge, electronic breakdown/ equipment failure.

Design flaws and programming bugs in database and the associated programs and systems, creating various security vulnerability (e.g unauthorized privilege escalation), data loss/ corruption, performance degradation etc.

What Is Database Security?

Data corruption and/or loss caused by the entry of invalid data or commands, mistakes in database or system administration processes, sabotage/ criminal damage etc.

Database have been largely secured against hackers through network security measures such as firewalls, and network-based intrusion detection systems.

while network security controls remain valuable in this regard securing the database systems themeselves, and the programs/functions and data within them. has arguably becomes more critical as networks are increasingly opened to wider access, in particular access from the internet.

Furthermore, system program function and data access controls, along with associated user identification, authentication and rights management functions, have always been important to limit and in some cases log the acitivities of autorized users and administrators.

What Is Database Security?

In other words, these are complementary approaches to database security, working from both the outside-in and inside-out as it were.

Many organizations develop their own baseline security standards and design detailing basic security control measures for their databse systems.

the security designs for specific databse systems typically specify further security administration and management funcions along with various business-driven informaiton security controls within the databse programs and fucntions

Furthermore, various security-related activites (manual controls) are normally incorporated into the procedures, guidelines etc. relating to the design development, configuration, use management and maintenance of database.

What Is Database Security?

Types of Database Users

There are different types of database users in DBMS This diffrentiation is made according to the interaction of users to the database.

Database system is made to store information and provide an environment for retrieving informaiton.

There Are various Types of Database Users in DBMS:-

1) Application Programmers

  • As the name suggest, application programmers are the one who writes application programe that uses the database.
  • These application programs are written in programming languages like COBOL or PL ( Programming Language like Java and Fourth Generation Language.)
  • These programs meet the user requirement and made according to user requirements.
  • Retriving information, creating new information and changing existing information is done by these application programs.
  • They interact with DBMS through DML ( Data Manipulation Language) Calls.
  • And All these functions are performed by generating a request to the DBMS

2) Sophisticated Users

  • They are nothing but the database developers, who writes SQL queries to perform various operations such as select/insert/delete/update data.
  • They do not need any applications or program for the purpose of requesting the database. They directly interact with the database with the help of query language like SQL.
  • These users may be various types of scientists, engineers, alalysts who have deep knowledge of SQL and DBMS to apply the concepts as per their requirements.
  • In Short, we can say that, this category includes different designers as well as developers of DBMS and SQl.

3) Specialised Users

  • These Users are also called as Sophisticated users, but they develop special types of database application programs.
  • They are considered as the developers who writes complex programs as per the requirement.

4) Stand-Alone Users

5) Native Users

  • To Interact with the database existing applications are used by these users
  • For example, online library system, ticket booking systems, ATMs etc, which has existing application and users use to interact with the database to fulfil their requests.

So If You Like This Blog Please Comment Down for More Blog Like This And For more content Like This click Here

Originally published at https://exploitbyte.com on March 13, 2022.

--

--

Exploitbytes
Exploitbytes

Written by Exploitbytes

I am Ethical Hacker & Bug Hunter.

No responses yet