Preview

Database Term Paper

Satisfactory Essays
Open Document
Open Document
455 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Database Term Paper
Stratford University

Database Security
(SOF620)

Professor: Godson Chukwuma

Term Paper Assignment

Submitted by
Rafik Abdelhamid Osmane

Top ten threats in Database security:

1. Excessive Privilege Abuse
2. Legitimate Privilege Abuse
3. Privilege Elevation
4. Database Platform Vulnerabilities
5. SQL Injection
6. Weak Audit Trail
7. Denial of Service
8. Database Communication Protocol Vulnerabilities
9. Weak Authentication
10. Backup Data Exposure

The common mistakes that are made in database systems are: 1. Poor design/planning 2. Ignoring normalization 3. Poor naming standards 4. Lack of documentation 5. One table to hold all domain values 6. Trying to build generic objects 7. Lack of testing

Recommended solutions to protect the Database are:
-Audit the industry 's widest range of databases for security, configuration and operational vulnerabilities, exploit root level access to collect evidence for reporting and ensure you secure you most valuable assets.
-Provide detailed reporting and remediation guidelines to your security staff so they have the insight they need to resolve issues quickly and easily.
-Ensure policy compliance with pre-defined policy report templates and a single-scan capability that check for both policy compliance and vulnerabilities in the same scan - streamlining security configuration assessment efforts for internal and external auditors.
-Verify and validate vulnerabilities and risks: N-expose and M-etasploit can use the results from the database scan to penetrate the operating system to find additional vulnerabilities that would otherwise be left hidden.

Open source (or not) database platforms like MySQL, Microsoft SQL Server, and PostgreSQL that have achieved broad acceptance provide adept, malicious hackers an obvious path to attack websites en masse. With FireHost, we can trust that our database will be protected with the most advanced security available.



References: 1. Ten Common Database Design Mistakes by Louis Davidson. 2. Database design pitfalls by Victor Campos. 3. Database security solutions by Rapid 7 technologies.

You May Also Find These Documents Helpful

  • Good Essays

    Before any strategy takes place, an auditor must determine the end result desired from the Information Technology being used as well as the type of technology being dealt with. The most important thing is security thus it is vital to know this technology in and out to be able to determine its strengths and weaknesses. This allows for proper compensation to combat such attacks whether they are fraudulent or accidental in nature. It is necessary to be familiar with different types of proven viable internal control setups to properly test and gage an IT’s internal control system. There are three different strategies use when testing internal controls. First includes assessing the controls using user control information. In this strategy, an auditor would gather computer-generated reports and compare those to all documentation on specific transactions. This process is also known as auditing around the computer because it deals with more hard copy documents. The next strategy entails using application controls to determine the level of risk…

    • 627 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 331 Words
    • 2 Pages

    Given a list of policy violations and security breaches, select three breaches, and consider the best options for controlling and monitoring each incident. Identify the methods to mitigate risk and minimize exposure to threats or vulnerabilities.…

    • 331 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Identify risks that could lead to an information security breach, Identify vulnerabilities in system security, software operation, network design or employee procedures that could lead to a network failure.…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    FunSec2 SLM Lab04 Final

    • 295 Words
    • 2 Pages

    Analyzer (MBSA) to assess its security state, and you examined the results of the Microsoft…

    • 295 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Assignment

    • 533 Words
    • 3 Pages

    Organizations are under increased pressure to audit every action that a user performs within a database. This is due to increased focus on security, risk, accountability and avoidance of fraud and corruption. While security prevention measures (logins, firewalls, tokens etc.) are important to prevent unauthorized access to the data in the first place, as this survey shows, most breaches occur by users who are authorized but are either negligent or malicious.…

    • 533 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    CIS515 - Module05

    • 693 Words
    • 3 Pages

    Describe technical architecture as a structured process and compare it to software architecture. How are the two related? In what ways does it allow us to design better systems?…

    • 693 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Database

    • 504 Words
    • 4 Pages

    Copy and paste the specified ipconfig /all command output from the Windows CLI into the Task 1 box provided below.…

    • 504 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS3445 Lab 7

    • 371 Words
    • 2 Pages

    3. What possible high risk vulnerabilities did the Rats tool find in the DVWA application source code?…

    • 371 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    thesis of dbms

    • 1111 Words
    • 5 Pages

    The Mallows, also known as Alida Chanler Emmet and Christopher Temple Emmet Estate, is a historic home located at Head of the Harbor in Suffolk County, New York. It is a Colonial Revival estate home designed in 1906 by noted architect Charles A. Platt (1861–1933). It is an imposing structure, finished in stucco with powerful wooden detailing at the principal doorways, roof cornice and porch. It is a large rectangular mass, two full stories in height, seven bays long, with projecting wings. It features a simple pitched gable roof and a two story porch on the west wing with large Doric order piers.[2]…

    • 1111 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Report health and safety issues to the appropriate people and complete health, safety and security records according to legal and organisational requirements.…

    • 356 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Logs are a great monitoring tool that provides a record of events. As such, I need every occurrence to be logged, tracked and reported on. For each entry, I want to know "what" occurred, "when" it occurred, and "who" or what cause it. Monitoring compliance would allow me to: (1) "Detect and correct violations (2) Provide evidence to support enforcement actions (3) Evaluate program progress by establishing compliance status (4) Provide case studies for staff training (The SANS Institute, 2012). At each location I would nominate ISS enforcement officers who will be held responsible for monitoring and enforcement strategies to ensure that employees act in according with acceptable use policies (AUPs), set forth by management to ensure the organization assets are protected. Sguil (pronounced sgweel) is one of the best GUI monitoring tool around I would use that provides "real time events, sessions data, and raw packet captures." It facilitates seamless analysis, as when an alert that needs more investigation has been identified, it makes a decision on how to handle the situation. Sguil uses a backend database for most of its data, which allows users to perform SQL queries against several different types of security events (The SANS Institute, 2012). For access control, I would use…

    • 577 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Audit Memo

    • 780 Words
    • 4 Pages

    Types of RDBMS: MySQL 5.0 - an open-source database used extensively in small or medium-sized web applications. One of the simplest databases to secure from hacking because of the small attack surface it exposes…

    • 780 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    The class of vulnerabilities known as SQL injection continues to present an extremely high risk in the current network threat landscape. In 2011, SQL injection was ranked first on the MITRE Common Weakness Enumeration (CWE)/SANS Top 25 Most Dangerous Software Errors list.1 Exploitation of these vulnerabilities has been implicated in many recent high-profile intrusions. Although there is an abundance of good literature in the community about how to prevent SQL injection vulnerabilities, much of this documentation is geared toward web application developers. This advice is of limited benefit to IT administrators who are merely responsible for the operation of targeted web applications. In this document, we will provide concrete guidance about using open source tools and techniques to independently identify common SQL injection vulnerabilities, mimicking the approaches of attackers at large. We highlight testing tools and illustrate the critical results of testing.…

    • 4315 Words
    • 18 Pages
    Powerful Essays
  • Powerful Essays

    This concept is basically about the reserving railway tickets for passengers. This method can be used as an online method for reserving tickets as well as canceling of reserved tickets. This system maintains whole of the database in an efficient way as it uses SQL database. This is permanent data storage method and chances of data loss are only if the database crashes. This system is meant for use by Indian Railways for handling reservations only. The system must cater to all passenger services provided by Indian Railways and must minimally provide support for reservation of different classes of seats/berths, onward journeys, wait-listed tickets and RAC tickets. Providing support for reservation will also require that the system records…

    • 1584 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Essay Dbms

    • 548 Words
    • 3 Pages

    As our requirement for our DBMS subject, we interviewed Mr. Charleton Lopez, one of the database administrators hired by Accenture, last Saturday at SM Mall of Asia.…

    • 548 Words
    • 3 Pages
    Good Essays