Database Security Group 5 - AC2A PDF
Document Details
Uploaded by Deleted User
null
Malabag, Alessandra Mikaela M. Maglinao, Francine L.
Tags
Summary
This document discusses database security, covering various aspects such as types, threats, and importance. It includes information about firewalls, authentication methods, and authorization to manage data access. The document also details potential security threats and implications like data theft, revenue loss and reputational damage as well as the importance and costs of data breaches.
Full Transcript
DATABASE SECURITY Group 5 - AC2A Start Now DATABASE SECURITY Database security is the processes, tools, and controls that secure and protect databases against accidental and intentional threats. The objective of database security is to secure sensitive data and maintain the confidentiality, avail...
DATABASE SECURITY Group 5 - AC2A Start Now DATABASE SECURITY Database security is the processes, tools, and controls that secure and protect databases against accidental and intentional threats. The objective of database security is to secure sensitive data and maintain the confidentiality, availability, and integrity of the database. TYPES OF DATABASE SECURITY FIREWALLS It serve as the first line of defense in DiD database security. Logically, a firewall is a separator or restrictor of network traffic, which can be configured to enforce your organization's data security policy. AUTHENTICATION Authentication is the process of proving the user is who he or she claims to be by entering the correct user ID and password. AUTHORIZATION Allows each user to access certain data objects and perform certain database operations like read but not modify data, modify but not delete data, or delete data. Malabag, Alessandra Mikaela M. THREAT DETECTION Uncovers anomalous database activities that indicate a potential security threat to the database and can surface information about suspicious events directly to the administrator. Malabag, Alessandra Mikaela M. INFORMATION PROTECTION refers to strategies and practices that safeguard sensitive data from unauthorized access, loss, or damage. Maglinao, Francine L. DATA ENCRYPTION Converting data into a coded format to prevent unauthorized access. DATABASE BACKUP AND RECOVERY Creating copies of data to restore it in case of loss or corruption. PHYSICAL SECURITY Protecting physical assets, like servers, through access controls and surveillance. Maglinao, Francine L. GROUP 5 - ITAPP WHY IS DATABASE SECURITY IMPORTANT? Data thefT Damage to business and brand reputation Revenue loss Increased costs Data breach violation penalties GROUP 5 - ITAPP DATA THEFT Databases are prime targets for cyberattacks because they often store valuable, confidential, and sensitive information, including customer records, credit card numbers, bank account numbers, and personal identification numbers. DAMAGE TO BUSINESS AND BRAND REPUTATION Customers hesitate to do business with companies that don't protect their personal data. Database security issues that compromise customer information can damage the organization's reputation, resulting in a decline in sales and customer churn. REVENUE LOSS A data breach can halt or slow down business operations and revenue generation until the database security challenges are resolved, the system is completely up and running again, and business continuity is restored INCREASED COSTS Data breaches can cost millions of dollars to fix, including legal fees, assisting victims, and extra expenses to recover data and restore systems. Companies might also pay ransomware to hackers who demand payment to restore their locked files and data. To protect against these costs, many businesses add cyber insurance to their policies. DATA BREACH VIOLATION PENALTIES State and local agencies impose fines, and in some cases require that customers are compensated, when companies don’t protect their customer data. Database Security Presentation THANK YOU FOR YOUR ATTENTION See You Next