Database Reference
In-Depth Information
1.2 Relational Database Security Concepts
In recent years, the need for securing relational databases has been
increased because of increased database attacks. Most companies
and organizations store their sensitive data in their own relational
databases. In recent years, attackers have been able to target large
relational databases that belong to large companies or large banks.
In the past, relational database attacks were common, but were fewer
than attacks on networks. Now, due to the increasing access of rela-
tional databases by many people, the chances of relational database
attacks have increased. The reason for these attacks is to obtain
money by getting sensitive information like credit card numbers or
Social Security numbers. Thus, it is important to protect relational
databases against these risks, and this is where database security
comes into place.
Relational database security can be defined as a system that
protects the confidentiality, integrity, and availability of the
database [6]. Unauthorized access to a relational database indicates
a loss of confidentiality, unauthorized modification to the available
data indicates a loss of integrity, and lack of access to relational data-
base services indicates a loss of availability. Loss of one or more of
these basic facets will have a bad impact on the security of the rela-
tional database.
The protection of the confidentiality, integrity, and availabil-
ity of  the relational database will be illustrated in more detail as
follows:
Confidentiality can be defined as a process for preventing
unauthorized access to the sensitive data that is stored in the
relational database. It can be ensured by applying encryption
to the data stored in the relational database. Encryption is a
process in which the information is encrypted in a way that
only authorized users can manage. The different levels for
encryption are described as follows:
• Data in transit means that an attacker can get access to the
sensitive information by observing the network between
the sender and the receiver.
• Data at rest means that an attacker can attack the infor-
mation stored in the relational database.
Search WWH ::




Custom Search