DB & WebApp Security Flashcards
Main Concepts
Secrecy
Integrity
Availability
Secrecy
Users should not be able to see things that they are not supposed to
Integrity
Users should not be able to modify things they are not supposed to
Availability
Users should be able to see and modify things they are allowed to
Encryption
A way of scrambling data so that only authorized parties can understand the information.
Symmetric Encryption
Encryption Key = Decryption Key –>All authorized users know decryption key
• Public-Key Encryption
o User’s encryption key: public
o User’s decryption key: secret
SSL
Secure Sockets Layer
Digital Signature
A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital document. It’s the digital equivalent of a handwritten signature or stamped seal, but it offers far more inherent security.
Two Main Security Mechanisms at DBMS Level
Discretionary access control: creator of a table automatically gets all privileges on it
Mandatory access control: Each DB object is assigned a security class
GRANT
• GRANT privileges On object TO users [WITH GRANT OPTION]: o SELECT o INSERT o DELETE o REFERENCES
Bell-LaPadula Model
Objects
• tables, views, tuples, …
Subjects
• users, user programs, …
Security classes: TS > S> C > U
• Top secret (TS), secret (S), confidential (C), unclassified (U)
Each object and subject is assigned a class
• Simple Security Property:
Subject S can read object O only if class(S) >= class(O))
• *-Property:
Subject S can write object O only if class(S) <= class(O)
Bell-LaPadula Model: Intuition
Idea: ensure that • information can only be read from higher to lower security levels • Information can only be written from lower to higher security level
Common Internet Attack
- Spear-phishing : acquire information by masquerading as a trustworthy entity
- Man in the middle: eavesdropping. Victims believe they talk directly to each other
- Watering-hole: Observe sites which group often uses and infect these and infect users as a consequence.
SQL Injection
’; DROP TABLE Users; –