Security framework of database system and its security technology

Source: Internet
Author: User
Keywords Security
1. With the rapid development of computer technology, the application of database is very extensive, in-depth to various fields, but with the resulting data security problems. The security of large amount of data in the database of various application systems, the problem of stealing and tamper-proof of sensitive data are paid more and more attention by people. The database system as the information gathers the collective, is the computer Information System core component, its security is vital, relates to the enterprise rise and fall, success or failure. Therefore, how to effectively guarantee the security of database system, and realize the confidentiality, integrality and validity of data, has become one of the important subjects in the field of research, this paper discusses the security and intrusion prevention technology briefly. The security of database system, in addition to its own internal security mechanism, also with the external network environment, application environment, the quality of employees and other factors closely related to, therefore, in a broad sense, the database system security framework can be divided into three levels: (1) network system level; (2) host operating system level; (3) Database management system level. These three layers are built into the security system of database system, and the relation of data security is gradually close, the importance of precaution is strengthened step by step, from outside to inside, exhaustively guarantee data security. The following is a discussion of the three levels of the security framework. 2. Network system level security technology in a broad sense, the security of the database first depends on the network system. With the development and popularization of Internet, more and more companies are transferring their core business to the Internet, and various web-based database application systems have sprung up to provide various information services for network users. It can be said that the network system is the external environment and foundation of database application, the database system should play its powerful role without the support of network system, users of database system (such as remote users, distributed users) also have to access the data of the database through the network. The security of network system is the first barrier of database security, and the external intrusion starts from the intrusion network system first. Network intrusion attempts to destroy the integrity of information systems, a collection of any network activity that is confidential or trustworthy and has the following characteristics: a) without geographical and time constraints, attacks across national borders are as convenient as on-site; b) attacks through the network are often mixed in a large number of normal network activities, concealment strong; Intrusion means more concealment and complexity. There are several types of threats facing the open environment of computer network system: (a) deception (masquerade); b) Replays (c) message modification (modification of messages); d) Denial of service (Deny) Trap Gate (trapdoor); f) Trojan Horse (Trojan Horse), g) attack, such as Turner Attack (tunneling Attack), application software attack, etc. These security threats are omnipresent and ubiquitous, and therefore must be taken effectivelyMeasures to ensure the safety of the system. From the technical point of view, the network system level of security protection technology has many kinds, can be divided into firewalls, intrusion detection, cooperative intrusion detection technology. (1) firewall is the most widely used precaution technology as the first line of defense of the system, its main role is to monitor access between trusted and untrusted networks, to form a protective barrier between the internal and external networks, to intercept illegal access from the outside and to prevent the leaking of internal information, But it cannot block illegal operations from within the network. It is based on predetermined rules to determine whether to intercept the flow of information, but can not dynamically identify or adjust the rules adaptively, so the degree of intelligence is limited. There are three types of firewall technology: Packet filter (packet filter), Agent (proxy) and state analysis (stateful Cotecna). Modern firewall products are often mixed with these technologies. (2) Intrusion detection (ids-instrusion detection System) is a kind of prevention technology developed in recent years, the technology and methods of statistical technique, rule method, network communication technology, artificial intelligence, cryptography, inference etc. Its role is to monitor whether networks and computer systems appear to be invaded or abused. The IDs system has become an important part of the security defense system for the first time in 1987, Derothy Denning the idea of intrusion detection, and it has been developed and perfected as a standard solution to monitor and identify attacks. The analysis technique used in intrusion detection can be divided into three categories: signature, statistic and data integrity analysis. The ① signature analysis method is mainly used to monitor the behavior of attacks on known weaknesses of the system. People generalize their signatures from attack patterns and write them into the IDS system code. Signature analysis is actually a template matching operation. ② statistical analysis method is based on statistics, according to the normal use of the system observed in the action mode to determine whether an action deviated from the normal track. ③ data Integrity analysis method based on cryptography, can verify whether the file or the object has been modified by others. The types of IDs include network-based and host-based intrusion detection systems, feature-based and non-normal intrusion monitoring systems, real-time and non-real time intrusion monitoring systems, and so on. (3) Cooperative intrusion monitoring technology independent intrusion monitoring system can not make effective monitoring and response to a wide range of intrusion activities, in order to make up for the lack of independent operation, people put forward the idea of cooperative intrusion monitoring system. In the cooperative intrusion monitoring system, IDS is based on a uniform specification, the intrusion monitoring components automatically exchange information, and through the exchange of information to get the effective intrusion monitoring, can be applied to different network environment. 3. Host operating system level security technology operating system is a large database system operating platform for the database system to provide a certainDegree of security protection. Most of the operating system platforms are currently concentrated in Windows NT and UNIX, and the security level is usually C1, C2 level. The main security technologies are operating system security strategy, security management strategy, data security and so on. The operating system security policy is used to configure security settings for the local computer, including password policies, account lockout policies, audit policies, IP Security Policies, user rights assignments, recovery agents for encrypted data, and other security options. Specific can be reflected in user accounts, passwords, access rights, auditing and so on. User account: User access to the system's "identity card", only legitimate users have accounts. Password: The user's password provides an authentication for the user to access the system. Access rights: Specify the permissions of the user. Audit: The user's behavior is tracked and recorded, so that the system administrator to analyze the system's access and subsequent follow-up use. "Responsible editor: Snowflake TEL: (010) 68476606-8008" to force (0 Votes) Tempted (0 Votes) nonsense (0 Votes) Professional (0 Votes) The title of the party (0 Votes) passed (0 vote) The original text: Database system security Framework and its security technology back to the network security home
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.