Wentworth Institute of Technology COMP2670 – Databases | Spring 2016 | Derbinsky
Security and Privacy
Lecture 13
March 28, 2016 Security and Privacy 1
Security and Privacy Lecture 13 Security and Privacy March 28, - - PowerPoint PPT Presentation
Wentworth Institute of Technology COMP2670 Databases | Spring 2016 | Derbinsky Security and Privacy Lecture 13 Security and Privacy March 28, 2016 1 Wentworth Institute of Technology COMP2670 Databases | Spring 2016 | Derbinsky
Wentworth Institute of Technology COMP2670 – Databases | Spring 2016 | Derbinsky
March 28, 2016 Security and Privacy 1
Wentworth Institute of Technology COMP2670 – Databases | Spring 2016 | Derbinsky
– Strong password policies, 2FA – Discretionary, Mandatory – Least Privilege, Separate Privileges
– SQL Injection – DoS (limit password length!) – Brute force password attempts (iCloud) – Internal vs. External (80% internal via Oracle) – Separate server, updates, audit logs
– Symmetric, Asymmetric, Hashing – tricky to get right! – Whole Database (and backups!), Communication – Sensitive Data (salting)
March 28, 2016 Security and Privacy 2
Wentworth Institute of Technology COMP2670 – Databases | Spring 2016 | Derbinsky
March 28, 2016 Security and Privacy 3
Wentworth Institute of Technology COMP2670 – Databases | Spring 2016 | Derbinsky
– Early on security was an add-on, now it is everything
– Don’t assume a firewall will save you
– What happens after a breach occurs?
– Anything but the crypto!
– Keys in binary stand out like sore thumbs – Stored procedures are not a cure for access control
March 28, 2016 Security and Privacy 4
Wentworth Institute of Technology COMP2670 – Databases | Spring 2016 | Derbinsky
March 28, 2016 Security and Privacy 5
Wentworth Institute of Technology COMP2670 – Databases | Spring 2016 | Derbinsky
March 28, 2016 Security and Privacy 6
Wentworth Institute of Technology COMP2670 – Databases | Spring 2016 | Derbinsky
March 28, 2016 Security and Privacy 7
Wentworth Institute of Technology COMP2670 – Databases | Spring 2016 | Derbinsky
March 28, 2016 Security and Privacy 8
Wentworth Institute of Technology COMP2670 – Databases | Spring 2016 | Derbinsky
March 28, 2016 Security and Privacy 9
Wentworth Institute of Technology COMP2670 – Databases | Spring 2016 | Derbinsky
March 28, 2016 Security and Privacy 10
Wentworth Institute of Technology COMP2670 – Databases | Spring 2016 | Derbinsky
March 28, 2016 Security and Privacy 11
Wentworth Institute of Technology COMP2670 – Databases | Spring 2016 | Derbinsky
March 28, 2016 Security and Privacy 12
Wentworth Institute of Technology COMP2670 – Databases | Spring 2016 | Derbinsky
March 28, 2016 Security and Privacy 13
Wentworth Institute of Technology COMP2670 – Databases | Spring 2016 | Derbinsky
March 28, 2016 Security and Privacy 14
Wentworth Institute of Technology COMP2670 – Databases | Spring 2016 | Derbinsky
March 28, 2016 Security and Privacy 15
Wentworth Institute of Technology COMP2670 – Databases | Spring 2016 | Derbinsky
March 28, 2016 Security and Privacy 16
Wentworth Institute of Technology COMP2670 – Databases | Spring 2016 | Derbinsky
SQL manipulation for nefarious purpose Method
– Parameters, function calls
Goals
– Learn about service via version, configuration
Protection
March 28, 2016 Security and Privacy 17
Wentworth Institute of Technology COMP2670 – Databases | Spring 2016 | Derbinsky
March 28, 2016 Security and Privacy 18
Wentworth Institute of Technology COMP2670 – Databases | Spring 2016 | Derbinsky
March 28, 2016 Security and Privacy 19
Wentworth Institute of Technology COMP2670 – Databases | Spring 2016 | Derbinsky
March 28, 2016 Security and Privacy 20
Wentworth Institute of Technology COMP2670 – Databases | Spring 2016 | Derbinsky
March 28, 2016 Security and Privacy 21
Wentworth Institute of Technology COMP2670 – Databases | Spring 2016 | Derbinsky
March 28, 2016 Security and Privacy 22
Wentworth Institute of Technology COMP2670 – Databases | Spring 2016 | Derbinsky
March 28, 2016 Security and Privacy 23
Wentworth Institute of Technology COMP2670 – Databases | Spring 2016 | Derbinsky
March 28, 2016 Security and Privacy 24
Wentworth Institute of Technology COMP2670 – Databases | Spring 2016 | Derbinsky
March 28, 2016 Security and Privacy 25
Wentworth Institute of Technology COMP2670 – Databases | Spring 2016 | Derbinsky
March 28, 2016 Security and Privacy 26
Wentworth Institute of Technology COMP2670 – Databases | Spring 2016 | Derbinsky
March 28, 2016 Security and Privacy 27
Wentworth Institute of Technology COMP2670 – Databases | Spring 2016 | Derbinsky
March 28, 2016 Security and Privacy 28
Wentworth Institute of Technology COMP2670 – Databases | Spring 2016 | Derbinsky
March 28, 2016 Security and Privacy 29
Wentworth Institute of Technology COMP2670 – Databases | Spring 2016 | Derbinsky
March 28, 2016 Security and Privacy 30
Wentworth Institute of Technology COMP2670 – Databases | Spring 2016 | Derbinsky
March 28, 2016 Security and Privacy 31
Wentworth Institute of Technology COMP2670 – Databases | Spring 2016 | Derbinsky
March 28, 2016 Security and Privacy 32