Wentworth Institute of Technology COMP570 – Database Applications | Fall 2014 | Derbinsky
Security and Privacy
Lecture 11
24 November 2014 Security 1
Security and Privacy Lecture 11 Security 24 November 2014 1 - - PowerPoint PPT Presentation
Wentworth Institute of Technology COMP570 Database Applications | Fall 2014 | Derbinsky Security and Privacy Lecture 11 Security 24 November 2014 1 Wentworth Institute of Technology COMP570 Database Applications | Fall 2014 | Derbinsky
Wentworth Institute of Technology COMP570 – Database Applications | Fall 2014 | Derbinsky
24 November 2014 Security 1
Wentworth Institute of Technology COMP570 – Database Applications | Fall 2014 | Derbinsky
– Discretionary, Mandatory – Least Privilege, Separate Privileges – Strong password policies, 2FA
– SQL Injection – DoS (limit password length!) – Brute force password attempts (iCloud) – Internal vs. External (80% internal via Oracle) – Separate server, updates, audit logs
– Symmetric, Asymmetric, Hashing – tricky to get right! – Whole Database (and backups!), Communication – Sensitive Data (salting)
24 November 2014 Security 2
Wentworth Institute of Technology COMP570 – Database Applications | Fall 2014 | Derbinsky
24 November 2014 Security 3
Wentworth Institute of Technology COMP570 – Database Applications | Fall 2014 | Derbinsky
24 November 2014 Security 4
Wentworth Institute of Technology COMP570 – Database Applications | Fall 2014 | Derbinsky
24 November 2014 Security 5
Wentworth Institute of Technology COMP570 – Database Applications | Fall 2014 | Derbinsky
24 November 2014 Security 6
Wentworth Institute of Technology COMP570 – Database Applications | Fall 2014 | Derbinsky
24 November 2014 Security 7
Wentworth Institute of Technology COMP570 – Database Applications | Fall 2014 | Derbinsky
24 November 2014 Security 8
Wentworth Institute of Technology COMP570 – Database Applications | Fall 2014 | Derbinsky
24 November 2014 Security 9
Wentworth Institute of Technology COMP570 – Database Applications | Fall 2014 | Derbinsky
24 November 2014 Security 10
Wentworth Institute of Technology COMP570 – Database Applications | Fall 2014 | Derbinsky
24 November 2014 Security 11
Wentworth Institute of Technology COMP570 – Database Applications | Fall 2014 | Derbinsky
24 November 2014 Security 12
Wentworth Institute of Technology COMP570 – Database Applications | Fall 2014 | Derbinsky
SQL manipulation for nefarious purpose Method
– Parameters, function calls
Goals
Protection
24 November 2014 Security 13
Wentworth Institute of Technology COMP570 – Database Applications | Fall 2014 | Derbinsky
24 November 2014 Security 14
Wentworth Institute of Technology COMP570 – Database Applications | Fall 2014 | Derbinsky
24 November 2014 Security 15
Wentworth Institute of Technology COMP570 – Database Applications | Fall 2014 | Derbinsky
24 November 2014 Security 16
Wentworth Institute of Technology COMP570 – Database Applications | Fall 2014 | Derbinsky
24 November 2014 Security 17
Wentworth Institute of Technology COMP570 – Database Applications | Fall 2014 | Derbinsky
24 November 2014 Security 18
Wentworth Institute of Technology COMP570 – Database Applications | Fall 2014 | Derbinsky
24 November 2014 Security 19
Wentworth Institute of Technology COMP570 – Database Applications | Fall 2014 | Derbinsky
24 November 2014 Security 20