1 / 9

What are the common problems facing Database Security?

What are the common problems facing Database Security? . Presenters: Group 13 Yichen Jiang, Yingxu Liu. Ericka Chickowski, “ Five Hurdles That Slow Database Security Adoption ” , Dark Reading, Mar 20, 2013. Overview. Why database security is so important? Current technologies

azure
Download Presentation

What are the common problems facing Database Security?

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. What are the common problems facing Database Security? Presenters: Group 13 Yichen Jiang, Yingxu Liu Ericka Chickowski, “Five Hurdles That Slow Database Security Adoption”, Dark Reading, Mar 20, 2013

  2. Overview • Why database security is so important? • Current technologies • Challenges: scale, tech integration, tradeoff

  3. Why Database Security is So Important? • On March 20, a wave of cyberattacks that targeted South Korean banks and media networks. [1] • On March 8, the U.S. National Vulnerability Database (NVD) was taken down due to suspicious activity detected. [2]

  4. Why Database Security is So Important? • On early March, an anonymous hacker claimed to have attacked a website belonging to the U.S. Department of State. An analyze indicated 199 Email Addresses, 207 Possible Hashed Passwords leaked.[3]

  5. Current technologies • Database Activity Monitoring (DAM) • Interchangeably: • Security Information and Event Management (SIEM) • Security event manager (SEM) • Security information management (SIM)

  6. Challenges - Scale(1/3) • A small or midsize operation has only dozens or even hundreds of database servers to protect. • 40% of Fortune 500 companies have more than 10,000 database servers. Even 20% of those databases require activity monitor and enforce separation of duties, it can easily cost millions.

  7. Challenges - Tech integration (2/3) • Use DAM for failed log-in detection • DAM and SIEM don’t work well together

  8. Challenges - Trade off (3/3) • Security comes second to performance. • When administrators focus on availability, they often overlook configuration issues that can introduce security vulnerabilities and expose confidential data.

  9. Reference [1] Kelly Jackson Higgins, “'Loud' Data-Annihilation Cyberattacks Hit South Korean Banks, Media Outlets”, Dark Reading, Mar 20, 2013. [2] Larry Seltzer, “U.S. National Vulnerability Database Hacked”, Dark Reading, Mar 14, 2013. [3] “Anonymous Attacks US State Department Careers Website”, Dark Reading, Mar 14, 2013. [4] Ericka Chickowski, “Five Hurdles That Slow Database Security Adoption”, Dark Reading, Mar 20, 2013

More Related