IMPLEMENTATION OF DATABASE SECURITY BASED ON ORACLE AUDIT VAULT AND DATABASE FIREWALL

Authors

DOI:

https://doi.org/10.28925/2663-4023.2024.26.666

Keywords:

Database Management System, Authorization Model, Role-Based Access Control, SQL Injection, Program Query Language, Database Activity Monitoring, Database Firewall.

Abstract

Abstract. The paper provides recommendations for protecting databases from unauthorized intrusions, organizes the collection of statistics on the relevance and potential number of database attacks currently occurring worldwide, and offers a general overview of database attacks and countermeasures. To monitor database activity for unauthorized actions, the solution used is Oracle Audit Vault and Database Firewall, which combines built-in audit data with network SQL traffic capture. This solution prevents unauthorized database connections. It is evident that some databases may be compromised by cybercriminals through sheer luck or by exploiting employee negligence. Many companies may neglect to change default login credentials for information systems. Weak employee passwords that are easy to guess, or passwords that are not changed regularly, can also be exposed by cybercriminals. Hackers often use automated software to gain unauthorized access to an information system by brute-forcing passwords, cycling through words from a dictionary. Many users choose simple words for passwords that could potentially be included in a dictionary, making the information system vulnerable. Additionally, database access can easily be achieved using malicious software designed to exploit unprotected or outdated systems. This can also apply to unused database features, which may have their own vulnerabilities. Attackers can exploit software vulnerabilities in various ways, such as writing code for a target vulnerability hidden inside malware. Updates can improve software performance, fix existing bugs, remove outdated features that take up disk space, and enhance the overall security of the system. Updates are available for both operating systems and database management systems, and are crucial for ensuring their security and stability.

Downloads

Download data is not yet available.

References

Pasichnyk, V. V., & Reznychenko V. A. (2006). Organization of Databases and Knowledge. Kyiv: BHV Publishing Group.

Basta, A., & Z. Melissa. (2011). Database Security. Cengage Learning.

Gertz, M., Jajodia, S. (2008). Handbook of Database Security: Applications and Trends. Springer. https://doi.org/10.1007/978-0-387-48533-1

Chen, P. P. (2002). Entity-Relationship Modeling: Historical Events, Future Trends, and Lessons Learned. Software Pioneers, 296–310. https://doi.org/10.1007/978-3-642-59412-0_17

Matvieiev, D., & Fedorenko, D. (2019). The Problem of Protection of Personal Data on the Internet. ΛΌГOΣ.ONLINE: International scientific e-journal, 4.

Managing Claims and Authorization with the Identity Model. (n. d.). https://learn.microsoft.com/en-us/dotnet/framework/wcf/feature-details/managing-claims-and-authorization-with-the-identity-model

Security Testing: SQL Injections. (2020). https://training.qatestlab.com/blog/technical-articles/security-testing-sql-injection

Popadyuk, V. V. (2020). Encryption in SQL SERVER Databases. Cybersecurity in the Modern World: Materials of the II All-Ukrainian Scientific and Practical Conference.

Basic Security Practices for SQLite: Safeguarding Your Data. (n. d.). https://dev.to/stephenc222/basic-security-practices-for-sqlite-safeguarding-your-data-23lh

Omotunde, H., & Maryam A. (2023). A Comprehensive Review of Security Measures in Database Systems: Assessing Authentication, Access Control, and Beyond. Mesopotamian Journal of CyberSecurity, 2023, 115–133. https://doi.org/10.58496/MJCSC/2023/016

Server Performance and Activity Monitoring. (n. d.). https://learn.microsoft.com/en-us/sql/relational-databases/performance/server-performance-and-activity-monitoring?view=sql-server-ver16

Oracle® Audit Vault and Database Firewall. (n. d.). https://docs.oracle.com/en/database/oracle/audit-vault-database-firewall/20/sigdv/what-is-oracle-audit-vault-and-database-firewall

Hulak, H. M., Zhiltsov, O. B., Kyrychok, R. V., Korshun, N. V., & Skladannyi, P. M. (2024). Information and cyber security of the enterprise. Textbook. Lviv: Publisher Marchenko T. V.

Downloads


Abstract views: 2

Published

2024-12-19

How to Cite

Tyshyk, I. (2024). IMPLEMENTATION OF DATABASE SECURITY BASED ON ORACLE AUDIT VAULT AND DATABASE FIREWALL. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 2(26), 56–70. https://doi.org/10.28925/2663-4023.2024.26.666