IMPLEMENTATION OF DATABASE SECURITY BASED ON ORACLE AUDIT VAULT AND DATABASE FIREWALL
DOI:
https://doi.org/10.28925/2663-4023.2024.26.666Keywords:
Database Management System, Authorization Model, Role-Based Access Control, SQL Injection, Program Query Language, Database Activity Monitoring, Database Firewall.Abstract
Abstract. The paper provides recommendations for protecting databases from unauthorized intrusions, organizes the collection of statistics on the relevance and potential number of database attacks currently occurring worldwide, and offers a general overview of database attacks and countermeasures. To monitor database activity for unauthorized actions, the solution used is Oracle Audit Vault and Database Firewall, which combines built-in audit data with network SQL traffic capture. This solution prevents unauthorized database connections. It is evident that some databases may be compromised by cybercriminals through sheer luck or by exploiting employee negligence. Many companies may neglect to change default login credentials for information systems. Weak employee passwords that are easy to guess, or passwords that are not changed regularly, can also be exposed by cybercriminals. Hackers often use automated software to gain unauthorized access to an information system by brute-forcing passwords, cycling through words from a dictionary. Many users choose simple words for passwords that could potentially be included in a dictionary, making the information system vulnerable. Additionally, database access can easily be achieved using malicious software designed to exploit unprotected or outdated systems. This can also apply to unused database features, which may have their own vulnerabilities. Attackers can exploit software vulnerabilities in various ways, such as writing code for a target vulnerability hidden inside malware. Updates can improve software performance, fix existing bugs, remove outdated features that take up disk space, and enhance the overall security of the system. Updates are available for both operating systems and database management systems, and are crucial for ensuring their security and stability.
Downloads
References
Pasichnyk, V. V., & Reznychenko V. A. (2006). Organization of Databases and Knowledge. Kyiv: BHV Publishing Group.
Basta, A., & Z. Melissa. (2011). Database Security. Cengage Learning.
Gertz, M., Jajodia, S. (2008). Handbook of Database Security: Applications and Trends. Springer. https://doi.org/10.1007/978-0-387-48533-1
Chen, P. P. (2002). Entity-Relationship Modeling: Historical Events, Future Trends, and Lessons Learned. Software Pioneers, 296–310. https://doi.org/10.1007/978-3-642-59412-0_17
Matvieiev, D., & Fedorenko, D. (2019). The Problem of Protection of Personal Data on the Internet. ΛΌГOΣ.ONLINE: International scientific e-journal, 4.
Managing Claims and Authorization with the Identity Model. (n. d.). https://learn.microsoft.com/en-us/dotnet/framework/wcf/feature-details/managing-claims-and-authorization-with-the-identity-model
Security Testing: SQL Injections. (2020). https://training.qatestlab.com/blog/technical-articles/security-testing-sql-injection
Popadyuk, V. V. (2020). Encryption in SQL SERVER Databases. Cybersecurity in the Modern World: Materials of the II All-Ukrainian Scientific and Practical Conference.
Basic Security Practices for SQLite: Safeguarding Your Data. (n. d.). https://dev.to/stephenc222/basic-security-practices-for-sqlite-safeguarding-your-data-23lh
Omotunde, H., & Maryam A. (2023). A Comprehensive Review of Security Measures in Database Systems: Assessing Authentication, Access Control, and Beyond. Mesopotamian Journal of CyberSecurity, 2023, 115–133. https://doi.org/10.58496/MJCSC/2023/016
Server Performance and Activity Monitoring. (n. d.). https://learn.microsoft.com/en-us/sql/relational-databases/performance/server-performance-and-activity-monitoring?view=sql-server-ver16
Oracle® Audit Vault and Database Firewall. (n. d.). https://docs.oracle.com/en/database/oracle/audit-vault-database-firewall/20/sigdv/what-is-oracle-audit-vault-and-database-firewall
Hulak, H. M., Zhiltsov, O. B., Kyrychok, R. V., Korshun, N. V., & Skladannyi, P. M. (2024). Information and cyber security of the enterprise. Textbook. Lviv: Publisher Marchenko T. V.
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Іван Тишик
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.