Database Systems
#2
[attachment=5642]
Database Management System
Protection Profile


lowing threats are countered by the DBMS.
T.ACCESS Unauthorised Access to the Database. An outsider or system user who is not (currently)
an authorised database user accesses the DBMS. This threat includes: Impersonation -
a person, who may or may not be an authorised database user, accesses the DBMS, by
impersonating an authorised database user (including an authorised user impersonating
a different user who has different - possibly more privileged - access).
T.DATA Unauthorised Access to Information. An authorised database user accesses information
contained within a DBMS without the permission of the database user who owns or
who has responsibility for protecting the data.
32 This threat includes unauthorised access to DBMS information, residual information
held in memory or storage resources managed by the TOE, or DB control data.
T.RESOURCE Excessive Consumption of Resources. An authenticated database user consumes global
database resources, in a way which compromises the ability of other database users to
access the DBMS.
33 This represents a threat to the availability of the information held within a DBMS. For
example, a database user could perform actions which could consume excessive
resources, preventing other database users from legitimately accessing data, resources
and services in a timely manner. Such attacks may be malicious, inconsiderate or
careless, or the database user may simply be unaware of the potential consequences of
his actions. The impact of such attacks on system availability and reliability would be
greatly amplified by multiple users acting concurrently.
T.ATTACK Undetected Attack. An undetected compromise of the DBMS occurs as a result of an
attacker (whether an authorised user of the database or not) attempting to perform
actions that the individual is not authorised to perform.
34 This threat is included because, whatever countermeasures are provided to address the
other threats, there is still a residual threat of a violation of the security policy occurring
by attackers attempting to defeat those countermeasures.
T.ABUSE.USER Abuse of Privileges. An undetected compromise of the DBMS occurs as a result of a
database user (intentionally or otherwise) performing actions the individual is
authorised to perform.
35 This threat is included because, whatever countermeasures are provided to address the
other threats, there is still a residual threat of a violation of the security policy occurring,
or the database being placed at risk, as a result of actions taken by authorised
database users. For example a database user may grant access to a DB object they are
responsible for to another database user who is able to use this information to perform
a fraudulent action.
36 Note that this threat does not extend to highly trusted database users: see the assumption
A.MANAGE below.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
Database Systems - by project report helper - 12-10-2010, 10:46 AM
RE: Database Systems - by project report helper - 12-10-2010, 10:54 AM
RE: Database Systems - by project report helper - 13-10-2010, 12:22 PM

Possibly Related Threads...
Thread Author Replies Views Last Post
  SLOT VIEW SIMULATION OF WIND ELECTRICAL SYSTEMS seminar paper 1 1,412 26-11-2012, 01:49 PM
Last Post: seminar details
  AN INVESTIGATION OF ANTI-LOCK BRAKING SYSTEMS FOR HEAVY GOODS VEHICLES project uploader 1 1,878 23-11-2012, 12:06 PM
Last Post: seminar details
  INTRODUCTION TO DATABASE MANAGEMENT SYSTEMS seminar paper 1 2,255 13-11-2012, 12:18 PM
Last Post: seminar details
  BUG TRACKING SYSTEMS project uploader 1 1,799 20-10-2012, 12:37 PM
Last Post: seminar details
  VIRTUAL DATABASE TECHNOLOGY FOR DISTRIBUTED DATABASE abstract seminar details 0 1,413 09-06-2012, 06:00 PM
Last Post: seminar details
  DISTRIBUTED DATABASE ARCHITECTURE FOR GLOBAL ROAMING IN FUTURE MOBILE NETWORKS seminar details 0 988 08-06-2012, 05:22 PM
Last Post: seminar details
  An Open Source Laboratory for Operating Systems Projects full report seminar details 0 967 08-06-2012, 04:21 PM
Last Post: seminar details
  Mobile Agents for World Wide Web Distributed Database Access project uploader 0 1,258 08-06-2012, 03:01 PM
Last Post: project uploader
  Mobile Radio Systems Historical Milestones to 1995 seminar details 0 794 08-06-2012, 11:55 AM
Last Post: seminar details
  An Open Source Laboratory for Operating Systems Projects seminar details 0 911 08-06-2012, 11:31 AM
Last Post: seminar details

Forum Jump: