Unit 1 | HTCS 701Notes | Database Security and Access Control | AKTU Notes



    1. Introduction to Access Control

    Access Control is a security technique used to decide who can access what data in a database.

    In simple words, access control checks:

    • Who are you?
    • What are you allowed to do?

    In a database system, not all users should have full access. Some users can only read data, while others can insert, update, or delete data.

    Example: In a college database, students can view marks, teachers can update marks, and admins manage the entire database.


    2. Purpose of Access Control

    The main purpose of access control is to protect database data from unauthorized access.

    • Prevents unauthorized users from accessing data
    • Protects sensitive information like passwords and marks
    • Maintains data integrity
    • Ensures user privacy
    • Helps follow security rules and policies

    Example: Only HR staff can view employee salary details.


    3. Fundamentals of Access Control

    Authentication

    Authentication verifies the identity of a user. It answers the question: Who are you?

    Common methods include username-password, OTP, and biometrics.

    Authorization

    Authorization decides what actions a user can perform after login, such as read, write, update, or delete.

    Example: A student can read marks but cannot modify them.

    Accountability

    Accountability keeps track of user actions in the database.

    Example: The system records which user deleted a record and when.


    4. Policies of Access Control

    Access control policies define rules about who can access data and under what conditions.

    Policies answer:

    • Who can access?
    • What can be accessed?
    • Under which conditions?

    Example: Only managers can approve transactions above a certain amount.


    5. Models of Access Control

    Access control models define how permissions are assigned to users in a system.

    • Discretionary Access Control (DAC)
    • Mandatory Access Control (MAC)
    • Role-Based Access Control (RBAC)


    6. Mechanisms of Access Control

    Access control mechanisms are technical tools used to enforce access control policies.

    • Passwords
    • Access Control Lists (ACL)
    • User roles
    • Encryption
    • Authentication systems


    7. Discretionary Access Control (DAC)

    In DAC, the owner of the data decides who can access it.

    • Owner has full control
    • Permissions can be shared
    • Flexible but less secure

    Example: File sharing in Google Drive where the owner decides access.


    8. Mandatory Access Control (MAC)

    In MAC, access is controlled by the system, not by users.

    • Very strict security
    • Used in military and government systems
    • Based on security levels

    Example: A user with confidential clearance cannot access top-secret data.


    9. Role-Based Access Control (RBAC)

    In RBAC, access permissions are assigned based on user roles.

    • Users are assigned roles
    • Roles have predefined permissions
    • Easy to manage and scalable

    Example: Teacher role can update marks, student role can only view marks.


    Summary

    Term Meaning
    Access Control Controls who can access data
    Authentication Verifies user identity
    Authorization Decides user permissions
    DAC Owner decides access
    MAC System decides access
    RBAC Access based on roles

    No comments:

    Post a Comment