T 2.40 Complexity of database access

The users access one or more databases through a database management system (DBMS). This access is obtained directly by the user or through an application. In order to guarantee the integrity of a database, all database accesses must be controlled from a central location. If database access is designed poorly, the following security problems may be encountered, among others:

User authorisations

Note: In addition to the actual data in a database, the properties of the individual database objects such as their structure, indexes, table keys, etc. are also stored in tables that can be accessed using SQL commands.

Note: The use of data warehouses, online analytic processing (OLAP) systems, and query tools to grant users data access rights often creates security conflicts. On the one hand, the decision-makers want to use as many data as possible from heterogeneous sources of data for evaluation purposes, but on the other hand, sensitive data needs to be protected against unauthorised access. The challenge is to design the access rights in such a way that they meet both the requirements in the field of data privacy and the requirements regarding the confidentiality of sensitive data, as well as the analysis requirements.

Remote access

Database queries

Examples: