Database Security

Currently, database security concerns the use of a broad range of information security controls to protect databases (potentially including the data, the database applications or stored functions, the database systems, the database servers and the associated network links) against compromises of their confidentiality, integrity and availability. It involves various types or categories of controls, such as technical, procedural/administrative and physical. Therefore, the database and information system is highly secured by all levels of control categories.

Technical Controls

The current database and information system, as it is established in Linux system, it is safe in relation to virus and hacker risks. Moreover, the level of security on the technical issues is at higher level where hackers and technical professionals could not easily access it.

Procedural and administrative controls

The database security program has included the regular review of permissions granted to individually owned accounts and accounts used by automated processes. The accounts used by automated processes have appropriate controls around password storage such as sufficient encryption and access controls to reduce the risk of compromise.

Authentication and Authorization

For individual accounts, a two-factor authentication system has been considered in a database environment where the risk is commensurate with the expenditure for such an authentication system. Therefore, a security module implemented in the system based on the stable and reliable built-in security package of Zend framework that allows creation of new user accounts, user authentication and authorization of user to access the data sored based on their privilege.

Database back-up that prevents from physical damage

For physical control from damage and stolen problems a replica is placed in different locations. In conjunction with a sound database security program, an appropriate disaster recovery program have been set to ensure that service is not interrupted during a security incident or any other incident that results in an outage of the primary database environment. Therefore, a replication for the primary databases is placed to sites located in different geographical regions for this case at CDE of Bern University, Switzerland. For the future additional database nodes are planned in the country. The backup process will be made every time where there is update of data and information.