Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Securing SQL Server : protecting your database from attackers (3rd ed.)
Cherry D., Syngress Publishing, Waltham, MA, 2015. 462 pp. Type: Book (978-0-128012-75-8)
Date Reviewed: Dec 11 2015

Securing data is one of the main components of the Internet. The need for data security represents one of the most important strengths of an organization, because many organizations would not have any value without data security. This book offers solutions in this direction. It covers aspects ranging from the security requirements of databases to methods and techniques for securing them.

In a clear and concise style, with well-founded and exemplified pieces of information, the book’s 15 chapters allow readers to identify and analyze a range of solutions for securing databases. This book is recommended to both students and database administrators and staff. After reading it, users will better understand the security risks of database systems and the roles of security policies and security methods. Readers have in this book a benchmark in terms of practice for securing databases.

The chapters are presented such that they can be read in any order, saving the reader time, and are easy to understand because of the book’s technical, concise writing. The first chapter identifies and briefly describes database security requirements. The second chapter talks about controlling external access through firewalls and the network topology. Some of the encryption keys in Microsoft SQL Server are discussed in chapter 3. Chapter 4 looks at different database encryption techniques and algorithms, along with a comparison of client- and server-side techniques. The fifth chapter moves the discussion to application roles within SQL Server, as well as using Windows policies for password strength.

The next chapter discusses security at the instance level, as well as securing access to database tables using stored procedures. Chapters 7 and 8 present SQL Server Analysis Services (SSAS) and SQL Server Reporting Services (SSRS). Chapter 9 talks about the problem of SQL injection attacks and how to defend a database against them. The tenth chapter covers maintenance plans, including backup encryption, naming the backups with date or time flags.

The next chapter presents the different storage arrays and network switches. In chapter 12, readers will find information about login auditing, data query, and data modification auditing. Chapter 13 describes the operating system (OS) rights that users should have. The last two chapters review the various permissions that are needed to maintain a highly secure database system. Finally, the appendix provides readers with very useful checklists regarding Payment Card Industry Data Security Standard (PCI DSS), Sarbanes–Oxley Act of 2002 (SOX), and Health Insurance Portability and Accountability Act of 1996 (HIPAA) audits.

The book is a real challenge for readers, because of the main topic addressed (database security) and because of the beneficial way in which the author combines the concepts and thus contributes to a better understanding of these issues.

More reviews about this item: Amazon

Reviewer:  Eugen Petac Review #: CR144015 (1602-0096)
Bookmark and Share
  Reviewer Selected
 
 
Security, Integrity, And Protection (H.2.7 ... )
 
 
SQL Server (H.2.4 ... )
 
 
Reference (A.2 )
 
Would you recommend this review?
yes
no
Other reviews under "Security, Integrity, And Protection": Date
Security of random data perturbation methods
Muralidhar K., Sarathy R. ACM Transactions on Database Systems 24(4): 487-493, 1999. Type: Article
Apr 1 2000
Towards a configurable security architecture
Olivier M. Data Engineering 38(2): 121-145, 2001. Type: Article
Apr 17 2002
A propositional policy algebra for access control
Wijesekera D., Jajodia S. ACM Transactions on Information and System Security 6(2): 286-325, 2003. Type: Article
May 29 2003
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy