Abstract
Database management systems utilize various security measures but still have some known weaknesses. A security risk of ADABAS occurs from direct calls to the database from an unauthorized third-generation language program. Adaptive Server Enterprise is weak against denial of service attacks. Advantage Database Server security issue results from dynamic-link library injections. Access security weakness is the result of the use of macros. InterBase’s built-in backdoor left databases vulnerable for full access to the system. Other security risks will be discussed for Datacom, FileMaker, Integrated Database Management System, Informix, Ingres, InterSystems Caché, and SQL Server.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
B. Johnson, [Online], Adabas-Natural Best Practices for Multi-level Security. Available: https://techcommunity.softwareag.com/techniques-blog/-/blogs/adabas-natural-best-practices-for-multi-level-security. Retrieved: February 10, 2020
Anonymous [Online], Germany: Bringing the Latest Big Data Security Technology to the Mainframe, MENA Report, 2015. Available: https://library.semo.edu:2443/login?url=https://library.semo.edu:4836/docview/1662311993?accountid=38003. Retrieved: February 10, 2020
Anonymous [Online], ADABAS DBMS. Available: http://support.sas.com/documentation/cdl/en/acadbas/59521/HTML/default/viewer.htm#a000606259.htm. Retrieved: February 10, 2020
Anonymous [Online], ADABAS and NATURAL Security Options. Available: http://support.sas.com/documentation/cdl/en/acadbas/59521/HTML/default/viewer.htm#a000382555.htm. Retrieved: February 20, 2020
Anonymous [Online], Relational Database Server: Sybase: SAP ASE. (n.d.). Available: https://www.sap.com/products/sybase-ase.html#security-compliance. Retrieved February 20, 2020
M. Rouse [Online], What is Adaptive Server Enterprise (ASE)? Available: https://whatis.techtarget.com/definition/Adaptive-Server-Enterprise-ASE. Retrieved February 10, 2020
Anonymous [Online], Adaptive Server Enterprise 16.1. Available: http://infocenter.sybase.com/help/index.jsp?topic=/com.sybase.infocenter.help.ase.16.0/doc/html/title.html. Retrieved February 25, 2020
V. Vardanyan [Online], SAP ASE ODATA Server 16 Denial of Service. Available: https://packetstormsecurity.com/files/140610/SAP-ASE-ODATA-Server-16-Denial-Of-Service.html. Retrieved February 20, 2020
Anonymous [Online], CVE Details. (2016, November 3). Vulnerability Details: CVE-2016-7402. Available: https://www.cvedetails.com/cve/CVE-2016-7402/. Retrieved: February 25, 2020
P. Dobler, [Online], SAP Sybase ASE – Keeping Private Data Private with Data Encryption. Available: https://www.doblerconsulting.com/db-tech-trends/sap-sybase-ase-keeping-private-data-private-data-encryption/. Retrieved: February 25, 2020
Anonymous [Online], TrustWave SpiderLabs. TrustWave. Available: https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18846. Retrieved: February 25, 2020
D.E. Denning, S.G. Akl, M. Heckman, T.F. Lunt, M. Morgenstern, P.G. Neumann, R.R. Schell [Online], Views for multilevel database security. IEEE Transactions on Software Engineering, 13(2), 129–140. Available: https://doi.org/10.1109/TSE.1987.232889. Retrieved: February 25, 2020
Anonymous [Online], MITRE Corporation. Process Injection. Available: https://attack.mitre.org/techniques/T1055/
Anonymous [Online], Exploit Database. Sybase Advantage Data Architect – ‘.SQL’ Format Heap Overflow. Available: https://www.exploit-db.com/exploits/15378. Retrieved: February 5, 2020
Anonymous [Online]. Beach, NCS DATACOM AND AIRDEFENSE LAUNCH WLAN SECURITY SERVICE. LAN Product News, 15(3) . Available: https://library.semo.edu:2443/login?url=https://library.semo.edu:4836/docview/204364487?accountid=38003. Retrieved: February 5, 2020
Anonymous [Online], Security Overview. Available: https://techdocs.broadcom.com/content/broadcom/techdocs/us/en/ca-mainframe-software/database-management/ca-datacom/15-1/administrating/security-overview.html. Retrieved: February 5, 2020
Anonymous [Online].FileMaker Platform Security – Overview. Available: https://support.filemaker.com/s/article/FileMaker-Platform-Security-Overview-1503693058473?language=en_US. Retrieved: February 16, 2020
M. Woodfield [Online], FREAK attack: what you need to know. Available: https://www.digicert.com/blog/freak-attack-need-know/#targetText=Currently known as ‘FREAK’, can then easily be decrypted. Retrieved: March 5, 2020
C. Hoelscher [Online], IDMS History. Available: http://www.manmrk.net/tutorials/database/IDMS/IDMSHistory.htm. (1999). Retrieved: February 25, 2020
CA IDMS, Centralized Security Overview. Available: https://techdocs.broadcom.com/content/broadcom/techdocs/us/en/ca-mainframe-software/database-management/ca-idms/19-0/administrating/administrating-security-for-idms/ca-idms-centralized-security-overview.html. Retrieved: February 5, 2020
W.-J. Chen, H. Kirstein, R. Pachipala, V.S. Dantale [Online], Security and Compliance Solutions for IBM Informix Dynamic Server [First Edition]. Available: http://www.redbooks.ibm.com/redbooks/pdfs/sg247556.pdf. Retrieved: February 10, 2020
Anonymous. Actian Corporation, Ingres 10.2 Security Guide. (2016). doi: ING-102-SG-04
Anonymous [Online].InterBase 2017 Operations Guide. Available: http://docs.embarcadero.com/products/interbase/IB2017/OpGuide.pdf. Retrieved: February 5, 2020
S. Harris [Online], DES is not Secure. Available: https://www.freeswan.org/freeswan_trees/freeswan-1.5/doc/DES.html. Retrieved: February 8, 2020
M. Kemper, B. Bandy, [Online], SQL roles: users and security in InterBase. (n.d.). Available: https://www.ibphoenix.com/resources/documents/general/doc_59. Retrieved: February 20, 2020
Anonymous [Online], About Caché Security. Available: https://cedocs.intersystems.com/latest/csp/docbook/DocBook.UI.Page.cls?KEY=GCAS_intro. Retrieved: February 8, 2020
Anonymous [Online], Microsoft SQL server. In F. Botto, Dictionary of e-business (2nd ed.). Hoboken, NJ: Wiley. Available:https://library.semo.edu:2443/login?url=https://search.credoreference.com/content/entry/dictebusiness/microsoft_sql_server/0?institutionId=1804. Retrieved: February 11, 2020
Anonymous [Online], Overview of SQL Server Security. Available: https://docs.microsoft.com/en-us/dotnet/framework/data/adonet/sql/overview-of-sql-serversecurity. Retrieved: February 11, 2020
Anonymous [Online], Introduction to Access 2010 security. Available: https://support.office.com/en-us/article/introduction-to-access-2010-security-cae6d764-0318-4622-955f-68d9f186d6ca. Retrieved: February 10, 2020
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Amer, S. (2021). Security of DBMSs. In: Daimi, K., Arabnia, H.R., Deligiannidis, L., Hwang, MS., Tinetti, F.G. (eds) Advances in Security, Networks, and Internet of Things. Transactions on Computational Science and Computational Intelligence. Springer, Cham. https://doi.org/10.1007/978-3-030-71017-0_32
Download citation
DOI: https://doi.org/10.1007/978-3-030-71017-0_32
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-71016-3
Online ISBN: 978-3-030-71017-0
eBook Packages: EngineeringEngineering (R0)