{"id":3955,"date":"2017-01-23T05:26:49","date_gmt":"2017-01-23T10:26:49","guid":{"rendered":"http:\/\/local.brightwhiz\/?p=3955"},"modified":"2017-01-23T05:26:49","modified_gmt":"2017-01-23T10:26:49","slug":"running-secure-database-system","status":"publish","type":"post","link":"http:\/\/local.brightwhiz\/running-secure-database-system\/","title":{"rendered":"Great Tips to Running a Secure Database System"},"content":{"rendered":"
Having a secure database today is ever more important with all the news every other week that either a corporate or government entity has been hacked into or researchers have found vulnerabilities in popular web applications and systems.<\/p>\n
Databases are extremely important today as they are the in the core of everything tech related. You will find them storing data and information in web<\/a> applications, software systems, mobile <\/a>apps, embedded <\/a>devices and all.<\/p>\n You may not be able to stand against an army of attackers as there are various factors that come into play in the type of attack on can suffer on their database systems. Some may be out of your hands as in the case where there is a vulnerability in the application itself.<\/p>\n Until a patch is released you may be a sitting duck but that notwithstanding there is a whole array of things you can do to harden the security and keep your data much safer on a day-to-day basis.<\/p>\n A strong password should contain a mix of uppercase, lowercase, numeric characters and symbols and should be of significant length.With databases like MySQL<\/a> you would want to restrict access to the database root user preferably granting access from the localhost or specific IP addresses rather than from just anywhere. The same goes for other database users.<\/p>\n Also you want to set up exclusive users for the database that are separate from the operating system users or it should be a dedicated operating system user. The other thing you need to do with these users is to set up user roles with the least privilege as possible. Users should be granted permissions that allow them to function as required and no more.<\/li>\n The storage folders of this data should also be protected under least privilege on the operating system’s file system permission controls.<\/li>\n With these few pointers you are well on your way to having a more secure database<\/a> that will give you peace of mind. There are obviously other factors that can break this security<\/a> and therefore educating users on corporate networks on best practice should be encouraged as this can help prevent social engineering hacks or malware accessing internal networks from untrusted sources within the network.<\/p>\n","protected":false},"excerpt":{"rendered":" Having a secure database today is ever more important with all the news every other week that either a corporate or government entity has been hacked into or researchers have…<\/p>\n","protected":false},"author":1,"featured_media":3956,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2,23,17,20],"tags":[180,223,433,526,542,543,564,591],"yoast_head":"\nHere’s What to do to Have a Secure Database<\/h2>\n
\n