ANALYSIS METHODS OF INFORMATION PROTECTION IN A RELATIONAL DATABASE MONGODB
DOI:
https://doi.org/10.18372/2310-5461.29.10094Keywords:
MongoDB, NoSQL, TLS / SSL, authentication, Localhostexceptions, SCRAM-SHA-1, MONGODB-CR, Х.509, Kerberos, LDAP proxyauthentication, role, encryption, FIPS, Rest, audit.Abstract
The main resolution of this article is to analyze the possible methods of information protection in non-relational database MongoDB. In this article the basic methods of unauthorized access to information; investigated material domestic and foreign authors; considered standards that are used to provide cryptographic system stability; the practical recommendations on database administration; The proposals for improving the security features of the system by using the new software. Also defined methods possible unauthorized access to MongoDB. Based on the analysis the main mechanisms to protect against unauthorized access, and how to improve them. Because MongoDB - one of the best non-relational document oriented database that uses a variety of mechanisms crypto protection. It is proved that the main cause is ignorance hacking systems administrators of all defense mechanisms.References
СУБД NoSQL — cильные и слабые стороны [Електроний ресурс] // JetInfo/ online: корпоративний журнал компанії «ІнфосистемиДжет». — Режим доступу: URL: http://www.jetinfo.ru/stati/silnye-i-slabye-storony-nosql
Seguin Karl. The Little MongoDB Book [Елек-троний ресурс] / K. Seguin // JSman заметки о JavaScript: електронне видання. — Режим доступу: URL: http://jsman.ru/mongo-book/
MongoDB Secutiry Guiderelease 3.0.7 / [MongoDB Inc.]. — 24.11.2015. - 136 p.
Users [Електроний ресурс] // MongoDB forgian tideas : офіційний сайт компанії. — Режим доступу: URL: //docs.mongodb.org/manual/core/security-users/
Downloads
Issue
Section
Information Security