ANALYSIS METHODS OF INFORMATION PROTECTION IN A RELATIONAL DATABASE MONGODB

Authors

  • О. О. Мелешко
  • М. А. Шмир

DOI:

https://doi.org/10.18372/2310-5461.29.10094

Keywords:

MongoDB, NoSQL, TLS / SSL, authentication, Localhostexceptions, SCRAM-SHA-1, MONGODB-CR, Х.509, Kerberos, LDAP proxyauthentication, role, encryption, FIPS, Rest, audit.

Abstract

The main resolution of this article is to analyze the possible methods of information protection in non-relational database MongoDB. In this article the basic methods of unauthorized access to information; investigated material domestic and foreign authors; considered standards that are used to provide cryptographic system stability; the practical recommendations on database administration; The proposals for improving the security features of the system by using the new software. Also defined methods possible unauthorized access to MongoDB. Based on the analysis the main mechanisms to protect against unauthorized access, and how to improve them. Because MongoDB - one of the best non-relational document oriented database that uses a variety of mechanisms crypto protection. It is proved that the main cause is ignorance hacking systems administrators of all defense mechanisms.

References

СУБД NoSQL — cильные и слабые стороны [Електроний ресурс] // JetInfo/ online: корпоративний журнал компанії «ІнфосистемиДжет». — Режим доступу: URL: http://www.jetinfo.ru/stati/silnye-i-slabye-storony-nosql

Seguin Karl. The Little MongoDB Book [Елек-троний ресурс] / K. Seguin // JSman заметки о JavaScript: електронне видання. — Режим доступу: URL: http://jsman.ru/mongo-book/

MongoDB Secutiry Guiderelease 3.0.7 / [MongoDB Inc.]. — 24.11.2015. - 136 p.

Users [Електроний ресурс] // MongoDB forgian tideas : офіційний сайт компанії. — Режим доступу: URL: //docs.mongodb.org/manual/core/security-users/

Issue

Section

Information Security