| Share this post! | Vote this! |
|
Database security is concerned with authorization rules, user-defined procedures, data encryption and authentication schemes etc. Let's have a detailed overview of these concepts:
Authentication Rules
Authentication rules are restriction on users, applied through DBMS for controlling data access and limiting actions on data. For example, a user can access a database table after giving a valid username and password. Another user can change records in the table but cannot add new records. Senior users are given full authority to take any action with the table. This authorization is applied by DBA according to the sensitivity of data and organizational rules.
User-Defined Procedures
In addition to the passwords and usernames, users can define their own procedures for security. For example,..
More...
Authentication Rules
Authentication rules are restriction on users, applied through DBMS for controlling data access and limiting actions on data. For example, a user can access a database table after giving a valid username and password. Another user can change records in the table but cannot add new records. Senior users are given full authority to take any action with the table. This authorization is applied by DBA according to the sensitivity of data and organizational rules.
User-Defined Procedures
In addition to the passwords and usernames, users can define their own procedures for security. For example,..
More...




0 comments:
Post a Comment