Security, Integrity and Authorization in DBMS (2024)

Database SecurityDatabase security has many different layers, but the key aspects are:

Authentication

User authentication is to make sure that the person accessing the database is who he claims to be. Authentication can be done at the operating system level or even the database level itself. Many authentication systems such as retina scanners or bio-metrics are used to make sure unauthorized people cannot access the database.

Authorization

Authorization is a privilege provided by the Database Administer. Users of the database can only view the contents they are authorized to view. The rest of the database is out of bounds to them.

The different permissions for authorizations available are:

  • Primary Permission - This is granted to users publicly and directly.
  • Secondary Permission - This is granted to groups and automatically awarded to a user if he is a member of the group.
  • Public Permission - This is publicly granted to all the users.
  • Context sensitive permission - This is related to sensitive content and only granted to a select users.

The categories of authorization that can be given to users are:

  • System Administrator - This is the highest administrative authorization for a user. Users with this authorization can also execute some database administrator commands such as restore or upgrade a database.
  • System Control - This is the highest control authorization for a user. This allows maintenance operations on the database but not direct access to data.
  • System Maintenance - This is the lower level of system control authority. It also allows users to maintain the database but within a database manager instance.
  • System Monitor - Using this authority, the user can monitor the database and take snapshots of it.

Database Integrity

Data integrity in the database is the correctness, consistency and completeness of data. Data integrity is enforced using the following three integrity constraints:

  • Entity Integrity - This is related to the concept of primary keys. All tables should have their own primary keys which should uniquely identify a row and not be NULL.
  • Referential Integrity - This is related to the concept of foreign keys. A foreign key is a key of a relation that is referred in another relation.
  • Domain Integrity - This means that there should be a defined domain for all the columns in a database.
Kickstart Your Career

Get certified by completing the course

Get Started

Security, Integrity and Authorization in DBMS (31)

Advertisem*nts

';

Security, Integrity and Authorization in DBMS (2024)
Top Articles
Create a culture of giving in your community - Nebraska Community Foundation
What Is a Wholly-Owned Subsidiary? How It Works and Examples
NOAA: National Oceanic & Atmospheric Administration hiring NOAA Commissioned Officer: Inter-Service Transfer in Spokane Valley, WA | LinkedIn
Dairy Queen Lobby Hours
Cold Air Intake - High-flow, Roto-mold Tube - TOYOTA TACOMA V6-4.0
Www.craigslist Virginia
Dlnet Retiree Login
Craigslist Vans
Mama's Kitchen Waynesboro Tennessee
Holly Ranch Aussie Farm
Athletic Squad With Poles Crossword
The Weather Channel Facebook
Med First James City
Shreveport Active 911
2016 Hyundai Sonata Refrigerant Capacity
R Cwbt
Illinois VIN Check and Lookup
Invert Clipping Mask Illustrator
Jbf Wichita Falls
Traveling Merchants Tack Diablo 4
Yisd Home Access Center
Governor Brown Signs Legislation Supporting California Legislative Women's Caucus Priorities
Minnick Funeral Home West Point Nebraska
Jermiyah Pryear
Craigslist Wilkes Barre Pa Pets
Lexus Credit Card Login
Kirk Franklin Mother Debra Jones Age
New Stores Coming To Canton Ohio 2022
Black Lion Backpack And Glider Voucher
Tripcheck Oregon Map
Martins Point Patient Portal
Amazing Lash Bay Colony
Memberweb Bw
Mega Millions Lottery - Winning Numbers & Results
Shaman's Path Puzzle
Hair Love Salon Bradley Beach
Samsung 9C8
42 Manufacturing jobs in Grayling
Acadis Portal Missouri
Craigslist Boats Eugene Oregon
Miracle Shoes Ff6
Infinite Campus Parent Portal Hall County
Aurora Il Back Pages
Ig Weekend Dow
What Is The Optavia Diet—And How Does It Work?
Best Haircut Shop Near Me
Gabrielle Abbate Obituary
antelope valley for sale "lancaster ca" - craigslist
Appsanywhere Mst
Grace Charis Shagmag
Latest Posts
Article information

Author: Clemencia Bogisich Ret

Last Updated:

Views: 5799

Rating: 5 / 5 (80 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Clemencia Bogisich Ret

Birthday: 2001-07-17

Address: Suite 794 53887 Geri Spring, West Cristentown, KY 54855

Phone: +5934435460663

Job: Central Hospitality Director

Hobby: Yoga, Electronics, Rafting, Lockpicking, Inline skating, Puzzles, scrapbook

Introduction: My name is Clemencia Bogisich Ret, I am a super, outstanding, graceful, friendly, vast, comfortable, agreeable person who loves writing and wants to share my knowledge and understanding with you.