Security, Integrity and Authorization in DBMS (2024)

Database SecurityDatabase security has many different layers, but the key aspects are:

Authentication

User authentication is to make sure that the person accessing the database is who he claims to be. Authentication can be done at the operating system level or even the database level itself. Many authentication systems such as retina scanners or bio-metrics are used to make sure unauthorized people cannot access the database.

Authorization

Authorization is a privilege provided by the Database Administer. Users of the database can only view the contents they are authorized to view. The rest of the database is out of bounds to them.

The different permissions for authorizations available are:

  • Primary Permission - This is granted to users publicly and directly.
  • Secondary Permission - This is granted to groups and automatically awarded to a user if he is a member of the group.
  • Public Permission - This is publicly granted to all the users.
  • Context sensitive permission - This is related to sensitive content and only granted to a select users.

The categories of authorization that can be given to users are:

  • System Administrator - This is the highest administrative authorization for a user. Users with this authorization can also execute some database administrator commands such as restore or upgrade a database.
  • System Control - This is the highest control authorization for a user. This allows maintenance operations on the database but not direct access to data.
  • System Maintenance - This is the lower level of system control authority. It also allows users to maintain the database but within a database manager instance.
  • System Monitor - Using this authority, the user can monitor the database and take snapshots of it.

Database Integrity

Data integrity in the database is the correctness, consistency and completeness of data. Data integrity is enforced using the following three integrity constraints:

  • Entity Integrity - This is related to the concept of primary keys. All tables should have their own primary keys which should uniquely identify a row and not be NULL.
  • Referential Integrity - This is related to the concept of foreign keys. A foreign key is a key of a relation that is referred in another relation.
  • Domain Integrity - This means that there should be a defined domain for all the columns in a database.
Kickstart Your Career

Get certified by completing the course

Get Started

Security, Integrity and Authorization in DBMS (31)

Advertisem*nts

';

Security, Integrity and Authorization in DBMS (2024)
Top Articles
Bellise
An Unexpected Engagement
My Arkansas Copa
Noaa Charleston Wv
Login Page
9192464227
Google Sites Classroom 6X
Z-Track Injection | Definition and Patient Education
Sissy Hypno Gif
Green Bay Press Gazette Obituary
ds. J.C. van Trigt - Lukas 23:42-43 - Preekaantekeningen
Our History | Lilly Grove Missionary Baptist Church - Houston, TX
Craigslist Estate Sales Tucson
Raid Guides - Hardstuck
Voyeuragency
Lenscrafters Huebner Oaks
R/Afkarena
Void Touched Curio
Sivir Urf Runes
Available Training - Acadis® Portal
Ou Class Nav
Robin D Bullock Family Photos
Bernie Platt, former Cherry Hill mayor and funeral home magnate, has died at 90
Bible Gateway passage: Revelation 3 - New Living Translation
Sef2 Lewis Structure
Rs3 Ushabti
Mini Handy 2024: Die besten Mini Smartphones | Purdroid.de
Rapv Springfield Ma
Reicks View Farms Grain Bids
Used Patio Furniture - Craigslist
Finding Safety Data Sheets
Darrell Waltrip Off Road Center
Ticket To Paradise Showtimes Near Cinemark Mall Del Norte
Horses For Sale In Tn Craigslist
Used Safari Condo Alto R1723 For Sale
Emily Katherine Correro
Fandango Pocatello
Shiftwizard Login Johnston
Robot or human?
Facebook Marketplace Marrero La
Hisense Ht5021Kp Manual
Postgraduate | Student Recruitment
Charli D'amelio Bj
Poe Self Chill
'The Nun II' Ending Explained: Does the Immortal Valak Die This Time?
Borat: An Iconic Character Who Became More than Just a Film
UWPD investigating sharing of 'sensitive' photos, video of Wisconsin volleyball team
A jovem que batizou lei após ser sequestrada por 'amigo virtual'
1Tamilmv.kids
Urban Airship Acquires Accengage, Extending Its Worldwide Leadership With Unmatched Presence Across Europe
De Donde Es El Area +63
Latest Posts
Article information

Author: Clemencia Bogisich Ret

Last Updated:

Views: 5799

Rating: 5 / 5 (80 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Clemencia Bogisich Ret

Birthday: 2001-07-17

Address: Suite 794 53887 Geri Spring, West Cristentown, KY 54855

Phone: +5934435460663

Job: Central Hospitality Director

Hobby: Yoga, Electronics, Rafting, Lockpicking, Inline skating, Puzzles, scrapbook

Introduction: My name is Clemencia Bogisich Ret, I am a super, outstanding, graceful, friendly, vast, comfortable, agreeable person who loves writing and wants to share my knowledge and understanding with you.