Describe how security can be implemented in the database

Assignment Help Computer Engineering
Reference no: EM132192723

Write 400-600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas:

Databases exist to allow for the easy storage and retrieval of data, but not every user should have access to all data in the database. Your boss has asked you to describe how security can be implemented in the database to protect the sensitive data and allow some users to see certain data while others are restricted from seeing the data. To help understand Database Security mechanisms, provide your input to the following:

Describe Data Control Language, and how the GRANT and REVOKE statement can be used to implement access control.

Describe the function and use of database roles in the implementation of access control.

Describe the public role and how it can eliminate all access control that can be implemented.

Describe how views can be used to enhance the security of data in a database.

Reference no: EM132192723

Questions Cloud

What details will i need to accomplish the goal : This week, you will be changing gears and moving from narrative writing to beginning on the informative paper. For this assignment, please review the directions
Explain about business and intellectual property law : What is the downside of ignoring ergonomics in the work place? Explain about Business and Intellectual Property Law.
What is an intelligence analysis strategy : What is an Intelligence Analysis Strategy and how is it used? How can an Intelligence Analysis Strategy be used on a terrorist organization such as Al Qaeda?
Importance of information technology and systems : The importance of information technology and systems in businesses today. Include at least one (1) real-world industry example where information technology
Describe how security can be implemented in the database : Describe how security can be implemented in the database to protect the sensitive data and allow some users to see certain data.
What is steve jobs role in apple strategic management : What are Apple’s core competencies? How should Apple compete? What is Steve Jobs’ role in Apple’s strategic management.
Describe the different kinds of fraud andthe fraud triangle : Describe the different kinds of fraud andthe Fraud Triangle, an auditor's responsibility to identify and assess fraud.
How the technology of virtualization works : How the technology of virtualization works, along with applications and benefits for business and remote virtual access.
Industry environments that affect apple choice of strategy : What are key forces in the general and industry environments that affect Apple’s choice of strategy?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Assess the archival methods that are outlined in the study

astronomers collect and generate petabytes of data. the volume of data is currently growing at a rate of 0.5 pb per

  What advantages do linked lists have over arrays

What advantages do linked lists have over arrays? What disadvantages do they have? Would you use an array list or a linked list to store the information?

  Encode the given message using the lzw algorithm

Given an initial dictionary consisting of the letters a b r y b, encode the following message using the LZW algorithm: abbarbarraybbybbarrayarbbay.

  Explain concepts of server virtualization to management

Explain the concepts of server virtualization to senior management so that they understand the concepts and can form an opinion on the solution.

  Discuss steps required for properly documenting an incident

For this assignment, you will be creating a ten-slide PowerPoint presentation on the nine steps required for properly documenting an incident.

  What would the new tree look

The Binary Tree is one of the best ways to organize data while you need fast access. For this assignment, we will organize a list of names and perform various operations on those names.

  How to prove that a connected graph g without cycles

How to prove that a connected graph G without cycles has n-1 edges, where n > 0 is the number of nodes of G, using induction?

  Write a program that asks the user to enter his-her weight

Your weight is actually the amount of gravitational force exerted on you by the earth.

  What are the likely risks in the two examples

What are the likely risks in the two examples, and how can the chosen development life cycle model face the risks?

  Create a class for working with mixed fractions

Program: Create a class for working with mixed fractions. Only 3 private data members are needed: the int whole number part of the fraction, the int numerator of the fraction, and the positive int denominator of the fraction

  Make a class called invoice that a hardware store might use

create a class called invoice that a hardware store may use to represent an invoice for an item sold at the store. the

  Questiona provide two advantages of using linked list

questiona provide two advantages of using linked list instead of arrays in programs. b write down description of a

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd