Describe how security can be implemented in the database

Assignment Help Computer Engineering
Reference no: EM132192723

Write 400-600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas:

Databases exist to allow for the easy storage and retrieval of data, but not every user should have access to all data in the database. Your boss has asked you to describe how security can be implemented in the database to protect the sensitive data and allow some users to see certain data while others are restricted from seeing the data. To help understand Database Security mechanisms, provide your input to the following:

Describe Data Control Language, and how the GRANT and REVOKE statement can be used to implement access control.

Describe the function and use of database roles in the implementation of access control.

Describe the public role and how it can eliminate all access control that can be implemented.

Describe how views can be used to enhance the security of data in a database.

Reference no: EM132192723

Questions Cloud

What details will i need to accomplish the goal : This week, you will be changing gears and moving from narrative writing to beginning on the informative paper. For this assignment, please review the directions
Explain about business and intellectual property law : What is the downside of ignoring ergonomics in the work place? Explain about Business and Intellectual Property Law.
What is an intelligence analysis strategy : What is an Intelligence Analysis Strategy and how is it used? How can an Intelligence Analysis Strategy be used on a terrorist organization such as Al Qaeda?
Importance of information technology and systems : The importance of information technology and systems in businesses today. Include at least one (1) real-world industry example where information technology
Describe how security can be implemented in the database : Describe how security can be implemented in the database to protect the sensitive data and allow some users to see certain data.
What is steve jobs role in apple strategic management : What are Apple’s core competencies? How should Apple compete? What is Steve Jobs’ role in Apple’s strategic management.
Describe the different kinds of fraud andthe fraud triangle : Describe the different kinds of fraud andthe Fraud Triangle, an auditor's responsibility to identify and assess fraud.
How the technology of virtualization works : How the technology of virtualization works, along with applications and benefits for business and remote virtual access.
Industry environments that affect apple choice of strategy : What are key forces in the general and industry environments that affect Apple’s choice of strategy?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd