Discuss about the use of protection operations

Assignment Help Computer Network Security
Reference no: EM131863458

Scholarly Activity

Using the SQL for Dummies textbook in an Online Library, refer to Table 3-4 "Types of Protection" on page 74 to create three scenarios in which the use of protection operations are used to secure a database.

Describe the scenario, select which protection operations users should use in the scenario, and then explain your selection.

Your paper should be three pages in length. All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations, and cited per APA guidelines.

Table 3-4 summarizes the SQL statements that you use to grant and revoke privileges.

Table 3-4 Types of Protection Statement- pg. 74 below

Protection operation Statement

Enable user to see a table GRANT SELECT

Prevent user from seeing a table REVOKE SELECT

Enable user to add rows to a table GRANT INSERT

Prevent user from adding rows to a table REVOKE INSERT

Enable user to change data in table rows GRANT UPDATE

Prevent user from changing data in table rowsREVOKE UPDATE

Enable user to delete table rows GRANT DELETE

Prevent user from deleting table rows REVOKE DELETE

Enable user to reference a table GRANT REFERENCES

Prevent user from referencing a table REVOKE REFERENCES

Enable user to use a domain, character set, translation, or collationGRANT USAGE ON DOMAIN, GRANT USAGE ON CHARACTER SET, GRANT USAGE ON COLLATION, GRANT USAGE ON TRANSLATIONON CHARACTER SET, GRANT USAGE ON COLLATION, GRANT USAGE ON TRANSLATION

Prevent user from using a domain, character set, collation, or translationREVOKE USAGE ON DOMAIN, REVOKE USAGE ON CHARACTER SET, REVOKE USAGE ON COLLATION, REVOKE USAGE ON TRANSLATION

Book- Taylor, Allen G. SQL For Dummies, Wiley, 2013. ProQuest Ebook Central

Reference no: EM131863458

Questions Cloud

Explain the pharmacology of tobacco dependence : Explain the pharmacology of tobacco dependence? If you were a public health administrator, how might you make program for obesity reduction or smoking cessation
Study the effect of college education : A researcher wants to study the effect of college education on people's earning by comparing the annual salaries of a randomly-selected group
Identify a comprehensive set of relevant resources : Identify a comprehensive set of relevant resources, both community[miami] and national, for adults with this condition. Provide description of resources.
What are the two major types of placebo-control studies : What are the two major types of placebo-control studies? What are they intended to control? What is the major limitation of these designs
Discuss about the use of protection operations : Describe the scenario, select which protection operations users should use in the scenario, and then explain your selection.
List six recognized medicinal uses for marijuana : List 6 recognized medicinal uses for marijuana. Define amotivational syndrome and explain conclusion from research for marijuana use and amotivational syndrome.
Create a domain model class diagram for the rmo csms : Using Microsoft Visio or an open source alternative such as Dia, create a domain model class diagram for the RMO CSMS marketing subsystem.
What is cultural competence : The first stage of the process is a written interview. What is cultural competence? How is cultural competence advantageous in the workplace
Explain why you chose the approach you did : Based on the Case Study, assess whether Paychex should use a behavior approach or a results approach. Explain why you chose the approach you did.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Explain your research and your findings of the tools

Create a PowerPoint or a similar presentation to explain your research and your findings of the tools. Graphics - Charts, Graphs, Illustrations, etc.

  Discuss the security of the network

Discuss the security of the network and suggested best practices for securing the business network.

  Assignment on beat the hacker

A honeypot can be a useful for discovering some of the hacking trends occurring within an organization. Of course, there have to be certain measures placed upon its operation, maintenance, and the reconnaissance information obtained as a result. D..

  Examine three common web application vulnerabilities

Examine three common Web application vulnerabilities and attack and recommend corresponding mitigation strategies for each. Provide rationale for your response.

  Discuss the difference between hmac and mac

The Message Authentication Code (MAC) is a widely used technique for performing message authentication, and one MAC algorithm has emerged as the Internet standard for a wide variety of applications: Hash-Based Message Authentication Code (HMAC)

  Mobile technologies and commerce

Your attention in this paper can be focused on any of the following topics covered in our text: · Information Management / IT Architecture. · Database, Data, Warehouse, and Data Mining. · Networks, Collaboration, and Sustainab..

  Provide details of the proposed solution

In the proposed solution section, students will provide details of the proposed solution, based on the technical requirements and assumptions.

  Talks about the employee specific security

Following standard talks about the employee specific security, Following standard has good information on setting up IT security policies

  Help us understand how to stop spreading

The online service should be easy to use, give us good information about any IP's the malware references, and help us understand how to stop spreading.

  Dubbing was coined as a term of copying

Dubbing was coined as a term of copying media in the 1980's for all mediums. What term was a major issue during the process of continously dubbing media? Digitization cured this issue.

  Discuss threats to the security operations data center

Topic: Info Security & policy. Discuss two major threats to the security operations of a data center and corresponding controls

  What would you do to practice the new skills and why

If you were Doug in the case above, what would you do to practice the new skills, and why? Any current topic or article related to penetration techniques.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd