Organization and explain of database security

Assignment Help Data Structure & Algorithms
Reference no: EM13763082

Database Security

In many cases, there are different users that connect to a database. Views are virtual tables based on the physical data. They are usually used either to simplify queries by combining tables or for security purposes to limit the access of data to columns or rows to the user.

Two basic tools for database security at the data level are assigning (granting) privileges to users and creating views. Users can be granted different kinds of access to data in tables that will restrict their read, insert, update, and delete functions. A "view" is a pseudo-table that restricts data by selecting a subset of columns or rows selected from one or more tables. A user may be granted the right of access to a view, but not to the base table (or tables), thus restricting the data that can be seen.

There can be many other aspects to consider when it comes to database security that a database administrator must consider such as SQL injection, leaked data, stolen backups and database inconsistencies. Research two different topics in regards to database security related to your organization and explain how you would, as a database administrator, deal with them.

In preparation for this assignment, it is important to understand the fundamental concepts of database security. Use the suggested resources or other resources you find to learn more about these topics.

Assignment Instructions

For this assignment, complete the following:

  • Create a simple database or use an existing one to plan and design various roles and views on the data.
  • Describe your strategy for at least three different roles based on the needs of your organization.
  • Create the SQL code to create the three different roles.
  • Explain the need to create at least one multi-table view and one filtered view (column or row).
  • Create a VIEW composed of multiple tables of combined data.
  • Create a VIEW composed of a SUBSET of the attributes and rows.
  • Create SQL GRANT statements that grant the appropriate permissions for the roles created.
  • Describe two different database security issues and explain how to resolve them.

Your completed assignment should include the following:

  • The original database script.
  • An explanation of the reasoning behind the three different roles.
  • The SQL code to create the three different roles.
  • An explanation of the two views to be created.
  • The SQL code of the two views.
  • The SQL GRANT statements.
  • Demonstrated ability to use scripts in setting up roles and views and generating successful results. You will achieve this by providing screenshots of your steps.
  • A description of two database security issues and the ways to resolve them.

Reference no: EM13763082

Questions Cloud

What you have learned about children who are gifted : What you have learned about children who are gifted and talented. What are the special needs of young children who are gifted and talented? What are the special needs of older children?
Problems related to astronomy : What is the approximate wavelength of this signal?
Modify the inventory program to include an add button : Modify the Inventory Program to include an add button, a delete button, and a modify button on the GUI. These buttons should allow the user to perform the corresponding actions on the item name, the number of units in stock, and the price of each ..
Write the content review of the given contents : Write the Content Review of the following contents. Respond to each item. Each response should be concise and 2- to 3-paragraphs in length.
Organization and explain of database security : In many cases, there are different users that connect to a database. Views are virtual tables based on the physical data. They are usually used either to simplify queries by combining tables or for security purposes to limit the access of data to ..
Create a form based on the reservations table : Open the data file Reservations17 19. Create a form based on the Reservations table. Use the form to Own folder, and then copy the navigate to the record with Reservations table
Entry to record the asset retirement obligation : Calaf estimates it will cost $1,000,000 to dismantle and remove the platform at the end of its useful life in 10 years. (The fair value at January 1, 2015, of the dismantle and removal costs is $450,000.) Prepare the entry to record the asset reti..
Create a separate class for the selected product : Create a separate class for the selected product that holds the item number, the name of the product, the department in which the product belongs, the number of units in stock, and the price of each unit. You must use the product and class name th..
Question regarding the ethical behavior : Do you think the Sarbanes-Oakley Act has made a difference in the ethical behavior of companies reguarding their financial accounting?

Reviews

Write a Review

Data Structure & Algorithms Questions & Answers

  Scaled and unscaled value of solution that algorithm finds

For each value of ε, give items included and scaled and unscaled value of solution that algorithm finds. For tables, you only require to show those rows which correspond to values less than or equal to scaled value of this solution.

  Describing the data types

Create a 10-12 slide presentation describing the data types

  In the following problems you will need tobulldefine the

in the following problems you will need tobulldefine the problem by constructing a defining diagrambullcreate a

  Implement your algorithm in python

The program should display the total sales, sales for each car type, total bonus, bonus contributed by each car type, additional bonus for each car type and grand total bonus.

  Algorithm on dynamic programming-minimize amount of walking

Our goal is to plan this trip so that we minimize the maximum amount of walking done in a single day. Your algorithm should be based on dynamic programming and run efficiently.

  Generalize 2-3 algorithms for insert and delete

Generalize the 2-3 algorithms for INSERT and DELETE to K-J trees, where non-leaf vertices have between K and J children for fixed integers K >=2, and J>= 2K-1.

  Design a gui and implement tic tac toe game in java

Design a GUI and implement Tic Tac Toe game in java

  Write algorithm which divides n objects of u into k clusters

Suggest the algorithm which divides n objects of U into k clusters, making use of MST of a graph. Give a simple argument of correctness and bound on the running time of the algorithm you are proposing.

  Write a c program to find the intersection andor union of

write a c program to find the intersection andor union of two doubly linked lists using recursion. you are not allowed

  Data structure used to implement an associative structure

In computing, a hash table (such as a Java HashMap) is a data structure used to implement an associative structure that maps keys to values.

  Determine how long the specific algorithms take

Some problems can be theoretically solved (we can explain the algorithm solving problem). How long does the specific algorithms take?

  Data structures used to organize typical file cabinet

Recognize at least two data structures which are used to organize typical file cabinet. Why do you feel it is essential to emulate these types of data structures in computer program?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd