Reference no: EM13763082
Database Security
In many cases, there are different users that connect to a database. Views are virtual tables based on the physical data. They are usually used either to simplify queries by combining tables or for security purposes to limit the access of data to columns or rows to the user.
Two basic tools for database security at the data level are assigning (granting) privileges to users and creating views. Users can be granted different kinds of access to data in tables that will restrict their read, insert, update, and delete functions. A "view" is a pseudo-table that restricts data by selecting a subset of columns or rows selected from one or more tables. A user may be granted the right of access to a view, but not to the base table (or tables), thus restricting the data that can be seen.
There can be many other aspects to consider when it comes to database security that a database administrator must consider such as SQL injection, leaked data, stolen backups and database inconsistencies. Research two different topics in regards to database security related to your organization and explain how you would, as a database administrator, deal with them.
In preparation for this assignment, it is important to understand the fundamental concepts of database security. Use the suggested resources or other resources you find to learn more about these topics.
Assignment Instructions
For this assignment, complete the following:
- Create a simple database or use an existing one to plan and design various roles and views on the data.
- Describe your strategy for at least three different roles based on the needs of your organization.
- Create the SQL code to create the three different roles.
- Explain the need to create at least one multi-table view and one filtered view (column or row).
- Create a VIEW composed of multiple tables of combined data.
- Create a VIEW composed of a SUBSET of the attributes and rows.
- Create SQL GRANT statements that grant the appropriate permissions for the roles created.
- Describe two different database security issues and explain how to resolve them.
Your completed assignment should include the following:
- The original database script.
- An explanation of the reasoning behind the three different roles.
- The SQL code to create the three different roles.
- An explanation of the two views to be created.
- The SQL code of the two views.
- The SQL GRANT statements.
- Demonstrated ability to use scripts in setting up roles and views and generating successful results. You will achieve this by providing screenshots of your steps.
- A description of two database security issues and the ways to resolve them.
What you have learned about children who are gifted
: What you have learned about children who are gifted and talented. What are the special needs of young children who are gifted and talented? What are the special needs of older children?
|
Problems related to astronomy
: What is the approximate wavelength of this signal?
|
Modify the inventory program to include an add button
: Modify the Inventory Program to include an add button, a delete button, and a modify button on the GUI. These buttons should allow the user to perform the corresponding actions on the item name, the number of units in stock, and the price of each ..
|
Write the content review of the given contents
: Write the Content Review of the following contents. Respond to each item. Each response should be concise and 2- to 3-paragraphs in length.
|
Organization and explain of database security
: In many cases, there are different users that connect to a database. Views are virtual tables based on the physical data. They are usually used either to simplify queries by combining tables or for security purposes to limit the access of data to ..
|
Create a form based on the reservations table
: Open the data file Reservations17 19. Create a form based on the Reservations table. Use the form to Own folder, and then copy the navigate to the record with Reservations table
|
Entry to record the asset retirement obligation
: Calaf estimates it will cost $1,000,000 to dismantle and remove the platform at the end of its useful life in 10 years. (The fair value at January 1, 2015, of the dismantle and removal costs is $450,000.) Prepare the entry to record the asset reti..
|
Create a separate class for the selected product
: Create a separate class for the selected product that holds the item number, the name of the product, the department in which the product belongs, the number of units in stock, and the price of each unit. You must use the product and class name th..
|
Question regarding the ethical behavior
: Do you think the Sarbanes-Oakley Act has made a difference in the ethical behavior of companies reguarding their financial accounting?
|