Organization and explain of database security

Assignment Help Data Structure & Algorithms
Reference no: EM13763082

Database Security

In many cases, there are different users that connect to a database. Views are virtual tables based on the physical data. They are usually used either to simplify queries by combining tables or for security purposes to limit the access of data to columns or rows to the user.

Two basic tools for database security at the data level are assigning (granting) privileges to users and creating views. Users can be granted different kinds of access to data in tables that will restrict their read, insert, update, and delete functions. A "view" is a pseudo-table that restricts data by selecting a subset of columns or rows selected from one or more tables. A user may be granted the right of access to a view, but not to the base table (or tables), thus restricting the data that can be seen.

There can be many other aspects to consider when it comes to database security that a database administrator must consider such as SQL injection, leaked data, stolen backups and database inconsistencies. Research two different topics in regards to database security related to your organization and explain how you would, as a database administrator, deal with them.

In preparation for this assignment, it is important to understand the fundamental concepts of database security. Use the suggested resources or other resources you find to learn more about these topics.

Assignment Instructions

For this assignment, complete the following:

  • Create a simple database or use an existing one to plan and design various roles and views on the data.
  • Describe your strategy for at least three different roles based on the needs of your organization.
  • Create the SQL code to create the three different roles.
  • Explain the need to create at least one multi-table view and one filtered view (column or row).
  • Create a VIEW composed of multiple tables of combined data.
  • Create a VIEW composed of a SUBSET of the attributes and rows.
  • Create SQL GRANT statements that grant the appropriate permissions for the roles created.
  • Describe two different database security issues and explain how to resolve them.

Your completed assignment should include the following:

  • The original database script.
  • An explanation of the reasoning behind the three different roles.
  • The SQL code to create the three different roles.
  • An explanation of the two views to be created.
  • The SQL code of the two views.
  • The SQL GRANT statements.
  • Demonstrated ability to use scripts in setting up roles and views and generating successful results. You will achieve this by providing screenshots of your steps.
  • A description of two database security issues and the ways to resolve them.

Reference no: EM13763082

Questions Cloud

What you have learned about children who are gifted : What you have learned about children who are gifted and talented. What are the special needs of young children who are gifted and talented? What are the special needs of older children?
Problems related to astronomy : What is the approximate wavelength of this signal?
Modify the inventory program to include an add button : Modify the Inventory Program to include an add button, a delete button, and a modify button on the GUI. These buttons should allow the user to perform the corresponding actions on the item name, the number of units in stock, and the price of each ..
Write the content review of the given contents : Write the Content Review of the following contents. Respond to each item. Each response should be concise and 2- to 3-paragraphs in length.
Organization and explain of database security : In many cases, there are different users that connect to a database. Views are virtual tables based on the physical data. They are usually used either to simplify queries by combining tables or for security purposes to limit the access of data to ..
Create a form based on the reservations table : Open the data file Reservations17 19. Create a form based on the Reservations table. Use the form to Own folder, and then copy the navigate to the record with Reservations table
Entry to record the asset retirement obligation : Calaf estimates it will cost $1,000,000 to dismantle and remove the platform at the end of its useful life in 10 years. (The fair value at January 1, 2015, of the dismantle and removal costs is $450,000.) Prepare the entry to record the asset reti..
Create a separate class for the selected product : Create a separate class for the selected product that holds the item number, the name of the product, the department in which the product belongs, the number of units in stock, and the price of each unit. You must use the product and class name th..
Question regarding the ethical behavior : Do you think the Sarbanes-Oakley Act has made a difference in the ethical behavior of companies reguarding their financial accounting?

Reviews

Write a Review

Data Structure & Algorithms Questions & Answers

  Implement an open hash table

In this programming assignment you will implement an open hash table and compare the performance of four hash functions using various prime table sizes.

  Use a search tree to find the solution

Explain how will use a search tree to find the solution.

  How to access virtualised applications through unicore

How to access virtualised applications through UNICORE

  Recursive tree algorithms

Write a recursive function to determine if a binary tree is a binary search tree.

  Determine the mean salary as well as the number of salaries

Determine the mean salary as well as the number of salaries.

  Currency conversion development

Currency Conversion Development

  Cloud computing assignment

WSDL service that receives a request for a stock market quote and returns the quote

  Design a gui and implement tic tac toe game in java

Design a GUI and implement Tic Tac Toe game in java

  Recursive implementation of euclids algorithm

Write a recursive implementation of Euclid's algorithm for finding the greatest common divisor (GCD) of two integers

  Data structures for a single algorithm

Data structures for a single algorithm

  Write the selection sort algorithm

Write the selection sort algorithm

  Design of sample and hold amplifiers for 100 msps by using n

The report is divided into four main parts. The introduction about sample, hold amplifier and design, bootstrap switch design followed by simulation results.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd