PDF4PRO ⚡AMP

Modern search engine that looking for books and documents around the web

Example: bankruptcy

Chapter 12. Database Security - University of Cape Town

Chapter 12. Database SecurityTable of contents Objectives Introduction The scope of Database Security Overview Threats to the Database Principles of Database Security Security models Access control Authentication and authorisation Authentication Authorisation Access philosophies and management Database Security issues Access to key fields Access to surrogate information Problems with data extraction Access control in SQL Discretionary Security in SQL Schema level Authentication Table level SQL system tables Mandatory Security in SQL Data protection Computer misuse Security plan Authentication and authorisation schematic Authentication and authorisation Access control activities Overview The problem Activity 1 Creating the Database schema Activity 2 Populating the Database Activity 3 Analysing the problem Activity 4 Executing the Security script (if you have a DBMS thatpermits this) Activity 5 Testing the access control (if you have a DBMS thatpermits this) Activity 6 Conclusion Activity 7 Postscript1 ObjectivesAt the end of this Chapter you should be able to: Understand and explain the place of Database Security in the context ofsecurity analysis and management.

• Appreciate the limitations of security subsystems. Introduction In parallel with this chapter, you should read Chapter 19 of Thomas Connolly and Carolyn Begg, “Database Systems A Practical Approach to Design, Imple-mentation, and Management”, (5th edn.). Security is a large subject and one that, because it touches every activity of

Tags:

  Database, Security, Chapter, Chapter 12, Database security

Information

Domain:

Source:

Link to this page:

Please notify us if you found a problem with this document:

Spam in document Broken preview Other abuse

Transcription of Chapter 12. Database Security - University of Cape Town

Related search queries