Describe how security can be implemented in the database

Assignment Help Computer Engineering
Reference no: EM132192723

Write 400-600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas:

Databases exist to allow for the easy storage and retrieval of data, but not every user should have access to all data in the database. Your boss has asked you to describe how security can be implemented in the database to protect the sensitive data and allow some users to see certain data while others are restricted from seeing the data. To help understand Database Security mechanisms, provide your input to the following:

Describe Data Control Language, and how the GRANT and REVOKE statement can be used to implement access control.

Describe the function and use of database roles in the implementation of access control.

Describe the public role and how it can eliminate all access control that can be implemented.

Describe how views can be used to enhance the security of data in a database.

Reference no: EM132192723

Questions Cloud

What details will i need to accomplish the goal : This week, you will be changing gears and moving from narrative writing to beginning on the informative paper. For this assignment, please review the directions
Explain about business and intellectual property law : What is the downside of ignoring ergonomics in the work place? Explain about Business and Intellectual Property Law.
What is an intelligence analysis strategy : What is an Intelligence Analysis Strategy and how is it used? How can an Intelligence Analysis Strategy be used on a terrorist organization such as Al Qaeda?
Importance of information technology and systems : The importance of information technology and systems in businesses today. Include at least one (1) real-world industry example where information technology
Describe how security can be implemented in the database : Describe how security can be implemented in the database to protect the sensitive data and allow some users to see certain data.
What is steve jobs role in apple strategic management : What are Apple’s core competencies? How should Apple compete? What is Steve Jobs’ role in Apple’s strategic management.
Describe the different kinds of fraud andthe fraud triangle : Describe the different kinds of fraud andthe Fraud Triangle, an auditor's responsibility to identify and assess fraud.
How the technology of virtualization works : How the technology of virtualization works, along with applications and benefits for business and remote virtual access.
Industry environments that affect apple choice of strategy : What are key forces in the general and industry environments that affect Apple’s choice of strategy?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Find all customers whose balances are less than their limits

Find all customers whose balances are less than their credit limits. How many customers have balances which are less than their credit limits.

  How does encryption relate to national defense

How does encryption relate to national defense? What is the state of encryption debate today? How much of an effect did September 11, 2001, have on this debate?

  What new features are enabled by the memories

What new features are enabled by these memories? More broadly,describe what the two technologies (of the three above ) that you've picked are, and how they fitinto the existing memory landscape of FLASH, SRAM, DRAM, etc.

  Compute the exact number of days between any two dates

Write a program to compute the exact number of days between any two dates in history. Call this program file b.c. A sample run, with user input in boldface.

  Calculate number of vertices that appear on fourth level

Calculate the number of vertices that will appear on the fourth level. You may reduce the size of the tree by taking advantage of symmetries.

  Computer forensics investigation

As a new computer forensics investigator and as a matter of the forensics policy and procedure, you will require to understand the procedures for processing incident scene for the digital and the logical evidence.

  Your boss accepted your proposal form for the

your boss accepted your proposal form for the implementation of a cluster individual project. you now need to decide

  What is the envisioned system

In a few sentences, tell what is the envisioned system? the most important functions of the system, and the most significant effects of the system?

  Discuss threats faced by the information technology systems

List and assess three security threats faced by the information technology systems and list and describe

  How to use a sorting algorithm

Prompt the user for name and age of a group of people. The group's size is unknown at first , so the program must keep asking the user if they want to enter more data.

  What command would you use to look for the accesses made

These questions deals with the file access_log in this directory. What command would you use to look for the accesses made in Jan 2015?

  Clearly explain and describe at least three merits of

q1. clearly describe and discuss at least three advantages of clustering.q2. explain in detail why the average seek

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd