Difference between operating system and database security, Database Management System

Difference between Operating System and Database Security

Security within the operating system can be executed at various levels ranging from passwords for access to system, to the isolation of concurrent implementing processes with the system. Though, there are a few differences among security measures taken at operating system level as compared to those that of database system. These are:

  •  Database system defends more objects, as the data is persistent in nature. Also database security is concerned with dissimilar levels of granularity such as tuple, file an attribute value or an index. Operating system security is primarily concerned with the use of resources and management.
  • Database system objects can be difficult logical structures such as views, a number of which can map to the similar physical data objects. Moreover dissimilar architectural levels by internal, conceptual and external levels, have dissimilar security requirements. Therefore, database security is concerned with the semantics - meaning of data and also with its physical representation. Operating system can give security by not allowing any operation to be performed on the database unless the user is approved for the operation concerned.

Figure shows the architecture of a database security subsystem that can be found in any commercial DBMS.

                                                                      1357_Difference between Operating System and Database Security.png

                                                                                                         Figure: Database Security subsystem

Posted Date: 3/12/2013 5:25:34 AM | Location : United States

Related Discussions:- Difference between operating system and database security, Assignment Help, Ask Question on Difference between operating system and database security, Get Answer, Expert's Help, Difference between operating system and database security Discussions

Write discussion on Difference between operating system and database security
Your posts are moderated
Related Questions
What are the uses of ODBC? Under what circumstances we use this technology? ODBC expose database capabilities within a standardized way to the application programmer by an ap

Data independence seems that "the application is independent of the access strategy and storage structure of data". In other words, the ability to change the schema definition in o

Explain I command in QBE ? I : It is the command in QBE that is used to insert tuple (s) into the database

In an E-R diagram how attributes are represented ? In an E-R diagram attributes are represented in a ellipse.

Limitations of File Based System The file-based system has some limitations. The limitations are listed as follows: Isolation and separation of data: When the data is

1. Staff (staffID --> availabilityID) 2. Services (servicesID --> itemBasedID --> timedBasedID) 3. TimedBased (timedbasedID--> priceid) 4. Clients (clientId, serviceId-->

Rearrange the Execution Order for Efficiency  Rearranging execution order for efficiency means executing such job that requires less execution time. By rearranging the object

What kind of advantages to copying records from one table to another? -) When an algorithm that modifies a table is used after that it's safer to work with the copy -) When

Mention the type of constraints we can specify in the CREATE command of DDL. The type of constraints that can be specified are as follows:- PRIMARY KEY, NOT NULL, UNIQUE, FOR

Discuss the types of integrity constraints in which must be checked for the update operations - Insert and Delete. Give examples. Insert operation can violet any of the subse