Difference between operating system and database security, Database Management System

Difference between Operating System and Database Security

Security within the operating system can be executed at various levels ranging from passwords for access to system, to the isolation of concurrent implementing processes with the system. Though, there are a few differences among security measures taken at operating system level as compared to those that of database system. These are:

  •  Database system defends more objects, as the data is persistent in nature. Also database security is concerned with dissimilar levels of granularity such as tuple, file an attribute value or an index. Operating system security is primarily concerned with the use of resources and management.
  • Database system objects can be difficult logical structures such as views, a number of which can map to the similar physical data objects. Moreover dissimilar architectural levels by internal, conceptual and external levels, have dissimilar security requirements. Therefore, database security is concerned with the semantics - meaning of data and also with its physical representation. Operating system can give security by not allowing any operation to be performed on the database unless the user is approved for the operation concerned.

Figure shows the architecture of a database security subsystem that can be found in any commercial DBMS.

                                                                      1357_Difference between Operating System and Database Security.png

                                                                                                         Figure: Database Security subsystem

Posted Date: 3/12/2013 5:25:34 AM | Location : United States







Related Discussions:- Difference between operating system and database security, Assignment Help, Ask Question on Difference between operating system and database security, Get Answer, Expert's Help, Difference between operating system and database security Discussions

Write discussion on Difference between operating system and database security
Your posts are moderated
Related Questions
Creation of Indexes Automatically: When a primary key or Unique constraint is show in a table definition then a unique index is formed automatically. Manually: User can

The database files accept the actual data and are typically the biggest in size. Depending on their shape, the tables for all the user operation can go in one database file-but

In this exercise you will create ten records, each containing the following fields: student name, class:  Freshman, Sophomore, Junior or Senior, Major:  Liberal Arts or General Sci

Explain the term - Handling Boundary Condition These are some circumstances that to be handled in any system initialization and termination. Describes how system is bro

Explain the Attribute inheritance Ans: Throughout the rendering of the objects in a view, attribute sets of objects higher in the view hierarchy are inherited via objects below

What is Management System? A management system is a set of rules and process which help us to create organize and manipulate the database. It also helps us to add, change delet


Write A short note on temporary tables? Temporary Tables - Temporary tables exists solely for a particular session, or whose data persists for the duration of the transaction

What are the different integrity constraints in RDBMS? The various integrity constraints in RDBMS are as: Primary Key: primary key is a grouping of one or more attributes

What is Oracle databse structure? Oracle database structure: The relational model has three main aspects: Structures: Structures are well-defined objects which store th