Difference between operating system and database security, Database Management System

Difference between Operating System and Database Security

Security within the operating system can be executed at various levels ranging from passwords for access to system, to the isolation of concurrent implementing processes with the system. Though, there are a few differences among security measures taken at operating system level as compared to those that of database system. These are:

  •  Database system defends more objects, as the data is persistent in nature. Also database security is concerned with dissimilar levels of granularity such as tuple, file an attribute value or an index. Operating system security is primarily concerned with the use of resources and management.
  • Database system objects can be difficult logical structures such as views, a number of which can map to the similar physical data objects. Moreover dissimilar architectural levels by internal, conceptual and external levels, have dissimilar security requirements. Therefore, database security is concerned with the semantics - meaning of data and also with its physical representation. Operating system can give security by not allowing any operation to be performed on the database unless the user is approved for the operation concerned.

Figure shows the architecture of a database security subsystem that can be found in any commercial DBMS.

                                                                      1357_Difference between Operating System and Database Security.png

                                                                                                         Figure: Database Security subsystem

Posted Date: 3/12/2013 5:25:34 AM | Location : United States







Related Discussions:- Difference between operating system and database security, Assignment Help, Ask Question on Difference between operating system and database security, Get Answer, Expert's Help, Difference between operating system and database security Discussions

Write discussion on Difference between operating system and database security
Your posts are moderated
Related Questions
explain the steps for reduction of er model into relational model?

Law Associates is a large legal practice based in Sydney. You have been asked to design a data model for the practice based upon the following specification: The practice employs

Design a gennalization and specialization hierarchy for an automobile sales company

Question: (a) e-Government implementations normally evolve through a multi-stage process. Describe, using appropriate examples, the stages involved in an e-Government implemen

What is a view? A view is a logical view on one or more tables.  A view on one or more tables i.e., the data from a view is not actually physically kept instead being derived f

What are the disadvantages of relational approach? Disadvantages of relational approach: • Substantial hardware and system software overhead • May not fit all business models •

Question: One of the tasks a database management system must perform is to ensure that the data is still intact in the face of software and hardware failure. This task is known

What are the authentication modes in SQL Server? How can it be changed? Windows mode and Mixed Mode - SQL and Windows. To alter authentication mode in SQL Server click Start, P

Dependency Preservation It is obvious that the decomposition must be lossless so that we do not lose any information from the relation that is decomposed. Dependency preservati

i am required to come up with entities relationships, optionality and cardinality from a scenario. there is a night club and bookings for a musician band