Discuss about the use of protection operations

Assignment Help Computer Network Security
Reference no: EM131863458

Scholarly Activity

Using the SQL for Dummies textbook in an Online Library, refer to Table 3-4 "Types of Protection" on page 74 to create three scenarios in which the use of protection operations are used to secure a database.

Describe the scenario, select which protection operations users should use in the scenario, and then explain your selection.

Your paper should be three pages in length. All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations, and cited per APA guidelines.

Table 3-4 summarizes the SQL statements that you use to grant and revoke privileges.

Table 3-4 Types of Protection Statement- pg. 74 below

Protection operation Statement

Enable user to see a table GRANT SELECT

Prevent user from seeing a table REVOKE SELECT

Enable user to add rows to a table GRANT INSERT

Prevent user from adding rows to a table REVOKE INSERT

Enable user to change data in table rows GRANT UPDATE

Prevent user from changing data in table rowsREVOKE UPDATE

Enable user to delete table rows GRANT DELETE

Prevent user from deleting table rows REVOKE DELETE

Enable user to reference a table GRANT REFERENCES

Prevent user from referencing a table REVOKE REFERENCES

Enable user to use a domain, character set, translation, or collationGRANT USAGE ON DOMAIN, GRANT USAGE ON CHARACTER SET, GRANT USAGE ON COLLATION, GRANT USAGE ON TRANSLATIONON CHARACTER SET, GRANT USAGE ON COLLATION, GRANT USAGE ON TRANSLATION

Prevent user from using a domain, character set, collation, or translationREVOKE USAGE ON DOMAIN, REVOKE USAGE ON CHARACTER SET, REVOKE USAGE ON COLLATION, REVOKE USAGE ON TRANSLATION

Book- Taylor, Allen G. SQL For Dummies, Wiley, 2013. ProQuest Ebook Central

Reference no: EM131863458

Questions Cloud

Explain the pharmacology of tobacco dependence : Explain the pharmacology of tobacco dependence? If you were a public health administrator, how might you make program for obesity reduction or smoking cessation
Study the effect of college education : A researcher wants to study the effect of college education on people's earning by comparing the annual salaries of a randomly-selected group
Identify a comprehensive set of relevant resources : Identify a comprehensive set of relevant resources, both community[miami] and national, for adults with this condition. Provide description of resources.
What are the two major types of placebo-control studies : What are the two major types of placebo-control studies? What are they intended to control? What is the major limitation of these designs
Discuss about the use of protection operations : Describe the scenario, select which protection operations users should use in the scenario, and then explain your selection.
List six recognized medicinal uses for marijuana : List 6 recognized medicinal uses for marijuana. Define amotivational syndrome and explain conclusion from research for marijuana use and amotivational syndrome.
Create a domain model class diagram for the rmo csms : Using Microsoft Visio or an open source alternative such as Dia, create a domain model class diagram for the RMO CSMS marketing subsystem.
What is cultural competence : The first stage of the process is a written interview. What is cultural competence? How is cultural competence advantageous in the workplace
Explain why you chose the approach you did : Based on the Case Study, assess whether Paychex should use a behavior approach or a results approach. Explain why you chose the approach you did.

Reviews

Write a Review

Computer Network Security Questions & Answers

  What are the security issues with wireless lans

What are the security issues with wireless LANs and WANs in a data processing environment? What are the recommended solutions to the issues identified?What are the security issues with Wireless telephony? What solutions were implemented if any to a..

  Describe how to select public and private keys

Describe the RSA Public Key Encryption Scheme in detail. In particular, how do encryption and decryption algorithms work? Describe also how you select public and private keys.

  Examine the current values of all environment variables

Examine the current values of all environment variables on a system you use. If possible, determine the use for some of these values.

  Create checklist of steps you should take to secure computer

Create a checklist of steps you should take to secure your computer from Internet based intrusions, and discuss the steps in some detail.

  Describe what is special about the default user account sap

creates a number of default accounts which deserve special attention. Describe what is special about the default user account SAP*.

  Etherpad shared document editing system

Etherpad shared document editing system and community version of the Alfresco Enterprise Content Management System

  Develop an ids with the use of the material

Develop an IDS with the use of the material provided. The ids must detect as many attacks as possible and you must report them in a human readable format.

  Issues involved in the information systems security

Information Systems Security - ARUMSC2IIS Critically evaluate concepts, principals and practice in the area of information systems security - Demonstrate an in-depth understanding of a comprehensive risk management practice for ensuring secure inform..

  Difficulties in prosecutions of computer-related crimes

What piece of legislation allows computer records documenting criminal activity to be used in court - What is most often overlooked when planning for information security?

  Encrypt the plaintext sendmoremoney with the key stream

Explores the use of a one-time pad version of the Vigenère cipher. In this scheme, the key is a stream of random numbers between 0 and 26. For example, if the key is 3 19 5..., then the first letter of plaintext is encrypted with a shift of 3 lett..

  Why is it attractive to a laptop user to have wlan access

Why is it attractive to a laptop user to have WLAN access? Why is it attractive for a laptop user to have cellular data access? Why is it good for carriers?

  Why should credibility of an expert matter

What are reasons why you may need an expert to assist you with an investigation? Why should credibility of an expert matter?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd