Organization and explain of database security

Assignment Help Data Structure & Algorithms
Reference no: EM13763082

Database Security

In many cases, there are different users that connect to a database. Views are virtual tables based on the physical data. They are usually used either to simplify queries by combining tables or for security purposes to limit the access of data to columns or rows to the user.

Two basic tools for database security at the data level are assigning (granting) privileges to users and creating views. Users can be granted different kinds of access to data in tables that will restrict their read, insert, update, and delete functions. A "view" is a pseudo-table that restricts data by selecting a subset of columns or rows selected from one or more tables. A user may be granted the right of access to a view, but not to the base table (or tables), thus restricting the data that can be seen.

There can be many other aspects to consider when it comes to database security that a database administrator must consider such as SQL injection, leaked data, stolen backups and database inconsistencies. Research two different topics in regards to database security related to your organization and explain how you would, as a database administrator, deal with them.

In preparation for this assignment, it is important to understand the fundamental concepts of database security. Use the suggested resources or other resources you find to learn more about these topics.

Assignment Instructions

For this assignment, complete the following:

  • Create a simple database or use an existing one to plan and design various roles and views on the data.
  • Describe your strategy for at least three different roles based on the needs of your organization.
  • Create the SQL code to create the three different roles.
  • Explain the need to create at least one multi-table view and one filtered view (column or row).
  • Create a VIEW composed of multiple tables of combined data.
  • Create a VIEW composed of a SUBSET of the attributes and rows.
  • Create SQL GRANT statements that grant the appropriate permissions for the roles created.
  • Describe two different database security issues and explain how to resolve them.

Your completed assignment should include the following:

  • The original database script.
  • An explanation of the reasoning behind the three different roles.
  • The SQL code to create the three different roles.
  • An explanation of the two views to be created.
  • The SQL code of the two views.
  • The SQL GRANT statements.
  • Demonstrated ability to use scripts in setting up roles and views and generating successful results. You will achieve this by providing screenshots of your steps.
  • A description of two database security issues and the ways to resolve them.

Reference no: EM13763082

Questions Cloud

What you have learned about children who are gifted : What you have learned about children who are gifted and talented. What are the special needs of young children who are gifted and talented? What are the special needs of older children?
Problems related to astronomy : What is the approximate wavelength of this signal?
Modify the inventory program to include an add button : Modify the Inventory Program to include an add button, a delete button, and a modify button on the GUI. These buttons should allow the user to perform the corresponding actions on the item name, the number of units in stock, and the price of each ..
Write the content review of the given contents : Write the Content Review of the following contents. Respond to each item. Each response should be concise and 2- to 3-paragraphs in length.
Organization and explain of database security : In many cases, there are different users that connect to a database. Views are virtual tables based on the physical data. They are usually used either to simplify queries by combining tables or for security purposes to limit the access of data to ..
Create a form based on the reservations table : Open the data file Reservations17 19. Create a form based on the Reservations table. Use the form to Own folder, and then copy the navigate to the record with Reservations table
Entry to record the asset retirement obligation : Calaf estimates it will cost $1,000,000 to dismantle and remove the platform at the end of its useful life in 10 years. (The fair value at January 1, 2015, of the dismantle and removal costs is $450,000.) Prepare the entry to record the asset reti..
Create a separate class for the selected product : Create a separate class for the selected product that holds the item number, the name of the product, the department in which the product belongs, the number of units in stock, and the price of each unit. You must use the product and class name th..
Question regarding the ethical behavior : Do you think the Sarbanes-Oakley Act has made a difference in the ethical behavior of companies reguarding their financial accounting?

Reviews

Write a Review

Data Structure & Algorithms Questions & Answers

  Illustrate how b-tree will expand

Illustrate how tree will expand (after inserting each Part#), and what the final tree would like. (b) Repeat item (a), but use a B-tree of order p = 4 instead of a B+-tree.

  Give the steps to build priority queue in heap structure

Both are given from a paper assignment both are Logic questions. I don't need ANY CODE AT ALL. Just the general steps you would use.

  Question about communication recovery plan

Think about a natural or man made disaster, and explain how a communications network could be recovered from such a disaster.

  How long would it take to fill the available storage space

How many cells can be in a computer's main memory if each cell's address can be represented by two hexadecimal digits? What if four hexadecimal digits are used? Explain your answer.

  Creating sample spreadsheet for household budget

You do not need to put in personal data or actual values if you do not wish, but you must include some information for each of the various categories and income and expense line items.

  Complete binary tree

Think about an n-node complete binary tree T, where n=2^d - 1 for some d. Each node v of T is labeled with a real number x_v.

  Creating database for charity event

Your Project is to organize a charity event. You must use at least two events, one of which must be a Windows program such as Word, WordPad, or Paint.

  Finding median by black-box worst-case linear-time algorithm

Given a black-box worst-case linear-time algorithm for ?nding median, create algorithm solving the selection problem for an arbitrary order statistic.

  Calculate the number of points a publication provides

In this exercise you shall work with a system of records for publications associated with research and development.

  Data structures for a single algorithm

Data structures for a single algorithm

  Consider a queue data structure

Consider a queue data structure, where the two operations of interest are enqueue (at the back of the queue) and dequeue (from the front of the queue). A queue is thus a FIFO (first in-first out) structure. Suppose we implement a queue by using tw..

  A binary search tree for link information

A binary search tree with N nodes has N + 1 null references, half the space allocated in a binary search tree for link information is wasted. Suppose that if a node has a null left child, we make its left child link to its inorder predecessor, and if..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd