Database integrity and database security, Database Management System

Assignment Help:

Question :

(a) Differentiate between database integrity and database security

(b) Database security involves measures to avoid loss of privacy and loss of confidentiality. Describe what is meant by the above terms.

(c) In the context of database security explain how the following database features help to enforce security in the database system:

(i) Access Control
(ii) Authorisation
(iii) Views

(d) Differentiate between a Mandatory Access Control and a Discretionary Access Control. Which one is more rigid to the modification of the privilege assigned to users?

(e) Write SQL code to prepare a view of name Toronto_view that contains all the record of customers(Customer_ID, Customer_Name, Customer_Address, City, State, Postal_Code) that resides in the city of Toronto.

(f) Write SQL code to give the select, update, delete and insert privilege to the view created above to Tom. The update privilege will only allow Tom to update the customer_name column only.


Related Discussions:- Database integrity and database security

Evaluate the bulleted list of information-related items, Critically evaluat...

Critically evaluate the bulleted list of information-related items in this case study. How are each contradictory to the notion of being an information-literate knowledge worker?

What is the disadvantage of a call by reference, What is the disadvantage o...

What is the disadvantage of a call by reference? During a call by reference damage or loss of data is not restricted to the subroutine, but will instantly lead to alters to th

Explain data abstraction, Explain data abstraction? Data abstraction Da...

Explain data abstraction? Data abstraction Data abstraction is a methodology in which enables us to isolate how a compound data object is utilized from the details of how it is

Data fragmentation in distributed database system, brief history,definition...

brief history,definition,current trends and future trends if any of data fragmentation

Give an example of enforcement in typing, Give an example of enforcement in...

Give an example of enforcement in Typing. You can understand the idea of enforcement as it makes sure objects of dissimilar classes may not be interchanged as below:  Exampl

Define the boyce-codd normal form, Define the Boyce-Codd Normal Form with i...

Define the Boyce-Codd Normal Form with instance and also Compare BCNF and 3NF.  Ans: BCNF: For each functional dependency X->Y in a set F of functional dependencies over relati

What are the three types of data sources, What are the three types of data ...

What are the three types of data sources used with ODBC? An ODBC file data source is a file that can be shared between database users. An ODBC system data source is one that is

Basics of relational models, In the first unit of this block, you have been...

In the first unit of this block, you have been given with the details of the Database Management System, its structure, advantages etc. This unit is an attempt to give you informat

What is first normal form, What is first normal form? The domain of att...

What is first normal form? The domain of attribute must contain only atomic (simple, indivisible) values.

Describe log based recovery, Describe log based recovery The most usabl...

Describe log based recovery The most usably structure for recording data base modification is the LOG the log is a sequence of log records recording all the update activities i

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd