Database integrity and database security, Database Management System

Assignment Help:

Question :

(a) Differentiate between database integrity and database security

(b) Database security involves measures to avoid loss of privacy and loss of confidentiality. Describe what is meant by the above terms.

(c) In the context of database security explain how the following database features help to enforce security in the database system:

(i) Access Control
(ii) Authorisation
(iii) Views

(d) Differentiate between a Mandatory Access Control and a Discretionary Access Control. Which one is more rigid to the modification of the privilege assigned to users?

(e) Write SQL code to prepare a view of name Toronto_view that contains all the record of customers(Customer_ID, Customer_Name, Customer_Address, City, State, Postal_Code) that resides in the city of Toronto.

(f) Write SQL code to give the select, update, delete and insert privilege to the view created above to Tom. The update privilege will only allow Tom to update the customer_name column only.


Related Discussions:- Database integrity and database security

Update operations in dbms - insert operation, Update Operations and Dealing...

Update Operations and Dealing with Constraint Violations There are three basic operations to be executes on relations: Insertion Deletion Update The INSER

The external or view level in dbms, The External or View Level The ex...

The External or View Level The external or view level is the highest level of abstraction of database. It gives a window on the conceptual view, which permits the user to see

Cataloguing, differences between a classified catalog and a dictionary cata...

differences between a classified catalog and a dictionary catalog

Design an algorithm to implement operations, Design an algorithm to impleme...

Design an algorithm to implement operations  Each and every operation specified in the functional model could be formulated as an algorithm. The algorithm indicates how operat

Describe different steps of object-oriented design process, Describe differ...

Describe different steps of the object-oriented design process.  The broad steps of the object-oriented design process are: a. Define context and modes of use of the system

Define relations in tables and define primary keys, Consider the subsequent...

Consider the subsequent relations along with keys underlined Street (name, location, city) House (number, street_name) Lives (name, house_number) Define the above relations

Create a database, The database will enable college administrators the abil...

The database will enable college administrators the ability to track students initial major. This will help college officials decide how best to prepare students for their goals an

Aims of the design project, The aims of the project are: 1. To enable th...

The aims of the project are: 1. To enable the students to undertake the detailed design of a specific plant or process 2. The design projects includes: process selection; und

Candidate keys, Super keys of a relation can have extra attributes. Candida...

Super keys of a relation can have extra attributes. Candidate keys are minimal super key, i.e. such a key have no extraneous attribute. An attribute is known as extraneous if even

Dbms, You are managing the following database system: • DBMS: Oracle 11g ...

You are managing the following database system: • DBMS: Oracle 11g • OS: Sun Solaris • System architecture: Web-based application using ASP.Net • Purpose of Server: HR managem

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd