Difference between operating system and database security, Database Management System

Assignment Help:

Difference between Operating System and Database Security

Security within the operating system can be executed at various levels ranging from passwords for access to system, to the isolation of concurrent implementing processes with the system. Though, there are a few differences among security measures taken at operating system level as compared to those that of database system. These are:

  •  Database system defends more objects, as the data is persistent in nature. Also database security is concerned with dissimilar levels of granularity such as tuple, file an attribute value or an index. Operating system security is primarily concerned with the use of resources and management.
  • Database system objects can be difficult logical structures such as views, a number of which can map to the similar physical data objects. Moreover dissimilar architectural levels by internal, conceptual and external levels, have dissimilar security requirements. Therefore, database security is concerned with the semantics - meaning of data and also with its physical representation. Operating system can give security by not allowing any operation to be performed on the database unless the user is approved for the operation concerned.

Figure shows the architecture of a database security subsystem that can be found in any commercial DBMS.

                                                                      1357_Difference between Operating System and Database Security.png

                                                                                                         Figure: Database Security subsystem


Related Discussions:- Difference between operating system and database security

Economics, Economics: It is now usually accepted that it costs less to make...

Economics: It is now usually accepted that it costs less to make a system of smaller computers with the equivalent power of a one large computer. It is more cost-effective to get s

Create table and insert data manufacturer-dbms, Create a table according to...

Create a table according to given data:  AmbulanceDriver(Driver_Number#, Name, Address, Birth_Date) AmbulanceDriverTeam(Team_Number#, Driver_Number#, Join_Date, Lea

Adjustments are required to increase chances of inheritance, What types of ...

What types of adjustments are required to increase chances of inheritance. a)   Some attributes can be added or ignored in  the base class operation  b) Some changes can be

What are costs to be considere when transaction is roll back, What are the ...

What are the costs to be considered when a transaction has to be rolled back when recovering from deadlock?         Ans: A few transaction will must rolled back (made a victim)

Why is database redesign necessary, Why is database redesign necessary? ...

Why is database redesign necessary? Database redesign is essential for two reasons. First, redesign is essential both to fix mistakes made during the initial database design. S

What are object interaction diagrams, What are object interaction diagrams?...

What are object interaction diagrams? Object interaction diagrams are the diagrams that used to describe order in which messages are communicated in execution of an operation,

What are the reasons of bucket overflow, What are the reasons of bucket ove...

What are the reasons of bucket overflow? Explain any two methods for solving this problem. Ans:  It is general for file structures to be divided into equal-length partitions, k

What is called bit-level striping, Normal 0 false false fal...

Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd