Security and integrity, Database Management System

Assignment Help:

Security And Integrity

After Reading the concepts of database recovery in the last section, let us now deal with a vital concept that helps in minimizing consistency errors in database systems. These are the concepts of database integrity and security.

Information security is the protection of information against unauthorised disclosure, destruction or alteration.  Database security is the protection of information that is keeps in a database.  It deals with ensuring only the "right people" get the right to access the "right data".  By right people we mean those people who have the right to update / access the data that they are requesting to update / access with the database.

This should also make sure the confidentiality of the data.  For instance, in an educational institution, information about a student's grades should be made available only to that student, while only the university authorities should be able to update that information. Likewise, personal information of the employees should be accessible only to the authorities concerned and not to everyone.  Another instance can be the medical records of patients in a hospital. These should be available only to health care officials.

Therefore, one of the concepts of database security is primarily a specification of access rules about who has what type of access to what information. This is also called as the problem of Authorisation.  These access rules are defined at the time database is described.  The person who writes access rules is known as the authoriser.  The process of guaranteed that information and other protected objects are accessed only in authorised ways is known as access control. There may be other forms of security relating to operating system, physical, communication aspects of databases. Though, in this unit, we will confine ourselves mainly to authorisation and access control using easy commands.

The term integrity is also applied to data and to the mechanism that helps to make sure its consistency.  Integrity shows to the avoidance of accidental loss of consistency. Protection of database contents from unauthorised access contains legal and ethical issues, organization policies and database management policies.  To protect database various levels of security measures are maintained:

 1)  Physical:  The site or sites having the computer system must be physically secured against illegal entry of unauthorised persons.

2)  Human: An approval is given to a user to decrease the chance of any information leakage and unwanted manipulations.

3)  Operating System: Even though foolproof security methods are taken to secure database systems, weakness in the operating system security might serve as a means of unauthorised access to the database.

4)  Network:  Since databases permit distributed or remote access by terminals or network, software level security within the network software is a main issue.

5)  Database system: The data items in a database require a fine level of access control. For instance, a user may only be permitted to read a data item and is permitted to issue queries but would not be permitted to deliberately change the data. It is the responsibility of the database system to make sure that these access restrictions are not violated.

To make sure database security needs implementation of security at all the levels as above. The Database Administrator (DBA) is responsible for executing the database security policies in a database system. The organisation or data owners make these policies. DBA makes or cancels the user accounts assigning appropriate security rights to user accounts as well as power of granting and revoking certain privileges further to other users.


Related Discussions:- Security and integrity

What is data block, What is data block? Data Block - In oracle the data...

What is data block? Data Block - In oracle the data blocks are referred to as tablespaces. A tablespace is an fields of disk consisting of one or more disk files. A tablespace

State the two-way associations, Two-way Associations Mostly, associati...

Two-way Associations Mostly, associations are travel in both directions, although not usually with same frequency. There are three approaches for the implementation. In

Why does a dbms query language is designed, Why does a DBMS query language ...

Why does a DBMS query language is designed? A DBMS query language is designed to support end users who use English-like commands. support in the development of complex applicat

Give expression in both tuple calculus and domain calculus, Consider the fo...

Consider the following relational schema: Doctor(DName,Reg_no) Patient(Pname, Disease) Assigned_To (Pname,Dname) Give expression in both Tuple calculus and Domain calculus for

Calculate the joint probability, Consider the following frequency counts o...

Consider the following frequency counts of some itemsets in a transaction database r : freq({A}, r) = 0.405 freq({B}, r) = 0.510 freq({C}, r) = 0.303 freq({A

What is a shadow copy scheme, What is a shadow copy scheme? It is simpl...

What is a shadow copy scheme? It is simple, but efficient, scheme known as the shadow copy schemes. It is based on making copies of the database called shadow copies that singl

State about the use case diagram, State about the Use Case Diagram A u...

State about the Use Case Diagram A use case diagram represents a set of use cases, actors and their relationships. These diagrams shall be used to model context or requirement

When are they useful justify with an example, When are they useful? Justify...

When are they useful? Justify with an example. The temporary tables are commonly used to support specialized rollups or exact application processing needs. Unlike a permanent t

What is a cascading update, What is a cascading update? Referential int...

What is a cascading update? Referential integrity constraints needs that foreign key values in one table correspond to primary key values in another. If the value of the primar

Explain query execution plan, Explain query execution plan? - Optimizer...

Explain query execution plan? - Optimizer available in SQL Server optimizes code to be effectively executed. - A query execution plan demonstrates how this optimizer would r

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd