Thursday, June 13, 2019

Database security Questions Essay Example | Topics and Well Written Essays - 750 words

Database security Questions - Essay ExampleIn addition, the moment we think to offer security to our database framework with the intention that no illegal person or user is able to use it. However, the unplanned harms could be minimized by offering guidance to the employees and enforcing fines on violation of the business policies for instance moving outside from workplace even though the system is open for working. In this scenario, a company user must be permitted access only relevant data, and various(a) business users should be controlled through diverse methods of access for instance interpretation and modification to business critical data. Thus, business strategies at user administration aim are able to help make new rules for prohibiting illegal or legal user access issues (Kumar, 2011 Cawley, 2008). Q. 2 Trigger The below given formula is taken from (Pattani, 2010 Oracle , 2010 Czuprynski, 2006) CREATE TABLE CUSTOMER_SECTION ( Cst_SectNo sectno_dom, Cst_Name section_dom, Cst_HeadSSN ssn_dom, Cst_Budget budget_dom, CONSTRAINT customer_section_PK PRIMARY KEY (cst_SectNo), CONSTRAINT c_section_FK FOREIGN KEY (cst_HeadSSN) REFERENCES tab_LIBRARIAN (SSN), CONSTRAINT customer_section_budget_TX2 reverse ((cst_Budget = 0) AND (cst_Budget IS NOT NULL)), CONSTRAINT customer_section_budget_TX2 CHECK (NOT EXISTS (SELECT * FROM customer_SECTION s WHERE cst_budget Head.Salary AND Lib.Section = S.cst_SectNo AND S.Lib_HeadSSN = Head.SSN and Lib.SSN Head.SSN)) inform_director (Lib.SSN,Lib_HeadSSN) In the above given code we supposed that inform_director() is a process which has already been stored inside the database in addition it could be used by the DBMS (Pattani, 2010). Q 3 Following are advantages of VPD (Pattani, 2010 Oracle , 2010 Czuprynski, 2006) VPD offers dynamic security utensil means that businesses need not to uphold complicated roles and considering grants aspects. By apply VPD one can apply over individual rule on every database object Database u sers are not able to circumvent safety mechanism inserted inside applications, since

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.