- Trending Categories
- Data Structure
- Operating System
- C Programming
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Security, Integrity and Authorization in DBMS
Database SecurityDatabase security has many different layers, but the key aspects are:
User authentication is to make sure that the person accessing the database is who he claims to be. Authentication can be done at the operating system level or even the database level itself. Many authentication systems such as retina scanners or bio-metrics are used to make sure unauthorized people cannot access the database.
Authorization is a privilege provided by the Database Administer. Users of the database can only view the contents they are authorized to view. The rest of the database is out of bounds to them.
The different permissions for authorizations available are:
- Primary Permission - This is granted to users publicly and directly.
- Secondary Permission - This is granted to groups and automatically awarded to a user if he is a member of the group.
- Public Permission - This is publicly granted to all the users.
- Context sensitive permission - This is related to sensitive content and only granted to a select users.
The categories of authorization that can be given to users are:
- System Administrator - This is the highest administrative authorization for a user. Users with this authorization can also execute some database administrator commands such as restore or upgrade a database.
- System Control - This is the highest control authorization for a user. This allows maintenance operations on the database but not direct access to data.
- System Maintenance - This is the lower level of system control authority. It also allows users to maintain the database but within a database manager instance.
- System Monitor - Using this authority, the user can monitor the database and take snapshots of it.
Data integrity in the database is the correctness, consistency and completeness of data. Data integrity is enforced using the following three integrity constraints:
- Entity Integrity - This is related to the concept of primary keys. All tables should have their own primary keys which should uniquely identify a row and not be NULL.
- Referential Integrity - This is related to the concept of foreign keys. A foreign key is a key of a relation that is referred in another relation.
- Domain Integrity - This means that there should be a defined domain for all the columns in a database.
- What is Authorization in Information Security?
- What is the difference between data security and data integrity?
- What is the comparison between Authentication and Authorization in Information Security?
- What are integrity constraints over the relation in DBMS?
- SAP Authorization concept and Authorization Objects, Object Class
- Authorization concept in SAP system and Profile
- What is AAA (Authentication, Authorization, and Accounting)?
- Explain the concept of integrity in DB2 along with types of integrity
- Referential Integrity Rule in RDBMS
- Entity Integrity Rule in RDBMS
- What is the difference between Authentication and Authorization?
- Verifying MySQL Package Integrity
- What is Data Integrity?
- OAuth 2.0 Authorization with Postman
- Differentiate between OS and DBMS files and OS and DBMS buffer manager