Implementation of security elements in database DATABASE DESIGN & DEVELOPMENT Implementation of security elements in database Zatil Ridh'wah Hj Darot
Database security The mechanisms that protect the database against _____________________________. Security considerations apply to not just the data held in a database: breaches of security may affect other parts of the system, which may in turn affect the database. Consequently, database security encompasses hardware, software, people, and data. We consider database security in relation to the following situations: theft and fraud; loss of confidentiality (secrecy); loss of privacy; loss of integrity; loss of availability
Countermeasures—Computer-based Controls We focus on the following computer-based security controls for a _______________________ (some of which may not be available in the PC environment): authorization, access controls, views, backup and recovery, integrity, encryption, and RAID technology.
computer- based controls Authorization The granting of a right or privilege that enables a subject to have legitimate access to a system or a system’s object. Access Control The typical way to provide access controls for a database system is based on the granting and revoking of privileges Views The view mechanism provides a powerful and flexible security mechanism by hiding parts of the database from certain users. Backup & Recovery The process of periodically copying of the database and log file (and possibly programs) to offline storage media. Logging facilities, sometimes referred to as journaling, which keep track of the current state of transactions and database changes, to provide support for recovery procedures. Integrity Integrity constraints also contribute to maintaining a secure database system by preventing data from becoming invalid, and hence giving misleading or incorrect results. Encryption The encoding of the data by a special algorithm that renders the data unreadable by any program without the decryption key. RAID Technology DBMS will continue to operate even if one of the hardware components fails by using this technology.
Security in Microsoft Office Access DbMS Microsoft Office Access 2010 provides the following methods for securing a database: splitting the database; setting a password for the database; trusting (enabling) the _____________ in a database; packaging, signing, and deploying the database.
Relational Databases controls
Data validation Data validation can be implemented during the design process of a database by ___________________ for the user input to avoid errors. Relational databases such as MS Access use controls using input masks, drop down lists, and option buttons to restrict the type of data or the values that users enter into a cell.
input mask An input mask allows you to _____________________________ into the database. You can help people enter data correctly into your Access desktop database. Here’s an example of an input mask: This specifies the format that a phone number must be entered. The number 9 indicates an optional character. The number 0 specifies a mandatory one. So in this example, the area code is optional.
drop down lists A list of choices helps ensure that the value entered in a field is ________________ . To select another option, the user clicks the arrow on the side of the control and clicks the option that they want.
option button Option buttons are a good choice if the underlying field ____________________ of possible numbers: at least two but no more than about five or six.
references Conolly, T. and Begg, C. (2014) Database Systems: A Practical Approach to Design, Implementation and Management. 6th Ed. Global Edition. Pearson.