DBSYSTEMS 1 of 13 Chapter 10 DB System Administration (Part II) 1 Based on G. Post, DBMS: Designing & Building Business Applications University of Manitoba.

Slides:



Advertisements
Similar presentations
1 All Powder Board and Ski Microsoft Access Workbook Chapter 10: Database Administration Jerry Post Copyright © 2007.
Advertisements

BASIC SKILLS AND TOOLS USING ACCESS
Exploring Microsoft Access 2003 Chapter 5 One-to-Many Relationships : Subforms and Multiple Table Queries.
1 Chapter 13 Securing an Access Application. 13 Chapter Objectives Learn about the elements of security Explore application-level security Use user-level.
II.I Selected Database Issues: 1 - SecuritySlide 1/20 II. Selected Database Issues Part 1: Security Lecture 2 Lecturer: Chris Clack 3C13/D6.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Chapter 6, part 2 Database System Development (cont.) Based on G. Post, DBMS: Designing & Building Business Applications University of Manitoba Asper School.
Advantage Data Dictionary. agenda Creating and Managing Data Dictionaries –Tables, Indexes, Fields, and Triggers –Defining Referential Integrity –Defining.
Jerry Post McGraw-Hill/Irwin Copyright © 2005 by The McGraw-Hill Companies, Inc. All rights reserved. Database Management Systems Chapter 9 Database Administration.
ISP 121 Week 1 Introduction to Databases. ISP 121, Winter Why a database and not a spreadsheet? You have too many separate files or too much data.
Concepts of Database Management Sixth Edition
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 4 Profiles, Password Policies, Privileges, and Roles.
Chapter 10 DB System Administration Based on G. Post, DBMS: Designing & Building Business Applications University of Manitoba Asper School of Business.
A Guide to MySQL 7. 2 Objectives Understand, define, and drop views Recognize the benefits of using views Use a view to update data Grant and revoke users’
Jerry Post Copyright © 2013 DATABASE Database Management Systems Chapter 10 Database Administration 1.
What are System Requirements? What is Dugdh Sagar Dairy Management System? What are the basic needs to run Dairy Management System? * (Customer, supplier,
Security and Integrity
DAY 21: MICROSOFT ACCESS – CHAPTER 5 MICROSOFT ACCESS – CHAPTER 6 MICROSOFT ACCESS – CHAPTER 7 Akhila Kondai October 30, 2013.
MS Access Advanced Instructor: Vicki Weidler Assistant:
School of Computer & Communication of LNPU 辽宁石油化工大学计算机与通信工程学院 刘旸 1 数据库管理系统 Database Management Systems Chapter 9 Database Administration 第九章 数据库管理和安全.
Copyright © 2003 by Prentice Hall Module 4 Database Management Systems 1.What is a database? Data hierarchy and data organization Field, record, file,
LSP 121 Week 1 Intro to Databases. Welcome to LSP 121 Quantitative Reasoning and Technological Literacy II Continuation of quantitative data concepts.
Copyright © 2001 by Wiley. All rights reserved. Chapter 10: Advanced Database Operations Revising Vintage Videos Setting RecordSource at run time DBGrid.
XP New Perspectives on Microsoft Office Access 2003 Tutorial 12 1 Microsoft Office Access 2003 Tutorial 12 – Managing and Securing a Database.
© 2007 by Prentice Hall12-1 Introduction to Oracle 10g Chapter 12 Maintaining Database Security James Perry and Gerald Post.
Cao Tiến Đức. Outline What is TDE How TDE works Basic TDE operations Tablespace encryption HSM Reference.
Chapter 4 The Relational Model 3: Advanced Topics Concepts of Database Management Seventh Edition.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 6 Virtual Private Databases.
CSIS 4310 – Advanced Databases Virtual Private Databases.
Switch off your Mobiles Phones or Change Profile to Silent Mode.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 4 Profiles, Password Policies, Privileges, and Roles.
SEC835 Practical aspects of security implementation Part 1.
DATABASE 1 Data Administration  Data and information are valuable assets.  Data is used at many business levels  Operations and transactions.  Tactical.
Management Information Systems MS Access MS Access is an application software that facilitates us to create Database Management Systems (DBMS)
Jerry Post Copyright © Database Management Systems Chapter 10 Database Administration.
1 All Powder Board and Ski Oracle 9i Workbook Chapter 7: Integrity and Transactions Jerry Post Copyright © 2003.
DAY 12: DATABASE CONCEPT Tazin Afrin September 26,
1.NET Web Forms Business Forms © 2002 by Jerry Post.
Copyright © 2013 Curt Hill Database Security An Overview with some SQL.
Database Design and Management CPTG /23/2015Chapter 12 of 38 Functions of a Database Store data Store data School: student records, class schedules,
MS Access 2007 Management Information Systems 1. Overview 2  What is MS Access?  Access Terminology  Access Window  Database Window  Create New Database.
INFO1408 Database Design Concepts Week 15: Introduction to Database Management Systems.
MS Access. Access is a DBMS/RDMS DBMS = Database Management System RDMS = Relational Database Management System.
1 Chapter 6 Database Administration. 2 Introduction Database administration The process of managing a database Database administrator A person or an entire.
1 Database Systems Introduction to Microsoft Access Part 2.
Security Windows 2000 Richard Goldman © December 4, 2001.
Constraints cis 407 Types of Constraints & Naming Key Constraints Unique Constraints Check Constraints Default Constraints Misc Rules and Defaults Triggers.
McGraw-Hill/Irwin The Interactive Computing Series © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Microsoft Access 2002 Using Access Tools.
CSC 240 (Blum)1 Introduction to Access CSC 240 (Blum)2 Click on the Access desktop icon or go to Start/Programs/Microsoft Office/Microsoft Office.
Securing a Database 1.Understanding database security 2.Protecting the Database File 3.Protecting Code 4.Using User level Security 5.Working with workgroups.
1 All Powder Board and Ski Microsoft Access Workbook Chapter 9: Database Administration Jerry Post Copyright © 2003.
Database Objective Demonstrate basic database concepts and functions.
Academic Year 2014 Spring Academic Year 2014 Spring.
Agenda for Class 2/20/2014 Introduce Microsoft’s SQL Server database management system. Use the lab to discuss how to CREATE, DROP and populate (INSERT)
SQL Server 2005 Implementation and Maintenance Chapter 6: Security and SQL Server 2005.
Oracle 11g: SQL Chapter 7 User Creation and Management.
Chapter 6 Virtual Private Databases
Exploring Microsoft Access Chapter 5 One-to-Many Relationships: Subforms and Multiple Table Queries.
SQL Introduction to database and SQL. Chapter 1: Databases and Database Users 6 Introduction to Databases Databases touch all aspects of our lives. Examples:
MICROSOFT ACCESS – CHAPTER 5 MICROSOFT ACCESS – CHAPTER 6 MICROSOFT ACCESS – CHAPTER 7 Sravanthi Lakkimsety Mar 14,2016.
Access Test Questions Test Date: 05/05/16. Chapter 1 (Lynda.com) Question 1 An access database uses five main components (database objects). Which is.
SQL Server Security The Low Hanging Fruit. Lindsay Clark Database Administrator at American Credit Acceptance
1 A Look at the Application Authorized users can access Communicator! NXT from any Internet-capable computer via the Web.
Acess Test Questions. Chapter 1 (Lynda.com) Question 1 An access database uses five main components (database objects). Which is not one of them? Tables.
1 Section 1 - Introduction to SQL u SQL is an abbreviation for Structured Query Language. u It is generally pronounced “Sequel” u SQL is a unified language.
Copyright © 2014 Pearson Canada Inc. Ext. 5b-1 Copyright © 2014 Pearson Canada Inc. Application Extension 5b Using Microsoft Access Part 2: Using Information.
Database Security (Chapter 10)
אבטחת נתונים בסביבת SQL Data Security
Managing Privileges.
Grauer and Barber Series Microsoft Access Chapter One
Presentation transcript:

DBSYSTEMS 1 of 13 Chapter 10 DB System Administration (Part II) 1 Based on G. Post, DBMS: Designing & Building Business Applications University of Manitoba Asper School of Business 3500 DBMS Bob Travica Updated 2007

DBSYSTEMS 2 of 13 Outline  User Identification  Access Privileges  Separation of Duties  Encryption

DBSYSTEMS 3 of 13 User Identification  User identification  Accounts  Individual  Groups  Passwords  Do not use “real” words.  Do not use personal (or pet) names.  Include non-alphabetic characters.  Use at least 6 (8) characters.  Change it often.  Too many passwords!  Alternative identification  Finger / hand print readers  Voice  Retina (blood vessel) scans  DNA typing  Hardware passwords  The one-minute password.  Card matched to computer.

DBSYSTEMS 4 of 13 SQL Security Commands  GRANT privileges  REVOKE privileges  Privileges include  SELECT  DELETE  INSERT  UPDATE  Objects include  Table  Table columns (SQL 92+)  Query  Users include  Name/Group  PUBLIC GRANT INSERT ON Bicycle TO OrderClerks REVOKE DELETE ON Customer FROM Assemblers

DBSYSTEMS 5 of 13 Oracle Security Manager

DBSYSTEMS 6 of 13 Using Queries for Control  Permissions apply to entire table or query.  Use query to grant access to part of a table.  Example  Employee table  Give all employees read access to name and phone (phonebook).  Give managers read access to salary.  SQL  Grant  Revoke Employee(ID, Name, Phone, Salary) Query: Phonebook SELECT Name, Phone FROM Employee Security Grant Read access to Phonebook for group of Employees. Grant Read access to Employee for group of Managers. Revoke all access to Employee for everyone else (except Admin).

DBSYSTEMS 7 of 13 Separation of Duties SupplierIDName… 673Acme Supply 772Basic Tools 983Common X Supplier OrderIDSupplierID PurchaseOrder Referential integrity Clerk enters order data but not supplier data. He must use SupplierID from the Supplier table. Purchasing manager can add new suppliers, but cannot add new orders.

DBSYSTEMS 8 of 13 Securing an MS Access Database  Set up a secure workgroup  Accounts  Passwords  Run the Security Wizard in the database to be secured.  Assign user and group access privileges in the new database.  Encrypt the new database. Save it as an MDE file.

DBSYSTEMS 9 of 13 Procedure for Setting Up Password in Access 1.Start Access 2.Click File/Open 3.Mark the mdb file to be opened 4.On the Open button (lower part of Open window) click arrow and choose Open Exclusive 5. Click Tools/Security/Set Password 6. In Set Database Password window type the password Next time you try to open the database you will be asked to enter the password.

DBSYSTEMS 10 of 13 Encryption  Data transmission, distributed databases  Data Encryption Standard - DES; Advanced Encryption System – AES, bits)  64 bit key can be broken within a few minutes to 2 weeks; 128 bit+ keys still safe Message Encrypted Message DES - Encrypt DES - Decrypt Single Key Method – shared private key Message

DBSYSTEMS 11 of 13  Using Ted’s private key ensures it came from him.  Using Mary’s public key ensures only she can read it.  Useful for changing partners context (supply chain, virtual organization) Mary Decripts Ted Encrypts Mary’s Public Key Mary’s Private Key Ted’s Private Key Message SENDERRECEIVER Ted’s Public Key Dual Key Method - private and public key

DBSYSTEMS 12 of 13 Sally’s Pet Store: Security Management Sally/CEO Sales Staff Store manager Sales people Business Alliances Accountant Attorney Suppliers Customers Products Sales Purchases Receive products Animals Sales Purchases Animal Healthcare Employees Hiring/Release Hours Pay checks Accounts Payments Receipts Management Reports Users Operations

DBSYSTEMS 13 of 13 Sally’s Pet Store: Purchases *Basic Supplier data: ID, Name, Address, Phone, ZipCode, CityID Legend: R: Read W: Write A: Add