Download presentation
Presentation is loading. Please wait.
Published byNatalie Ellis Modified over 9 years ago
1
+ Security Concerns Chapter 10.1
2
+ Security types Physical security Access security Database security
3
+ Physical security
4
+ Data security – Backup Strategies
5
+ Backup strategies Transactions and commits – recovery from failure – next class – inside the DBMS Mirroring of hard drives – avoid loss of data if a drive fails (pretty common practice) Periodic backups of data (change vs full) Off site backup of data (disaster recovery)
6
+ Access security Require network users to authenticate to reach network resources JMU has secure VPN access…must authenticate to reach JMU network resources (some)
7
+ Database security Who makes the decisions? What features in the db support security? What mysql statements address security?
8
+ Application security Log on ? Secure entry information include statements
9
+ Database security Security subsystem Access control Views Audit trail Triggers Encryption of database
10
+ MySQL – Support for security Users CREATE USER abc IDENTIFIED BY PASSWORD(‘somepass’); GRANT ALL PRIVILEGES ON X.* to abc; GRANT GRANT ON X.* to abc; Creates a user, giving them access to everything in database X including the right to provide access to other users. Privileges
11
+ mysql_real_escape_string()
12
+ Next time Transactions in SQL Spend 5 min / team reporting on project status Can show screens if present What is going well? What is challenging? Do you need any help?
13
+ Tuesday Overview of some front ends that make database management easier A look at a couple of other Relational DBMS A brief overview of XML Thursday Project demonstrations
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.