Measures Against Threats Of Security In Database System
Join 1000's of Authors at StreetArticles Today!

Numerous measures can be adopted against database security threats. These measures comprises on physical controls and administrative procedures. Some of measures are discussed below

Authorization

When database is designed different right are given to people working in the system or system’s object. Authorization is process of delivering rights to people working in the database environment. The authorization control in the system is maintained through the software. It is developed in a way that it can easily determine the level of access for users to different objects in the database. In this system the authorization controls are known as access controls.

Authentication

In database system authentication is a defined process that is very helpful in determining the identity of the user. It is the duty of the system administrators to create the accounts of different users. The unique identity of each user is recognized by the operation system. Passwords are issued to the users to access the system. Some advance techniques are used for this purpose that is finger prints, voice reorganization and eye retina.

Views

In database view is a virtual table that is extracted from the base table. It is the dynamic result of one or more relational operations on the relation to produce another relation. In reality it is not part of the database. Views dish up powerful security mechanism by hiding the parts of database from certain users. Users are not informed about any missing row or attribute.

Backup and Recovery

Backup is a facility in the database environment in which a copy of the database is stored in the offline storage media. Advance DBMS also provides the facility to recover the data in case of system failure. It is recommended to take the continuous back up and store it at safe location. Log file is very helpful for recovery of data. A detail of current state of transactions and database changes to provide support for recovery procedure.

Integrity

Integrity means the correctness. Integrity constraint is very helpful to maintain a safe and sound database system. These constraints are used to save data from becoming invalid.

Encryption

In this process data is encoded by using a specific algorithm to make it unreadable by any program without decryption. In case of sensitive database encryption is the elementary requirement of the database system. In some DMBS the facility of encryption of data is provided. Because of encryption

data remains secure when transmitted over the communication line. There are more than one techniques to encrypt the data.

SAP has introduced a security software that is very useful for business organization. To work on this software you have to get SAP security training at Tekvdo. Tekvdo is also offering SAP bw training at very reasonable price.


Street Talk

No comments present
You May Also Like
What is Cryp1 Ransomware And How to Remove it
This is an article about a malicious program, which is called Cryp1. It is a virus that enters the user's computer, encrypts all the files that it can, and requires a ransom for their decryption. Such viruses are called ransomware, and are considered the most dangerous types of viruses. Their…
By: John137 in  Computers and Technology  >  Software   Jun 08, 2016  
5
  Likes: 11

How to Download Icloud Backup File to PC
Most iPhone users prefer iCloud to backup their data on iPhone. iCloud works really well for most of iPhone users. However, do you know how to download iCloud backup files to your computer? In this article, I will show you how to download iCloud backup file to PC. You need…
By: alan smith in  Computers and Technology  >  Software   Jun 06, 2016  
0
  Likes: 1

Macbook Pro Blu - Ray Player Software - Play Blu - Ray Disc Or ISO Files on Macbook Pro
The Mac Pro (not to be confused with MacBook Pro) is an Intel Xeon-based workstation computer manufactured by Apple Inc. The Mac Pro, in most configurations, is the fastest computer that Apple offers, and is one of three desktop computers in the current Macintosh lineup, the other two being the…
By: JerryEdison001 in  Computers and Technology  >  Software   Jun 04, 2016  
0
  Likes: 2

Digital Marketing Faridabad|seo Service Faridabad
Digital marketing is the latest way to grow our bussiness over the world. with digital marketing we can reach with our bussiness every corner of the world. so today we should know about digital marketing so that our bussiness can instant grow. we promote our website on search engines like…
By: kapil sharma1 in  Computers and Technology  >  Software   Jun 02, 2016  
0
  Likes: 1

How to Get Better With Kanban?
Kanban is a specific agile methodology that is connected with Japanese business philosophy. Its idea was firstly implemented on the activity of supermarkets. But now the Kanban is successfully implemented in software testing field. Kanban visualizes the scope of work and simplifies its perception. A lot of researches have proved…
By: QaTestLab in  Computers and Technology  >  Software   Jun 01, 2016  
0
  Likes: 1

Welcome to Our D - link Router Customer Service
How is D-Link Technical Support Services Helpful? D-Link router is one among-st the foremost essential a part of lives. Once you obtain a replacement as D-Link router it's sensible in use as quick as each new things are wonderful after we bring them home. Most of the days it's sensible…
By: Macky in  Computers and Technology  >  Software   May 30, 2016  
0
  Likes: 1

Iphone Developer AND Their Services
p { margin-bottom: 0.1in; line-height: 120%; }a:link { } The Apple Inc company's iphone is itself a huge name in the new technological era of smart phone. Apple run its own iOS mobile operating system. The first generation iphone was released on June 29, 2007 & the most recent iphone…
By: DHRUV NATH in  Computers and Technology  >  Software   May 28, 2016  
0
  Likes: 1

How Do I Restore the Password to the Zip File?
ZIP Archiver has long been used to archive files of various formats, ZIP format has become the standard for file compression around the world. Files in this format you can find on almost any PC or laptop. It's not a secret that zip files can be encrypted to restrict access…
By: igomak23 in  Computers and Technology  >  Software   May 28, 2016  
0
  Likes: 1

Purpose Of Saas Based Mailing Solution for Big Businesses
How about developing deeper business relations with all your contacts? When doing business with various people in this world, you get connected with many. Your list of contacts includes people whom you did one-time business with but such people never turned back to you for one or the other reasons.…
By: Tarika Technologies in  Computers and Technology  >  Software   May 28, 2016  
0
  Likes: 0

How to Transfer Music From Iphone to Computer
As we all know, we can easily transfer music from computer to iPhone via iTunes. However, you can't transfer music from iPhone to computer easily. Apple doesn't want to you do this because the copyright problem. However, sometimes, you need to move songs from iPhone to PC because many reasons,…
By: alan smith in  Computers and Technology  >  Software   May 28, 2016  
0
  Likes: 0

How Powermta Helped Forfront With Its Growing Message Volume
UK-based email marketing solutions provider Forfront is a private company that serves over 1000 users sending 120 million emails per month. The users of their platform are primarily B2B. However, 30% of their target audience is consumers. With peak volumes of up to 1.1 million messages per hour, Forfront needed…
By: Sara10 in  Computers and Technology  >  Software   May 28, 2016  
0
  Likes: 1

Case Study: How Powermta Helped Forfront With Its Growing Message Volume
UK-based email marketing solutions provider Forfront is a private company that serves over 1000 users sending 120 million emails per month. The users of their platform are primarily B2B. However, 30% of their target audience is consumers. With peak volumes of up to 1.1 million messages per hour, Forfront needed…
By: Sara Samson in  Computers and Technology  >  Software   May 28, 2016  
0
  Likes: 1

What is Social2search Adware, And is it Dangerous?
What is Social2Search, and how it differs from other adware Adware development is a very promising sector for hackers and other Internet scams. In recent years, the number of PC users is growing rapidly and so many people are working directly on the Internet, looking through hundreds of pages every…
By: John137 in  Computers and Technology  >  Software   May 23, 2016  
0
  Likes: 2

Effective Ways to Logo & Brochure Design Company In Maryland
Brochures are an imperative part of conventional marketing strategies. They still play a major role in the marketing of products and services, despite the growing popularity of online marketing. A well-designed brochure can promote your marketing strategies and attention of your potential customers. It also highlights the way you are…
By: David James2 in  Computers and Technology  >  Software   May 23, 2016  
0
  Likes: 1

Find the Pair, Memory Matching Cards, Brain Trainer Game for Iphone
SA Apps market leader in iOS App development and promotions, successfully released its new edition for Find the Pair game with added support for Multiple countries and languages (*20 plus languages are supported now) Find the Pair by Shoaib Shakir (SA Apps fame) is now Universal for iPhone as well…
By: Awhbhdr in  Computers and Technology  >  Software   May 21, 2016  
0
  Likes: 1

Article Views: 792    Report this Article