Monday, September 9, 2019

Database security Questions Essay Example | Topics and Well Written Essays - 750 words

Database security Questions - Essay Example In addition, the moment we think to offer security to our database framework with the intention that no illegal person or user is able to use it. However, the unplanned harms could be minimized by offering guidance to the employees and enforcing fines on violation of the business policies for instance moving away from workplace even though the system is open for working. In this scenario, a company user must be permitted access only relevant data, and diverse business users should be controlled through diverse methods of access for instance interpretation and modification to business critical data. Thus, business strategies at user administration level are able to help make new rules for prohibiting illegal or legal user access issues (Kumar, 2011; Cawley, 2008). Q. 2 Trigger The below given code is taken from (Pattani, 2010; Oracle , 2010; Czuprynski, 2006) CREATE TABLE CUSTOMER_SECTION ( Cst_SectNo sectno_dom, Cst_Name section_dom, Cst_HeadSSN ssn_dom, Cst_Budget budget_dom, CONSTR AINT customer_section_PK PRIMARY KEY (cst_SectNo), CONSTRAINT c_section_FK FOREIGN KEY (cst_HeadSSN) REFERENCES tab_LIBRARIAN (SSN), CONSTRAINT customer_section_budget_TX2 CHECK ((cst_Budget >= 0) AND (cst_Budget IS NOT NULL)), CONSTRAINT customer_section_budget_TX2 CHECK (NOT EXISTS (SELECT * FROM customer_SECTION s WHERE cst_budget Head.Salary AND Lib.Section = S.cst_SectNo AND S.Lib_HeadSSN = Head.SSN and Lib.SSN Head.SSN)) inform_director (Lib.SSN,Lib_HeadSSN); In the above given code we supposed that inform_director() is a process which has already been stored inside the database in addition it could be used by the DBMS (Pattani, 2010). Q: 3 Following are advantages of VPD: (Pattani, 2010; Oracle , 2010; Czuprynski, 2006) VPD offers dynamic security mechanism means that businesses need not to uphold complicated roles and considering grants aspects. By using VPD one can apply over individual rule on every database object Database users are not able to circumvent safety mechanis m inserted inside applications, since

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.