Please enable JavaScript.
Coggle requires JavaScript to display documents.
Data Base Security (Security (Database Security System (image,…
Data Base Security
Security
-
-
There are network, hardware, operating system, and physical controls that augment the controls provided by DBMSs.
Database administrators create authorization rules that define who can access which parts of a database for what operations.
-
In discretionary access control, users are assigned access rights or privileges to specified parts of a database.
In mandatory control approaches, each object is assigned a classification level and each user is given a clearance level.
Encryption involves the encoding of data to obscure their meaning. An encryption algorithm changes the original data (known as the plaintext).
To decipher the data, the user supplies an encryption key to restore the encrypted data (known as the ciphertext) to its original (plaintext) format.
-
-