Home > Link, Microsoft SQL Server, MSBI, Optimization, Query, Script, SQL Mentalist, SQL PraRup, SQL Query, SQL Server, Technology,, Vishal Pawar > BISQL – Laymen to SQL Developer # 44 – Security & Integrity #1 – Introduction, Security & Integrity Violations

BISQL – Laymen to SQL Developer # 44 – Security & Integrity #1 – Introduction, Security & Integrity Violations

Hi Folks,

This post is part of Series Database Management Systems

Currently running topic for this series is listed as below :

Series of Database Management Systems

>>Chapter 1 : DBMS [Database Management Systems]

>>Chapter 2 : Database Core Concepts and  Applications

>>Chapter 3 : Record Storage and Primary File Organization

>>Chapter 4 : Index Structures of Files

>>Chapter 5 : Entity-Relationship Model

>>Chapter 6 : Relational Algebra

>>Chapter 7 : SQL

>>Chapter 8 : Functional Dependencies and  Normalization For Relational Databases

>>Chapter 9 : Transaction Processing

>>Chapter 10 : Concurrency Control Techniques

>>Chapter 11 : Recovery Techniques

>>Chapter 12 : Distributed Databases

>>Chapter 13 : Relational Databases

>>Chapter 14 : Security & Integrity<You are Here>

Continuing from my previous post on this series.

We are going to Cover the Following Points in this article

  • Introduction
  • Security & Integrity Violations

Introduction

Security is one of the major factors in database management. Data in a database has to be protected from unauthorized access and manipulations. Database security involves allowing or disallowing users from performing actions on the database. Database must be secured against data misusage or inconsistency due to concurrent execution.

Security & Integrity Violations

Misuse of database can be categorized as being either intentional or accidental.

Accidental loss of data consistency:

1. System crashes during transaction processing

2. Due to multi-users accessing the database.

3. Distribution of data over several computers.

Intentional loss of data may be due to reading, writing or destruction of data by unauthorized users.

Database security usually protects data by several techniques.

· Certain portion [selected columns] of a database is available only to those persons who are authorized to access it. This ensures that the confidentiality of data is maintained.

For e.g.: In large organizations, where different users may use the same database, sensitive information such as employees’ salaries should be kept confidential from most of the other users.

To protect database we must take security measures at several levels. Network security is also important as database security.

Security within the operating system is implemented by providing a password for the user accounts. It Protects data in primary memory by avoiding direct access to the data.

Hope you will like Series of Database Management Systems series !

If you have not yet subscribe this Blog , Please subscribe it from “follow me” tab !

So that you will be updated @ real time and all updated knowledge in your mail daily for free without any RSS subscription OR news reading !!

Happy Learning and Sharing !!

For More information related to BI World visit our all Mentalist networks Blog

SQL Server Mentalist … SQL Learning Blog

Business Intelligence Mentalist … Business Intelligence World

Microsoft Mentalist … MVC,ASP.NET, WCF & LinQ

MSBI Mentalist … MS BI and SQL Server

NMUG Bloggers …Navi Mumbai User Group Blog

Architectural Shack … Architectural implementation and design patterns

DBA Mentalist …Advance SQL Server Blog

MVC Mentalist … MVC Learning Blog

Link Mentalist … Daily Best link @ your email

Infographics Mentalist … Image worth explaining thousand Words

Hadoop Mentalist … Blog on Big Data

BI Tools Analysis … BI Tools

Connect With me on

| Facebook |Twitter | LinkedIn| Google+ | Word Press | RSS | About Me |

Advertisements
  1. No comments yet.
  1. No trackbacks yet.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: