Saturday, April 27, 2019
Explain database security issues Essay Example | Topics and Well Written Essays - 500 words
Explain database security issues - Essay ExampleLocking refers to the factor of synchr adeptity of potentially simultaneous database or even other ordinary resources utilization. In operate systems, locking helps in enforcing and ascertaining the occurrence of events in the appropriate series (Pratt & Adamski, 2011).As the most effective means of enhancing security of data, encryption refers to the translation of data into ciphertext form, which cannot be understood easily by illicit individuals. Therefore, encryption involves the conversion of essential data into secret codes. Encrypted data is sent in codes instead of plain, simple rowing making it necessary for the receivers computer to decrypt such data for ones display. The reader of such data requires a secret password or key to enhance decoding of the data (Pratt & Adamski, 2011).Views refer to the saved select statements, which permit an individual to work upon the outcomes returned from them. Views are essential in provi sion of column- or row-level data access, wrapping up sophisticated joints, executing sophisticated collective queries, and adapt data display (Singh & Kanjilal, 2009). Views are fundamental security tools, habitually utilized in thwarting users from having unrestricted access to tables whereas permitting them to operate with the presented data. All consents can be eradicated from the principal tables, and provided the tables owner is the makes owner, the user will have the ability of interacting with the wedded data, but based on authorizations okay to the view (Pratt & Adamski, 2011).Duplication (replication) refers to a set of catalog objects and data copying and distribution technologies from a given folder into another. This is followed by the sychronization between the two databases in order to uphold uniformity. In the process, a database is copied from one server into another, followed by protection of the dissimilar copies in concurrence. Data replication, on the other hand,
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.