Thursday, July 25, 2019
Explain database security issues Essay Example | Topics and Well Written Essays - 500 words
Explain database security issues - Essay Example Locking refers to the means of synchronization of potentially simultaneous database or even other ordinary resourceââ¬â¢s utilization. In operating systems, locking helps in enforcing and ascertaining the occurrence of events in the appropriate series (Pratt & Adamski, 2011). As the most effective means of enhancing security of data, encryption refers to the translation of data into ciphertext form, which cannot be understood easily by illicit individuals. Therefore, encryption involves the conversion of essential data into secret codes. Encrypted data is sent in codes instead of plain, simple words making it necessary for the receiverââ¬â¢s computer to decrypt such data for oneââ¬â¢s display. The reader of such data requires a secret password or key to enhance decryption of the data (Pratt & Adamski, 2011). Views refer to the saved select statements, which permit an individual to work upon the outcomes returned from them. Views are essential in provision of column- or row-level data access, wrapping up sophisticated joints, executing sophisticated collective queries, and tailoring data display (Singh & Kanjilal, 2009). Views are fundamental security tools, habitually utilized in thwarting users from having unrestricted access to tables whereas permitting them to operate with the presented data. All consents can be eradicated from the principal tables, and provided the tableââ¬â¢s owner is the viewââ¬â¢s owner, the user will have the ability of interacting with the given data, but based on authorizations approved to the view (Pratt & Adamski, 2011). Duplication (replication) refers to a set of catalog objects and data copying and distribution technologies from a given folder into another. This is followed by the sychronization between the two databases in order to uphold uniformity. In the process, a database is copied from one server into another, followed by protection of the dissimilar copies in concurrence. Data replication, on the other hand,
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.