what is the difference between securityand protection in dbms?
Answers were Sorted based on User's Feedback
Answer / deepak arora
Data security controls protects the data from unauthorized access and unwanted changes.
Data security controls have two major aspects:
1. data protection
2. authorization control
Data protections make sure that no any unauthorized person can understand the physical contents of data.
| Is This Answer Correct ? | 19 Yes | 3 No |
Answer / pari
Data security is the protection of the database from unauthorized users. Only the authorized persons are allowed to access the database. Most of the users are allowed to access a part of database i.e., the data that is related to them or related to their department. Mostly, the DBA or head of department can access all the data in the database. Some users may be permitted only to retrieve data, whereas others are allowed to retrieve as well as to update data. The database access is controlled by the DBA. He creates the-accounts of users and gives rights to access the database. Typically, users or group of users are given usernames protected by passwords.
Most of the DBMSs provide the security sub-system, which the DBA uses to create accounts of users and to specify account restrictions. The user enters his/her account number (or user name) and password to access the data from database. For example, if you have an account in the "hotmail.com" (a popular website), then you have to give your correct username and password to access your account of e-mail. Similarly, when you insert your ATM card into the auto teller machine (ATM) in a bank, the machine reads your ID number printed on the card and then asks you to enter your pin code (or password). In this way you can access your account..
| Is This Answer Correct ? | 5 Yes | 8 No |
What is a distributed database?
Can we create an List of Values without an RECORD GROUP ?
What is metadata in dbms?
Explain the Difference Between OLTP and OLAP Databases.
What is " group by " clause?
Explain the necessary techniques to control deadlocks?
Explain what is meant by asymmetrical protocols?
How to retrive a student with height marks,second height and third height from MS access database what wil be the query for this purpuse?
What are the different types of modeling?
Can you copy the PROGRAM UNIT into an Object group ?
What are indexes ? What are the advantages ? (Phone Screen)
What are partitions in database?
Oracle (3253)
SQL Server (4518)
MS Access (429)
MySQL (1402)
Postgre (483)
Sybase (267)
DB Architecture (141)
DB Administration (291)
DB Development (113)
SQL PLSQL (3330)
MongoDB (502)
IBM Informix (50)
Neo4j (82)
InfluxDB (0)
Apache CouchDB (44)
Firebird (5)
Database Management (1411)
Databases AllOther (288)