close
test_template

The Database Security

download print

About this sample

About this sample

close

Words: 502 |

Page: 1|

3 min read

Published: Dec 5, 2018

Words: 502|Page: 1|3 min read

Published: Dec 5, 2018

The database security community has developed multiple techniques and approaches to ensure that there is data confidentiality, availability and integrity. The principal database security concepts include authentication, encryption, authorization and change tracking.

Authentication: It is the process of identifying or confirming the identity of a person. The method of confirming the identity of an individual can be capitalized through validating their documents and through verifying the authenticity of the digital certificate. Authentication involves testing the validity of at least a specific identification. There are different types of identification, which includes single-factor verification, multi-factor validation, two- factor authentication and secure authentication.

Most of the applications use two-factor authentication, in which two independent factors are used to identify a user and at the same time two factors should not share a common vulnerability. In most of the two-factor authentication schemes passwords are used as the first factor and smart cards or other encryption devices are used as the second factor. Apart from the two-factor authentication there are many types of authentication methods like biometric authentication, Token-Based authentication and certificate based authentication. All these kinds of authentication play a similar role of confirming the identity of a person. Authentication has helped in confirming the identity of people and authenticity of products.

Authorization: It is the progression of permitting or rejecting admission to a secure system. Mostly, the computer safety schemes are based on verification and authorization. It is the purpose of stipulating admits to rights to assets interrelated to data safety. Authorization determines what a user can do on the database. By authorization one can control to access the data from unwanted users.

By using the GRANT, DENY and REVOKE we can give authorization on database objects. Authorization is vital in ensuring that security systems are kept secure and free from interruption from intruders.Encryption:Encryption is the progression of indoctrinating posts and data in such a way that only the accredited individuals can have access to the information or messages. The scheme of encryption employs pseudo-random key generated by algorithms to prevent intruders from assessing unauthorized data and messages. There are two categories of encryption including symmetric key and public key. The difference between symmetric key and the public key is that public key is free while the symmetric key is private and it is purchasable. Authentication is also performed using encryption. Decrypted key is required by to perform decryption on the encryption data.

Get a custom paper now from our expert writers.

Change tracking: The trivial clarification provides mechanisms for applications. To ensure that implementation of the query for changes of data and access to information is related to changes, it is essential for application developers to implement custom change tracking. Applications capitalize change tracking in determining the type of rows that have been changed for a user table. To configure change tracking, there is the usage of SQL Server management studio. To track changes, there is the need of enabling change tracking and then would allow tables to be tracked within the database.

Image of Dr. Oliver Johnson
This essay was reviewed by
Dr. Oliver Johnson

Cite this Essay

The database security. (2018, December 03). GradesFixer. Retrieved November 20, 2024, from https://gradesfixer.com/free-essay-examples/the-database-security/
“The database security.” GradesFixer, 03 Dec. 2018, gradesfixer.com/free-essay-examples/the-database-security/
The database security. [online]. Available at: <https://gradesfixer.com/free-essay-examples/the-database-security/> [Accessed 20 Nov. 2024].
The database security [Internet]. GradesFixer. 2018 Dec 03 [cited 2024 Nov 20]. Available from: https://gradesfixer.com/free-essay-examples/the-database-security/
copy
Keep in mind: This sample was shared by another student.
  • 450+ experts on 30 subjects ready to help
  • Custom essay delivered in as few as 3 hours
Write my essay

Still can’t find what you need?

Browse our vast selection of original essay samples, each expertly formatted and styled

close

Where do you want us to send this sample?

    By clicking “Continue”, you agree to our terms of service and privacy policy.

    close

    Be careful. This essay is not unique

    This essay was donated by a student and is likely to have been used and submitted before

    Download this Sample

    Free samples may contain mistakes and not unique parts

    close

    Sorry, we could not paraphrase this essay. Our professional writers can rewrite it and get you a unique paper.

    close

    Thanks!

    Please check your inbox.

    We can write you a custom essay that will follow your exact instructions and meet the deadlines. Let's fix your grades together!

    clock-banner-side

    Get Your
    Personalized Essay in 3 Hours or Less!

    exit-popup-close
    We can help you get a better grade and deliver your task on time!
    • Instructions Followed To The Letter
    • Deadlines Met At Every Stage
    • Unique And Plagiarism Free
    Order your paper now