O'Reilly logo

Introduction to Database Systems by ITL Education Solutions Limited

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 12

DATABASE SECURITY

After reading this chapter, the reader will understand:

  • Importance of database security for organizations
  • Security issues
  • Types of threats that could adversely affect the database system
  • Role of DBA in database security
  • The role of database audit for finding the illegal and unauthorized operations
  • Authorization, authorizer, access matrix, and authorization tree
  • Various access privileges that a user can have on a relation
  • Authentication and various methods to authenticate a user
  • Access control and main approaches in DBMS for access control including discretionary access control (DAC), mandatory access control (MAC), and role-based access control (RBAC)
  • Granting and revoking privileges to database users
  • Implementing ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required