SET NO. 1
docx
keyboard_arrow_up
School
Harvard University *
*We aren’t endorsed by this school
Course
260
Subject
Information Systems
Date
Nov 24, 2024
Type
docx
Pages
4
Uploaded by ColonelEnergy6151
Discussion Post
Name
Institution
Professor
Course
Date
Discussion of Terms
Database Authorization
The database administrator retrieves information about a verified user as part of the
authorization process. Using this data, the manager determines which database operations and
objects the user is authorized to use.
Access Control
Through the use of login names and passwords, access control limits who can use a
computer system. To prevent data retrieval or malicious data injection, access control restricts the
entire database.
Data Encryption
Encrypting information involves converting it from its plain text or unencrypted form
into its ciphertex or encrypted form for security purposes. Data transmission is protected because
only the user with the correct decryption key can read the encrypted data.
Privileged (system) Account
The DBA account provides crucial capabilities and the process of granting and revoking
commands constitutes a privilege (Ferle, 2023). Accounts are made, security levels are assigned,
privileges are revoked and granted, and other similar tasks are carried out.
Database Audits
For reasons of safety, audits of databases involve monitoring their use and following up
on user activity this involves the use of database logs and previously used data.
Audit Trail
An audit trail is a log that details what happened on a computer, including the operating
system, user actions, and application used.
Types of Privilege
Aside from administrative privilege, which grants the highest level of access, there are
also user privileges, which grant the least amount of access but still allow tasks to run normally,
application privileges, file system privileges, and network privileges (Amer, 2021).
What is meant by revoking a privilege?
Temporary commands require a corresponding revoke command to be cancelled once the
assigned task has been completed. A right can be revoked if and when the need arises.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Reference
Amer, S. (2021). Security of DBMSs. In
Advances in Security, Networks, and Internet of Things:
Proceedings from SAM'20, ICWN'20, ICOMP'20, and ESCS'20
(pp. 449-461). Springer
International Publishing.
Ferle, M. (2023). Account Access and Security. In
SnowPro™ Core Certification Companion:
Hands-on Preparation and Practice
(pp. 69-97). Berkeley, CA: Apress.
Reply 1
The discussion contains many valid points, many of which are consistent with arguments
I myself have made. However, in my discussion of the root privilege, I also had access to other
types of privilege. The discussion is well-organized, with clear and insightful points made.
Reply 2
The work presented here is insightful, and it has been presented in a way that makes
sense. The discussion has taken advantage of easily grasped and followed terms. In addition, I
now understand a key point that I had previously overlooked. I mistook this for a component of
application privilege; now I know it refers to the independent file system privilege.