SET NO. 1

docx

School

Harvard University *

*We aren’t endorsed by this school

Course

260

Subject

Information Systems

Date

Nov 24, 2024

Type

docx

Pages

4

Uploaded by ColonelEnergy6151

Report
Discussion Post Name Institution Professor Course Date
Discussion of Terms Database Authorization The database administrator retrieves information about a verified user as part of the authorization process. Using this data, the manager determines which database operations and objects the user is authorized to use. Access Control Through the use of login names and passwords, access control limits who can use a computer system. To prevent data retrieval or malicious data injection, access control restricts the entire database. Data Encryption Encrypting information involves converting it from its plain text or unencrypted form into its ciphertex or encrypted form for security purposes. Data transmission is protected because only the user with the correct decryption key can read the encrypted data. Privileged (system) Account The DBA account provides crucial capabilities and the process of granting and revoking commands constitutes a privilege (Ferle, 2023). Accounts are made, security levels are assigned, privileges are revoked and granted, and other similar tasks are carried out. Database Audits For reasons of safety, audits of databases involve monitoring their use and following up on user activity this involves the use of database logs and previously used data. Audit Trail An audit trail is a log that details what happened on a computer, including the operating system, user actions, and application used.
Types of Privilege Aside from administrative privilege, which grants the highest level of access, there are also user privileges, which grant the least amount of access but still allow tasks to run normally, application privileges, file system privileges, and network privileges (Amer, 2021). What is meant by revoking a privilege? Temporary commands require a corresponding revoke command to be cancelled once the assigned task has been completed. A right can be revoked if and when the need arises.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Reference Amer, S. (2021). Security of DBMSs. In Advances in Security, Networks, and Internet of Things: Proceedings from SAM'20, ICWN'20, ICOMP'20, and ESCS'20 (pp. 449-461). Springer International Publishing. Ferle, M. (2023). Account Access and Security. In SnowPro™ Core Certification Companion: Hands-on Preparation and Practice (pp. 69-97). Berkeley, CA: Apress. Reply 1 The discussion contains many valid points, many of which are consistent with arguments I myself have made. However, in my discussion of the root privilege, I also had access to other types of privilege. The discussion is well-organized, with clear and insightful points made. Reply 2 The work presented here is insightful, and it has been presented in a way that makes sense. The discussion has taken advantage of easily grasped and followed terms. In addition, I now understand a key point that I had previously overlooked. I mistook this for a component of application privilege; now I know it refers to the independent file system privilege.