preview

Database Security

Better Essays

Databases introduce a number of unique security requirements for their users and administrators. On one hand, databases are designed to promote open and flexible access to data. But on the other side, it’s this same open access that makes your database vulnerable to many kinds of wicked activity. As the use of the Web grows on both Intranets and the public Internet, information security is becoming crucial to organizations. Now that it is extremely easy to distribute information, it is equally important to ensure that the information is only accessible to those who have the rights to use it. With many systems implementing dynamic creation of Web pages from a database, corporate information security is even more vital. Previously, strict …show more content…

Table Access Control
Standard table access control, if featured in the user authentication system, it is more important on Web applications than on traditional client/server systems. DBAs are often slack in restricting access to particular tables because few users would know how to create a custom SQL query to retrieve data from the database. Most access to a database on a client/server system occurs through a specifically built client that limits access from there.

User-Authentication Security
Authentication security governs the barrier that must be passed before the user can access particular information. The user must have some valid form of id before access is granted. Logins are accomplished in two standard ways: using an HTML form or using an HTTP security request.
If a pass-through is provided to normal database access, traditional security controls can be brought into play.
The HTML login is simply an HTML page that contains the username and password form fields. The actual IDs and passwords are stored in a table on the server. This information is brought to the server through a CGI script. This method has the advantage of letting the DBA define a particular user's privilege. By using a table created by the DBA, numerous security privileges specific to a particular project can be defined.
Once a login

Get Access