Question
Asked Sep 27, 2019
24 views

Describe the GRANT statement and explain how it relates to security. What types of privileges may be granted? How are they revoked?

check_circle

Expert Answer

Step 1

The syntax for GRANT statement is

GRANT parameter(1) ON parameter(2) TO parameter(3) [WITH GRANT OPTION];

Parameter(1) is the privilege or access rights granted to the user.
Parameter(2) is the object name. It can be database object or a table name
Parameter(3) is the user to whom privileges would be granted.

Privilege can be SELECT, INDEX, INSERT, DELETE, ALTER, DROP, ALL, CREATE, UPDATE.

Example, GRANT INSERT, SELECT, DELETE ON Users TO '*'@'localhost;

Step 2

GRANT allows only selected database objects(users) to have privileges but [WITH GRANT OPTION] in GRANT syntax allows a user to transfer GRANT access rights to other users. It can become major threat to the security of database. That’s why WITH GRANT OPTION should be used with care in GRANT statements.

 

Step 3

Privileges can be SELECT, INDEX, INSERT, DELETE, ALTER, DROP, ALL, CREATE, UPDATE etc.

Example, ...

Want to see the full answer?

See Solution

Check out a sample Q&A here.

Want to see this answer and more?

Solutions are written by subject experts who are available 24/7. Questions are typically answered within 1 hour.*

See Solution
*Response times may vary by subject and question.
Tagged in

Engineering

Computer Science

Databases

Related Computer Science Q&A

Find answers to questions asked by student like you

Show more Q&A add
question_answer

Q: How do you make a Flowchart that makes change for $1 using quarters, dimes, and nickels?

A: Flowchart that makes change for $1 using quarters, dimes, and nickels

question_answer

Q: Hello, please I need help with the following using Python:   Write flowchart, pseudo-code and progra...

A: Pseudocode:Import module statistics and Declare variables Students and Student_listPrompt for the nu...

question_answer

Q: Imagine that you and your team have been hired to develop an improved process for evaluating which s...

A: Student's class 12th as well as his/her Entrance Exam will be checked.The information will be checke...

question_answer

Q: http://codecheck.it/files/19090511007zak2isnw4afoevi9wybzitkv   please help me solve this problem in...

A: In python the given patterns can be printed by usinginput functionfor looprange()print ()The input()...

question_answer

Q: In PL/SQL, Create a recursive store function called add_numbers to calculate the total of all consec...

A: Program plan:Declare the required variables.The “add_numbers” function returns the value. Otherwise,...

question_answer

Q: Think Critically 3-1: Configuring Zones You have an Active Directory forest named csmtech.local and ...

A: Setting up of DNS server and zones to handle the given situation:Consider the following 2 scenarios ...

question_answer

Q: Using the results of the dependency diagram (attached), table of removal and partial dependency and ...

A: Entities Identified : Student , Advisor , Appointment and Department.Entity Student is having STUDEN...

question_answer

Q: Consider the following procedure: procedure mystery (x, y, z); integer x, y, z;beginz = 2; y= z+x;en...

A: Pass by reference copies the location of argument to the parameter. Hence, the final value of n, A[1...

question_answer

Q: What are some of the social implications of the use of smartphones by an increasing percentage of th...

A: Mobile technology has radically changed the cultural norms and behavior of individuals.  Nowadays ev...