DBMS Unit-8
DBMS Unit-8
Database Management
Systems
Unit-8
Database Security
Topics to be covered
• Introduction
• Authentication and Authorization
• Data encryption
• Access control
• DAC (Discretionary access control)
• MAC (Mandatory access control)
• RBAC models
• Intrusion detection
• SQL injection
Unit – 8: Database Security 2
Data Security
Data security avoids from unauthorized Data integrity avoids from human errors,
access of data. when data is entered.
Data security is implemented through user Data integrity is implemented through
account (passwords). constraints such as Primary key, Foreign key,
Check constraints etc.
It is the process of verifying who you are. It is the process of verifying what you are
authorized to do or not to do.
It is providing integrity control and security It is protecting the data to ensure privacy
to the data. and access control of data.
Should not
access
GRANT
• This command gives rights to user for an object.
• Syntax:- GRANT privilege ON object TO user [WITH GRANT OPTION]
REVOKE
• This command takes back rights from user for an object.
• Syntax:- REVOKE privilege ON object FROM user {RESTRICT/CASCADE}
Thank
You