Nobody downloaded yet

Compare two database product ( DB2 and MS access) in six security features: Access Control, Inference Policy ,User Identification/Authentication, Accountability and auditing, Encryption and Data Forensic - Research Paper Example

Comments (0) Cite this document
Summary
Database security is an important aspect that ensures that data availability, integrity and confidentiality are enhanced at all time in relational database. A secure database is important in the creation an efficient information system in an organization as it reduces the threat…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER96.4% of users find it useful
Compare two database product ( DB2 and MS access) in six security features: Access Control, Inference Policy ,User Identification/Authentication, Accountability and auditing, Encryption and Data Forensic
Read TextPreview

Extract of sample "Compare two database product ( DB2 and MS access) in six security features: Access Control, Inference Policy ,User Identification/Authentication, Accountability and auditing, Encryption and Data Forensic"

Download file to see previous pages This paper will compare some of the security features in DB2 and MS access from IBM and Microsoft Corporation respectively.
User level security is tasked at controlling the kind of data that a particular user should be allowed to access (e.g. preventing the sales personnel from accessing accounting data) and restricting the actions that can be performed on those particular data.
To compliment the above system, MS access also offer accde and mde file format which deter the user making any changes to he object (Allison & Berkowitz, 2005). This security feature mainly helps to protect the design form alteration by user since the files are execute-only versions.
This policy helps to protect secured information from detection by unauthorized users by use of inferences. This is due to the tendency of users’ uses the authorized information to try to infer what he is unauthorized to view based on his knowledge and work related experience.
DB2 has a row-level security labelling with very strict security requirements to allow data access. A user can not access or update data if he is not allowed by his security label to do so. On the other hand, MS access has no inbuilt security measure to deter cases of inference (Chao, 2006). However, it is possible to initiate row level security configuring security views and labels. Unfortunately, the form of security created by these ensures are lower compared to those in the DB2.
This involve the verification of the identity of the user to either allow or disallow him access to the database by comparing the user ID and password. An authentication security plug-in located outside the DB2 database system is used to verify the user identity (Chao, 2006). It can be configured to facilitate authentication through an operating system, Kerberos or Lightweight Directory Access Protocol (LDAP) server. In addition, custom plug-ins for authentication purposes are ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Compare two database product ( DB2 and MS access) in six security Research Paper”, n.d.)
Compare two database product ( DB2 and MS access) in six security Research Paper. Retrieved from https://studentshare.org/information-technology/1646302-compare-two-database-product-db2-and-ms-access-in-six-security-features-access-control-inference-policy-user-identificationauthentication-accountability-and-auditing-encryption-and-data-forensic
(Compare Two Database Product ( DB2 and MS Access) in Six Security Research Paper)
Compare Two Database Product ( DB2 and MS Access) in Six Security Research Paper. https://studentshare.org/information-technology/1646302-compare-two-database-product-db2-and-ms-access-in-six-security-features-access-control-inference-policy-user-identificationauthentication-accountability-and-auditing-encryption-and-data-forensic.
“Compare Two Database Product ( DB2 and MS Access) in Six Security Research Paper”, n.d. https://studentshare.org/information-technology/1646302-compare-two-database-product-db2-and-ms-access-in-six-security-features-access-control-inference-policy-user-identificationauthentication-accountability-and-auditing-encryption-and-data-forensic.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Compare two database product ( DB2 and MS access) in six security features: Access Control, Inference Policy ,User Identification/Authentication, Accountability and auditing, Encryption and Data Forensic

Data Encryption and Authentication Methods

...Internet Security and Authentication Internet has today become the easiest and most convenient form of communication between individuals, corporates and even governments. With growth in volumes of data, come security problems. Programming and coding have become very common and easy to access, leading to an increase in internet crime. As more and more people use the internet to transact and complete financial deals, internet security assumes prime importance. Encryption is the technique by which data becomes private. This does not however imply that the data becomes...
5 Pages(1250 words)Term Paper

MS-Access and Net framework

...language can use Access as their database. Features of MS Access 2007 Customized Reports MS Access 2007 includes a feature for user specific report generation. These customized reports can be generated easily. Report Wizard is the additional feature that allows the data to be sorted and grouped. The data to be included in the report can be easily selected. Since this project requires effective report generation, Access is selected as it generates the reports efficiently. This Report wizard allows the...
6 Pages(1500 words)Essay

Security through authentication and Encryption

...related solutions. The security of any organization is hidden in depending upon its ability to cope up with preventing malicious attacks and tracking unauthorized acts. Most organization leaders believe that they have secured their systems by using security products like firewalls. Of course firewall is not enough and not the only solution that guarantees security. Instead there is a need to strong user authentication and encryption along with other techniques and policies that can hep in creating user accountability and confidentiality so as to ensure...
8 Pages(2000 words)Essay

The physical access control security

...in which computers are kept should be restricted. This is because of theft, vandalism and unauthorized access of the workplace and systems. The control access system handles different categories of personnel, each who have different conditions of success in the workplace. They include operators and system users who work in the secure area regularly, engineers and support staffs that need access on occasions and others who rarely need access. To regulate the access control, there is a mandatory sign-in system that tracks the entrance to sensitive areas, or assigns...
3 Pages(750 words)Research Paper

Inference technique in Access control Decisions

...as the architecture that pushes forward each and every request to the Policy Decision Point (PDP). Furthermore, the PDP then investigates the request that is made within the application (Molloy et al. 157). The contemporary access control system depends upon the PEP and PDP. The PDP is generally implemented as a fanatical server that is authorized in fact; it is located on the different node as compared to the PEP nodes (Molloy et al. 157). In order to implement the reliable policy all over the system the architecture of the PEP must provide enough capability to connect with the PDP to inquiry decisions otherwise it has to suffer from the single point...
6 Pages(1500 words)Research Paper

Microsoft Access Database

...Module Microsoft Access Database Database contains two tables and two forms: suppliers and products. This can be openedor accessed through Microsoft access only. Data are entered either directly or via the forms depending on the accessibility permissions. Products The following is a list of products brands available to customers in our restaurant: i. Afia ii. Cocacola iii. Delmonte iv. Nuvita The above mentioned products are soft drinks produced and supplied by different companies. Each vendor has its unique brands, as...
2 Pages(500 words)Assignment

Information Security Access Control Methods

...process that authorizes the end users to establish the initial connection with the information system. Passwords are granted to the end user for accessing their accounts. User access can be managed locally or by policies defined by the organization. b) Network Access Control: It is a method of strengthening the network security by limiting the accessibility of network resources to communicating devices that fulfill with a proposed security policy. Network Access Control method restricts...
1 Pages(250 words)Assignment

Database security: Authorization and access control

...for the user. This means that during the communication with Windows the user must need to follow this permission after which Windows environment will get ready for communication (Tony, 2004). • Windows handles the Authentications SQL server allows or disallows users to access objects in the database. The Windows environment facilitates SQL server to provide security and account lockout, which are the main features of Windows XP and 2000 (Tony, 2004). Method of Authorization in Oracle Database In Oracle database, whenever authentication...
9 Pages(2250 words)Research Paper

Huffman Trucking Controlling User Access

...in the security, avoidance of security controls and potential data or information theft. (Coleman, 2008). Role is defined as collection of rights, position and duties within an organization. Moreover, it involves authority, responsibility and interaction. The main purpose for defining roles in an organization is to ensure that tasks, which are needed to be performed, are assigned to specific users who are accountable for the same. Generally, the users have to perform basic and functional roles whereas the system access serves as a security method and control the...
3 Pages(750 words)Essay

Data & Access Management

.... The standard risk and threats to data access and management include unsecured files and folders, over-privileged users, weak local computer policies, passwords that don not expire, and improper group membership. More importantly, the IT has to ensure that colleagues are leaving the organization ceases from accessing the organizational materials. The effectiveness of access management rests on the professional password management. The management of access to sensitive accounts becomes even more challenging for IT experts themselves. Terrible question must be answered such as who truly require the keys to...
6 Pages(1500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic Compare two database product ( DB2 and MS access) in six security features: Access Control, Inference Policy ,User Identification/Authentication, Accountability and auditing, Encryption and Data Forensic for FREE!

Contact Us