Trusted by millions of Kenyans
Study resources on Kenyaplex

Get ready-made curriculum aligned revision materials

Exam papers, notes, holiday assignments and topical questions – all aligned to the Kenyan curriculum.

Explain the following database security features: (i) Authorization (ii) Authentication

Explain the following database security features:
(i) Authorization
(ii) Authentication

Answers


gregory
(i) Authorization
It involves determining the access rights to various system resources (hardware e.g. printers,
disk drives, etc or programs e.g. payroll applications, inventory applications, etc).
Authorization is done by an authorization policy, which defines activities permitted or
prohibited within the system. Authorization mechanisms implement the authorization policy
and includes directory of access rights, access control lists (ACL) and access tickets or
capabilities.
(ii) Authentication
It involves verification of the identity of the subject (Are you who you say you are? Prove it!).
The most common form of authentication is the password based access control.
gregorymasila answered the question on November 23, 2017 at 12:51

Answer Attachments

Exams With Marking Schemes

Related Questions