As database practitioners, we must provide a means of preventing unauthorized use of data in a database. Three areas are considered
1. Access Control: Who should be allowed access to which databases? This is typically enforced using system level accounts with passwords.
2. Authorization: for the purposes of:
- Reading Data - Such as reading another employee's salary (using a SELECT statement)
- Writing Data - Such as changing a value in a database (using UPDATE or DELETE)
3. Statistical Information: Enforcing who should be allowed access to information derived from underlying databases (Census example).
Kavungya answered the question on May 10, 2019 at 12:32
-
State and explain the contents of a database.
(Solved)
State and explain the contents of a database.
Date posted:
May 10, 2019
.
Answers (1)
-
Explain the disadvantages of database approach.
(Solved)
Explain the disadvantages of database approach.
Date posted:
May 10, 2019
.
Answers (1)
-
State and explain the features that characterize a database approach.
(Solved)
State and explain the features that characterize a database approach.
Date posted:
May 10, 2019
.
Answers (1)
-
State and explain the Limitations of a file system.
(Solved)
State and explain the Limitations of a file system.
Date posted:
May 10, 2019
.
Answers (1)
-
Describe file systems.
(Solved)
Describe file systems.
Date posted:
May 10, 2019
.
Answers (1)
-
Describe data warehousing.
(Solved)
Describe data warehousing.
Date posted:
May 10, 2019
.
Answers (1)
-
Describe data mining.
(Solved)
Describe data mining.
Date posted:
May 10, 2019
.
Answers (1)
-
Give the problems with IT planning.
(Solved)
Give the problems with IT planning.
Date posted:
May 10, 2019
.
Answers (1)
-
Describe the completion of projects on time and within budgets.
(Solved)
Describe the completion of projects on time and within budgets.
Date posted:
May 10, 2019
.
Answers (1)
-
Describe the allocation of resources in IT.
(Solved)
Describe the allocation of resources in IT.
Date posted:
May 10, 2019
.
Answers (1)
-
Describe the design of information technology architecture.
(Solved)
Describe the design of information technology architecture.
Date posted:
May 10, 2019
.
Answers (1)
-
Describe the alignment of the IT plan with the organization plan.
(Solved)
Describe the alignment of the IT plan with the organization plan.
Date posted:
May 10, 2019
.
Answers (1)
-
State the issues in IT planning.
(Solved)
State the issues in IT planning.
Date posted:
May 10, 2019
.
Answers (1)
-
Describe the information technology planing.
(Solved)
Describe the information technology planing.
Date posted:
May 10, 2019
.
Answers (1)
-
Outline the limitations of an expert system.
(Solved)
Outline the limitations of an expert system.
Date posted:
May 10, 2019
.
Answers (1)
-
Give the benefits of an expert system to an organization.
(Solved)
Give the benefits of an expert system to an organization.
Date posted:
May 10, 2019
.
Answers (1)
-
Describe the knowledge management systems.
(Solved)
Describe the knowledge management systems.
Date posted:
May 10, 2019
.
Answers (1)
-
Describe the executive support systems.
(Solved)
Describe the executive support systems.
Date posted:
May 10, 2019
.
Answers (1)
-
Explain the capabilities of EISS.
(Solved)
Explain the capabilities of EISS.
Date posted:
May 10, 2019
.
Answers (1)
-
List the Internal factors which can use the demand of EISS to increase.
(Solved)
List the Internal factors which can use the demand of EISS to increase.
Date posted:
May 10, 2019
.
Answers (1)