Chapter 5. Database Security and Transaction Processing (10
marks)
Database security
Database security refers to the collective measures used to protect and secure
a database or database management software from illegal use and malicious
threats and attacks.
Requirements of Database Security:
1. Confidentiality: Confidentiality of data is ensured by a secured system.
This means that user can view the data which is allowed them to see.
2. Integrity: Integrity is concerned with protection of data from deletion and
corruption.when the contents of the message are changed after the sender
sends it, but before it reaches the intended receiver, we say that the integrity
of the message is lost.
3. Authentication: Authentication is used to assign privileges to the user.
4. Availability: Availability ensure that authorized users have access to data
which he wants .
Prepare by Prof: P. B. Khairnar
, Types of Database Users
1. Naive user
2. Sophisticated users
3. Application Programmers
4. Specialized users
Naive user
Naive users are unsophisticated users.
They interact with system through application programs.
They may input data through application programs or view the output
through application programs.
Sophisticated users
Interact with system by making requests in the form of query languages.
These queries are submitted to query processor.
Application Programmers
These are the users who write application programs.
The application programs are written in programming languages like
COBOL, JAVA etc.
Specialized users
They develop special type of database application programs.
Ex. Applications like Expert systems, CAD (computer Aided Designs).
Prepare by Prof: P. B. Khairnar
marks)
Database security
Database security refers to the collective measures used to protect and secure
a database or database management software from illegal use and malicious
threats and attacks.
Requirements of Database Security:
1. Confidentiality: Confidentiality of data is ensured by a secured system.
This means that user can view the data which is allowed them to see.
2. Integrity: Integrity is concerned with protection of data from deletion and
corruption.when the contents of the message are changed after the sender
sends it, but before it reaches the intended receiver, we say that the integrity
of the message is lost.
3. Authentication: Authentication is used to assign privileges to the user.
4. Availability: Availability ensure that authorized users have access to data
which he wants .
Prepare by Prof: P. B. Khairnar
, Types of Database Users
1. Naive user
2. Sophisticated users
3. Application Programmers
4. Specialized users
Naive user
Naive users are unsophisticated users.
They interact with system through application programs.
They may input data through application programs or view the output
through application programs.
Sophisticated users
Interact with system by making requests in the form of query languages.
These queries are submitted to query processor.
Application Programmers
These are the users who write application programs.
The application programs are written in programming languages like
COBOL, JAVA etc.
Specialized users
They develop special type of database application programs.
Ex. Applications like Expert systems, CAD (computer Aided Designs).
Prepare by Prof: P. B. Khairnar