Integrity
Integrity
Lecture Series By :
Data Tampering
Data Theft
Password-Related Threats
Lack of Accountability
PHYSICAL
HUMAN
OPERATING SYSTEM
NETWORK
DATABASE SYSTEMS
Confidentiality
Privacy of communications
Authentication
Authorization
Read Authorization
Insert Authorization
Update Authorization
Delete Authorization
Alteration Authorization
Drop Authorization
DBMS by Er. K.S.Dhindsa © 2006
DATA INTEGRITY
PRIVILEGE
ROLE
I. Database Privileges :
I. System Privileges :
Right to perform a particular
action, or to perform action on a particular
type of object
Right to delete the rows of any table
GRANT COMMAND ::
TO PUBLIC;
TO DEEP;
TO AJAY;
GRANT SELECT,DELETE,UPDATE
ON DEPT TO AJAY;
user ‘AJAY’
TO AJAY;
DBMS by Er. K.S.Dhindsa © 2006
REVOKE COMMAND
Revoke command that allows the withdrawal of privileges
FROM Ajay;
DBMS by Er. K.S.Dhindsa © 2006
REVOKE COMMAND
REVOKE ALL
ON EMP
FROM AJAY;
DBMS by Er. K.S.Dhindsa © 2006
DATA SECURITY & INTEGRITY IN DATABASES
Lecture Series By :