SlideShare a Scribd company logo
Database Security and 4 topics in it
•Customer Accounts: Each Oracle database has a
list of legitimate information source customers.
•The information source contains several standard
records, such as the standard management account
SYSTEM (see "SYS and SYSTEM Schemas"). You
can make user records as needed.
• To accessibility an information source, a person must
provide a real username and verification certification.
The certification may be a security password,
Kerberos solution, or public key facilities (PKI)
certification.
• Privilege and Part Authorization
In common, information source accessibility control
includes reducing information accessibility and
information source actions.
For example, you can limit customers from querying specified
platforms or performing specified information source
instructions.
• A user benefit is the right to run particular SQL claims. Rights
can be separated into the following categories:
• System privilege
This is the right to execute a particular activity in the
information source, or execute an activity on any things of a
particular type. For example, CREATE USER and CREATE
SESSION are system privileges.
• Object privilege
This is the right to execute a particular activity on an
item, for example, question the workers desk.
Privilege types are described by the information
source.
Privileges are provided to customers at the attention
of other customers.
• Directors should allow privileges to customers so
they can achieve projects required for their tasks.
Good protection exercise includes allowing a
benefit only to a person who needs that benefit to
achieve the necessary work.
• A role is a known as number of relevant privileges
that you allow to customers or other positions. A
part helps handle privileges for an information
source program or user team.
Thus our CR Bridge blogs have been competed over
here.

More Related Content

PPTX
Top 10 applications for multi factor authentication in higher education
DOCX
Divyesh j ruparel
DOC
Fnbe journal assignment
DOCX
Social psychology
PDF
Ahmed Samir
DOCX
Informe de catedra
PPTX
Social Learning PPT
Top 10 applications for multi factor authentication in higher education
Divyesh j ruparel
Fnbe journal assignment
Social psychology
Ahmed Samir
Informe de catedra
Social Learning PPT

Viewers also liked (11)

DOCX
Actividad 2
PPT
Assessment
DOC
Project brief
PDF
LAS 'STARTUPS' CON MAYOR POSIBILIDAD DE ÉXITO NACEN EN LA UNIVERSIDAD
PPT
Viruses1 2
DOCX
Mapa conceptual
PPTX
Tarea5 basesdatosii2016a
PDF
PDF
Проект Закону №3610
PDF
“Visual Web” Marketing + Instagram Power Tips by Connor Dwyer
Actividad 2
Assessment
Project brief
LAS 'STARTUPS' CON MAYOR POSIBILIDAD DE ÉXITO NACEN EN LA UNIVERSIDAD
Viruses1 2
Mapa conceptual
Tarea5 basesdatosii2016a
Проект Закону №3610
“Visual Web” Marketing + Instagram Power Tips by Connor Dwyer
Ad

Similar to Database security and 4 topics in it (20)

PDF
Data security and Integrity
PPT
98_364_Slides_Lesson05.ppt
PPTX
Database security
PPTX
Database Security and Management Systems
PDF
UNIT 3- DATABASE INTEGRITY AND SECURITY CONCEPTS (1).pdf
PDF
Database security presentation in easy way
PPT
DBSecurity-Overview database securityPPT
PPT
DBSecurity-Overview.ppt
PPTX
Security of the database
PPTX
Database security and privacy
PPTX
Presentation on Database Security in DBMS
PPTX
System security
PPTX
security and privacy in dbms and in sql database
PPT
Dstca
PPTX
Data base security & integrity
PPTX
Database concepts
PPTX
Introduction to Oracle Database Security.pptx
PPT
DB security
PDF
5db-security.pdf
PPTX
Database security
Data security and Integrity
98_364_Slides_Lesson05.ppt
Database security
Database Security and Management Systems
UNIT 3- DATABASE INTEGRITY AND SECURITY CONCEPTS (1).pdf
Database security presentation in easy way
DBSecurity-Overview database securityPPT
DBSecurity-Overview.ppt
Security of the database
Database security and privacy
Presentation on Database Security in DBMS
System security
security and privacy in dbms and in sql database
Dstca
Data base security & integrity
Database concepts
Introduction to Oracle Database Security.pptx
DB security
5db-security.pdf
Database security
Ad

More from kavita thete (9)

PPTX
Amazing nanostructure carbon composites-cr bridge
PPTX
5 benefits of using cad program
PPTX
Android abilities and its demand today
PPTX
J2EE develops n tier application in java
PPTX
Cad cam technology
PPTX
Oracle crm
PPTX
Java mobility (1)
PPTX
Hydration clinical research
PPTX
Cad cam microsoft
Amazing nanostructure carbon composites-cr bridge
5 benefits of using cad program
Android abilities and its demand today
J2EE develops n tier application in java
Cad cam technology
Oracle crm
Java mobility (1)
Hydration clinical research
Cad cam microsoft

Recently uploaded (20)

PDF
Classroom Observation Tools for Teachers
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
Lesson notes of climatology university.
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
Insiders guide to clinical Medicine.pdf
PDF
Sports Quiz easy sports quiz sports quiz
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
RMMM.pdf make it easy to upload and study
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
01-Introduction-to-Information-Management.pdf
PDF
Pre independence Education in Inndia.pdf
PPTX
GDM (1) (1).pptx small presentation for students
PPTX
Cell Types and Its function , kingdom of life
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
Classroom Observation Tools for Teachers
102 student loan defaulters named and shamed – Is someone you know on the list?
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Lesson notes of climatology university.
Microbial diseases, their pathogenesis and prophylaxis
STATICS OF THE RIGID BODIES Hibbelers.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Insiders guide to clinical Medicine.pdf
Sports Quiz easy sports quiz sports quiz
Microbial disease of the cardiovascular and lymphatic systems
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
RMMM.pdf make it easy to upload and study
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
01-Introduction-to-Information-Management.pdf
Pre independence Education in Inndia.pdf
GDM (1) (1).pptx small presentation for students
Cell Types and Its function , kingdom of life
Supply Chain Operations Speaking Notes -ICLT Program
VCE English Exam - Section C Student Revision Booklet
human mycosis Human fungal infections are called human mycosis..pptx

Database security and 4 topics in it

  • 1. Database Security and 4 topics in it •Customer Accounts: Each Oracle database has a list of legitimate information source customers. •The information source contains several standard records, such as the standard management account SYSTEM (see "SYS and SYSTEM Schemas"). You can make user records as needed.
  • 2. • To accessibility an information source, a person must provide a real username and verification certification. The certification may be a security password, Kerberos solution, or public key facilities (PKI) certification. • Privilege and Part Authorization In common, information source accessibility control includes reducing information accessibility and information source actions.
  • 3. For example, you can limit customers from querying specified platforms or performing specified information source instructions. • A user benefit is the right to run particular SQL claims. Rights can be separated into the following categories: • System privilege This is the right to execute a particular activity in the information source, or execute an activity on any things of a particular type. For example, CREATE USER and CREATE SESSION are system privileges.
  • 4. • Object privilege This is the right to execute a particular activity on an item, for example, question the workers desk. Privilege types are described by the information source. Privileges are provided to customers at the attention of other customers.
  • 5. • Directors should allow privileges to customers so they can achieve projects required for their tasks. Good protection exercise includes allowing a benefit only to a person who needs that benefit to achieve the necessary work. • A role is a known as number of relevant privileges that you allow to customers or other positions. A part helps handle privileges for an information source program or user team.
  • 6. Thus our CR Bridge blogs have been competed over here.