
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Computer Based Control in Database
This article will provide a broad review of computer-based controls before moving into the computer-based controls in databases available in a multi-user database system. Let's discuss all of them one by one.
A group of security procedures called computer-based controls are used in DBMSs to safeguard the database against illegal access, alteration, or destruction. These safeguards are intended to guarantee that the database can only be accessed by authorized users and that the data is safe from accidental or deliberate destruction.
Physical controls and administrative processes are only a couple of the several remedies available to deal with threats to computer systems. Despite the wide variety of computer-based protections already in place, it is important to keep in mind that, in most cases, a DBMS's security is only slightly better than that of the operating system because of their close relationship.
There is a computer-based control in the database ?
The majority of them are on this list.
Authorization and Authentication
Access controls
Views
Backup and Recovery
Integrity
Encryption and Decryption
RAID tools
Let's Discuss it one by one ?
Authentication and authorization
The granting of rights or privileges is necessary for a subject (user) to have authorized access to a system or a system's object.
The program can include permission limitations to restrict both the user's access to and usage of specific system species.
Authentication calls for the verification of persons making access requests to objects.
Users must authenticate their identities in order to access databases and be recognized by the database management system.
User authentication in a database environment needs two components.
User ID
Authentication token
The security component uses the user ID to verify the user identify after receiving the proper authentication token (a password known only to the user). When a user is correctly authenticated, the authentication user ID is translated to an authentication ID.
Access Controls
A database system's access restrictions can be configured, for example, by giving and removing privileges. A privilege authorizes the creation of or access to database objects like tables, views, indexes, and so on.
Views
The major objective of this tactic is to offer a flexible and dependable security solution by excluding certain users from seeing certain portions of the database.
A view is an illustration of a virtual table.
A view does not contain any data; rather, it acts as a window through which data from tables may be seen or changed.
A view's foundational databases are simple tables.
Backup and recovery
When a database and its log file are frequently duplicated to the offline storage medium, this is known as a backup.
Using the backup copy and the information gathered in the log file, the database is returned to its prior condition.
Integrity
Data integrity in a database system refers to the accuracy, consistency, and completeness of the data.
Another example is the security of this database. In a relational database system, data integrity can be protected by applying integrity rules or constraints.
There is no loss of data consistency regardless of database modifications.
Encryption and decryption
Encryption is a method used to safeguard sensitive data while it is transferred across a network, such as credit card details.
Encryption can be used to give extra security protection for critical database parts if the DBMS's default security method is insufficient.
If data is not encrypted, it is referred to as plain text.
Data that has been encrypted is referred to as ciphertext.
Encryption is the process of transforming plain text into encrypted text.
Decryption is the process of turning an encrypted message into plain text.
RAID Software
RAID is the abbreviation for "Redundant Array of Independent Disks". The hardware on which the database management system runs must be fault-tolerant since it must function even if one of the hardware components fails.
RAID originally stood for Redundant Array of Inexpensive Disks; however, later on, the letter "I" in RAID came to stand for independence.
RAID levels relate to the many possible disc configurations.
RAID level |
Type |
---|---|
RAID 0 |
Striping without parity or mirroring at the block level |
RAID 1 |
Mirroring without parity or striping |
RAID 2 |
Error-correcting bit-level striping The Hamming code |
RAID 3 |
Striping with dedicated parity at the byte level |
RAID 4 |
Striping with dedicated parity at the block level |
RAID 5 |
Striping using distributed parity at the block level. |
RAID 6 |
Striping at the block level with double distributed parity. |
Conclusion
Computer-based control in databases is necessary to maintain the data's integrity, confidentiality, and availability. It helps to stop unauthorized access, data loss, and corruption by ensuring that the data is accurate and consistent. It is a must for every business that wants to ensure the privacy and security of its data.