Welcome to class!
In today’s class, we will be talking about database security: definition and explanation, access control and encryption. Enjoy the class!
Definition of data security
Data security is the practice of keeping data protected from corruption and unauthorized access. The focus behind data security is to ensure privacy while protecting personal or corporate data.
It is a means of putting in place the different form of information security controls to protect database against compromise of their confidentiality, integrity and availability.
This will enable you to identify the risks you are faced with and what could happen if valuable data is lost through theft, malware infection or a system crash.
Since data can be compromised in many ways, the best security against misuse or theft involves a combination of technical measures, physical security and a well-educated staff. You should implement clearly defined polices into your infrastructure and effectively present them to the staff.
Types of data security control
It is the selective restriction of access to a place or other resource. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization.
Database auditing involves observing a database so as to be aware of the actions of database users. Database administrators and consultants often set up auditing for security purposes, for example, to ensure that those without the permission to access information do not access it.
It is the validation control that allows you to log into a system, email or blog account etc. Once logged in, you have various privileges until logging out. Some systems will cancel a session if your machine has been idle for a certain amount of time, requiring that you prove authentication once again to re-enter. You can log in using multiple factors such as a password, a smart card or even a fingerprint.
This security mechanism uses mathematical scheme and algorithms to scramble data into unreadable text. It can only be decoded or decrypted by the party that possesses the associated key.
This is the process of making copy and archiving of computer data in the event of data loss which is used to restore the original data.
This is sequence of secret characters used to enable access to a file, program, computer system and other resources.
- Explain data security.
- Explain types of security control on data that you know
In our next class, we will be talking about Database Security: Importance, Integrity and Availability, the Role of a Database Administrator. We hope you enjoyed the class.
Should you have any further question, feel free to ask in the comment section below and trust us to respond as soon as possible.Pass WAEC, JAMB, POST-UTME & more in One Sitting for FREE!💃