Lecture 9
Lecture 9
– Physical Level: concerned with securing the site containing the computer
system should be physically secured. The backup systems should also be
physically protected from access except for authorized users.
– Human Level: concerned with authorization of database users for access the
content at different levels and privileges.
– Operating System: concerned with the weakness and strength of the
operating system security on data files. Weakness may serve as a means of
unauthorized access to the database. This also includes protection of data in
primary and secondary memory from unauthorized access.
– Database System: concerned with data access limit enforced by the database
system. Access limit like password, isolated transaction and etc.
• Even though we can have different levels of security and authorization on
data objects and users, who access which data is a policy matter
rather than technical.
Authentication