Module 5 - DBMS
Module 5 - DBMS
Advantaqsn
)No leg needed
Asabacko
DCPying ouenhead
)FasteH eCOVe
3) Enawnes atomici lG 3).2i6hieutt with concuviehay
Page 5
(otd)
2
Page 1 3
Page 4
Page 2(otd
Page 3
Cuoent dorechony Page G Shadno inecton
updai Page 2(reu
Pog5(ncw) (not upda ted)
(Pant Module. i)
Module - 55. Database Securil
O Authentcaion -’ Enures that ony valid wes
COUn acees the databaae.
DVerifies the idenilË oh the euser to prevent
unawthouised acr Fo
fo database
Techniques
OTP Bfomebric 7Seot
Pas ued Tofeens
Lqin
împortance d Autheieation
)3nveaned data secwity ii) esion maragemont
ii) Psouenta data leak iv) Psoventa nehvork etta cho
2)Authonizahi om ’ i) Detenineo
Determînes what achono |
oenaiems
penhom în database
ii) Conholed woin9 i 4RANT and REvOKE
n SQL.Commands
Audit Trail ’ A A ecod | log that keeps
hrack who did what rd wshen dhe
databae in the
) Database Encyptiom’ The proce» o) convofrg
dala ito in a databae inlo a coded funbuadabi
fomat to phevert unauthoni2ed aeaes
Acces Conel
DBMS. behavimw
DBMS
pateans |puules.
LAN
Firewall Work
stahons
Intonet
PnbusiotecheTDs|
Eaawkachs
DPaotect Qata the}t Dlan genesali fabse yiivos
a) ight mot ynatch neo
a) letecti internal misuse een attacko
3) Need to be
conßiquved Prpenly
sqL Injedion ’ a) A hacking techrigue where
whene an
attache naento malicious
maiio SQL code into a quey
to access manipulata the data
) Enploils seouily fauws.
woling meharisn -’ 1) an opplicaton. BindLy uey
woet iput in am SQL auey , an attacke 9a
medift
tt he qyuniels qeny's meaning
Dasko done uoing sQL snjechon
sq 2Edit