Describe the scenario select which protection operations


Scholarly Activity

Using the SQL for Dummies textbook in an Online Library, refer to Table 3-4 "Types of Protection" on page 74 to create three scenarios in which the use of protection operations are used to secure a database.

Describe the scenario, select which protection operations users should use in the scenario, and then explain your selection.

Your paper should be three pages in length. All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations, and cited per APA guidelines.

Table 3-4 summarizes the SQL statements that you use to grant and revoke privileges.

Table 3-4 Types of Protection Statement- pg. 74 below

Protection operation Statement

Enable user to see a table GRANT SELECT

Prevent user from seeing a table REVOKE SELECT

Enable user to add rows to a table GRANT INSERT

Prevent user from adding rows to a table REVOKE INSERT

Enable user to change data in table rows GRANT UPDATE

Prevent user from changing data in table rowsREVOKE UPDATE

Enable user to delete table rows GRANT DELETE

Prevent user from deleting table rows REVOKE DELETE

Enable user to reference a table GRANT REFERENCES

Prevent user from referencing a table REVOKE REFERENCES

Enable user to use a domain, character set, translation, or collationGRANT USAGE ON DOMAIN, GRANT USAGE ON CHARACTER SET, GRANT USAGE ON COLLATION, GRANT USAGE ON TRANSLATIONON CHARACTER SET, GRANT USAGE ON COLLATION, GRANT USAGE ON TRANSLATION

Prevent user from using a domain, character set, collation, or translationREVOKE USAGE ON DOMAIN, REVOKE USAGE ON CHARACTER SET, REVOKE USAGE ON COLLATION, REVOKE USAGE ON TRANSLATION

Book- Taylor, Allen G. SQL For Dummies, Wiley, 2013. ProQuest Ebook Central

Solution Preview :

Prepared by a verified Expert
Computer Network Security: Describe the scenario select which protection operations
Reference No:- TGS02658956

Now Priced at $20 (50% Discount)

Recommended (94%)

Rated (4.6/5)