You are on page 1of 3

Database Security

User IDs
Composed of name and password.
These are created first in order to setup security to
database.
It varies enormously from Database Management
System to Database Management System.
This allows an entity to perform actions in the database.
User IDs

Security Domain
The actions (privileges and roles) available to the user.
The tablespace quotas (available disk space) for the user.
The system resource limits (for example, CPU processing
time) for the user.
Database Security

Objects
The SQL standard defines security in terms of objects to
which actions are performed.
In the SQL1 standard, the only objects that security is
applied are tables and views.

You might also like