You are on page 1of 11

Navdeep Kaur

Assistant Professor

1
Team :DBMS
Lecture :DBMS Security Model
DAC
MAC
RBAC
Access Control
The security mechanism of DBMS must include some provisions for
restricting access to the data base by unauthorized users
Access control is done by creating user accounts and to control login
process by the DBMS
So, that database access of sensitive data is possible only to those
people (database users) who are allowed to access such data and to
restrict access to unauthorized persons
The database system must also keep the track of all operations
performed by certain user throughout the entire login time
Access Control Models
DAC
MAC
RBAC
Access Control Models
DAC
Discretionary Access Control (DAC):
In DAC, the owner of data determines who can access
specific resources.
DAC
Access Control Models
Mandatory Access Control (MAC):
A control model in which access rights are regulated by a
central authority based on multiple levels of security
Any operation by any subject on any object is tested
against the set of authorization rules (aka policy) to
determine if the operation is allowed
MAC
Access Control Models

Role-Based Access Control (RBAC):


RBAC allows access based on the job title.
For example, there should not be permissions for human
resources specialist to create network accounts
RBAC
RBAC

You might also like