users and roles in database

profilekumar9
OriginalityReport.pdf

7/28/2019 Originality Report

https://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/originalityReport/ultra?attemptId=2f315153-03be-4838-82ae-54e96bf6e2cb&course_id=_44437_1&i… 1/4

%76

%2

SafeAssign Originality Report Database Security - 201950 - CRN165 - Rucker • Week 4 Paper

%78Total Score: High risk Sailendra Manne

Submission UUID: 6eb5d3aa-e0e7-5abe-902b-eceffd64ff7d

Total Number of Reports

1 Highest Match

78 % Week 4 assignment.docx

Average Match

78 % Submitted on

07/28/19 04:29 PM PDT

Average Word Count

633 Highest: Week 4 assignme…

%78Attachment 1

Institutional database (7)

Student paper Student paper Student paper

Student paper Student paper Student paper

Student paper

Global database (1)

Student paper

Top sources (3)

Excluded sources (0)

View Originality Report - Old Design

Word Count: 633 Week 4 assignment.docx

2 8 4

5 3 6

1

7

2 Student paper 8 Student paper 4 Student paper

7/28/2019 Originality Report

https://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/originalityReport/ultra?attemptId=2f315153-03be-4838-82ae-54e96bf6e2cb&course_id=_44437_1&i… 2/4

Source Matches (18)

Student paper 75% Student paper 70%

Database – Users and Roles

Introduction

For any company in the modern era, databases are the gemstones for every repository of private, sensitive and valued business data and infor- mation. Any business that is thriving is mandated to supply timely and precise data and also protect them. However, security avails a crucial com- petitive edge for every functioning database (Rafiq, 2014). Nonetheless, every database provider must prioritize data protection in order to get loyal customers. The customers, in turn, get to trust the established system that is meant to protect their valued data. Relationship between users and roles in the database

Roles can be defined as a collective group of privileges. However, privileges are a permission that allows a user to perform a command on any database project. Privileges can be granted to users or roles.in this case a role can be a database user, group or both. Database objects can be owned by roles and also allocate privileges on those objects. Roles can, however, be affiliates of additional roles: hence, a member role can take over the object privileges of its primary role. When using roles, one should avoid manual grant sets of privileges that are user to user. It merely means administrator role should not be granted to numerous users. Super-users can permit and revoke privileges to users using an administrator role. The relationship between roles and users present much flexibility when granting and revoking the privileges to and from users. A cumula- tive effect comes about when allowing privileges to roles and users and also allowing roles to users. The implication of numerous grant instructions is a blend of the entire individual grant commands (Settles, 2016).

Why roles are used

There are various reasons why roles are used rather than just assigning rights and privileges to every individual user. Role-based permissions add a layer of categorization on top of what is granted by user-based access. The users are still offered with a login and passcode. Nonetheless, their access is not just governed on an individual point, but rather role-based access enables it for users to be allocated to groups that are subse- quently assigned specific abilities. These groups include super users, administrators or managers. The advantages of this approach are that it is far easier to edit user abilities since changing consents of a particular role will alter the configurations for all users allocated that role. How- ever, roles are easy to change eg, adding a page and deciding only admins can access it is more straightforward as changing the admin role (Soniya, 2018).

How to handle new hires and job changes

When hiring new employees and making job changes, one should only grant privileges to users who need such privilege to accomplish their du- ties. Granting unnecessarily excessive privileges to a new employee can compromise security. This is because system privileges are powerful. Moreover, databases by default are configured to stop users from performing any system privileges. Changing passwords from time to time could be useful in maintaining robust database security. Conclusion

Information or data in any database is essential and most customers prioritize privacy a lot. Any leakages to the outside world of important informa- tion could lead to lawsuits and may result in a downfall of the company involved.

References

Rafiq, M. I., Lei, C. H., Kapoor, V., Keefe, T. F., Agarwal, N., Baby, T.,... & Pesati, V. R. (2014). U.S. Patent No. 8,667,018. Washington, DC: U.S. Patent and Trademark Office.Retrieved from https://patents.google.com/patent/US8667018B2/en

Settles, C. (2016, March 18). Role-based Access vs. User-based Access. Retrieved from https://technologyadvice.com/blog/information-tech- nology/role-based-access-vs-user-based-access/ Soniya. (2018, August 24). Understanding Users, Privileges, and Roles. Retrieved from https://www.vertica.com/blog/understanding-users-privileges-roles/

1

2

3

2

4

2

2 2

5 2

6

2 2

7

2 8 2

1

Student paper

Database – Users and Roles

Original source

Users and Roles

2

Student paper

For any company in the modern era, databases are the gemstones for every repository of private, sensitive and valued business data and infor- mation. Any business that is thriving is mandated to supply timely and precise data and also protect them.

Original source

For any organization, databases are the gemstones for repositories of very sensitive, private, and valued business data Thriving businesses are mandated to supply precise and timely data, in addition, to protect them as well

7/28/2019 Originality Report

https://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/originalityReport/ultra?attemptId=2f315153-03be-4838-82ae-54e96bf6e2cb&course_id=_44437_1&i… 3/4

Student paper 100%

Student paper 75%

Student paper 82%

Student paper 68%

Student paper 85%

Student paper 92%

Student paper 76%

Student paper 70%

Student paper 90%

Student paper 100%

3

Student paper

Relationship between users and roles in the database

Original source

The relationship between users and roles in Database

2

Student paper

Roles can be defined as a collective group of privileges. However, privi- leges are a permission that allows a user to perform a command on any database project. Privileges can be granted to users or roles.in this case a role can be a database user, group or both. Database objects can be owned by roles and also allocate privileges on those objects.

Original source

On the other hand, roles can be de- fined as a group of privileges Privi- leges are a kind of permission that allows the user to perform a com- mand on a database object There- fore, a role can be a group, database user or both Database objects can be owned by roles and can allocate privileges on those objects to other roles to govern entrée to the objects

2

Student paper

Roles can, however, be affiliates of additional roles: hence, a member role can take over the object privi- leges of its primary role.

Original source

In addition, roles can be affiliates of additional roles therefore a member role can take over object privileges of its original role

4

Student paper

When using roles, one should avoid manual grant sets of privileges that are user to user.

Original source

The situation means using roles to avoid having to grant different sets of privileges user by the user

2

Student paper

The relationship between roles and users present much flexibility when granting and revoking the privileges to and from users. A cumulative ef- fect comes about when allowing privileges to roles and users and also allowing roles to users. The im- plication of numerous grant instruc- tions is a blend of the entire individ- ual grant commands (Settles, 2016).

Original source

Therefore the relationship between user and roles presents flexibility and convenience when revoking or granting privileges to and from users Allowing object privileges to roles and users and allowing roles to users, results to a cumulative effect The implication of numerous grant instructions is a blend of the entire individual grant commands (Settles, 2016)

2

Student paper

There are various reasons why roles are used rather than just assigning rights and privileges to every individ- ual user. Role-based permissions add a layer of categorization on top of what is granted by user-based access.

Original source

There are several reasons why roles are used rather than just assigning rights and privileges to every individ- ual user Role-based permissions serve to add an additional layer of categorization on top of what is granted by user-based access

2

Student paper

Nonetheless, their access is not just governed on an individual point, but rather role-based access enables it for users to be allocated to groups that are subsequently assigned spe- cific abilities.

Original source

Users are still offered with a login and passcode, nevertheless, instead of their access being governed on an individual point, role-based access enables it for users to be allocated to groups that are subsequently as- signed specific abilities

5

Student paper

These groups include super users, administrators or managers.

Original source

Examples of common groups in- clude administrators, managers, su- per-users, users, etc

2

Student paper

The advantages of this approach are that it is far easier to edit user abili- ties since changing consents of a particular role will alter the configu- rations for all users allocated that role. However, roles are easy to change eg, adding a page and decid- ing only admins can access it is more straightforward as changing the ad- min role (Soniya, 2018).

Original source

The advantages of this approach are that it is far easier to edit user abili- ties in bulk since changing consents of a particular role will alter the con- figurations for all users allocated that role Therefor roles are easy to change, for instance, adding a page and deciding only admins can access it is easier as changing the admin role (Soniya, 2018)

6

Student paper

How to handle new hires and job changes

Original source

How to Handle New Hires and Job Changes

7/28/2019 Originality Report

https://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/originalityReport/ultra?attemptId=2f315153-03be-4838-82ae-54e96bf6e2cb&course_id=_44437_1&i… 4/4

Student paper 90%

Student paper 70%

Student paper 70%

Student paper 100%

Student paper 100%

Student paper 100%

2

Student paper

When hiring new employees and making job changes, one should only grant privileges to users who need such privilege to accomplish their duties. Granting unnecessarily ex- cessive privileges to a new employee can compromise security.

Original source

one should only grant privileges to users who need such privilege to ac- complish their duties Granting un- necessarily excessive privileges to a new employee can compromise security

2

Student paper

Moreover, databases by default are configured to stop users from per- forming any system privileges.

Original source

Because system privileges are pow- erful, databases by default are con- figured to deter non-administrative users from performing any system privileges

7

Student paper

Patent and Trademark Office.Re- trieved from https://patents.google.com/patent/U S8667018B2/en

Original source

Retrieved from https://patents.- google.com/patent/US9058371B2/en Veal, A

2

Student paper

(2016, March 18). Role-based Access vs. User-based Access.

Original source

(2016, March 18) Role-based Access vs User-based Access

8

Student paper

Retrieved from https://technolo- gyadvice.com/blog/information-tech- nology/role-based-access-vs-user- based-access/ Soniya.

Original source

Retrieved from https://technolo- gyadvice.com/blog/information-tech- nology/role-based-access-vs-user- based-access/ Soniya

2

Student paper

(2018, August 24). Understanding Users, Privileges, and Roles. Re- trieved from https://www.vertica.- com/blog/understanding-users-privi- leges-roles/

Original source

(2018, August 24) Understanding Users, Privileges, and Roles Re- trieved from https://www.vertica.- com/blog/understanding-users-privi- leges-roles/