There are following types of users: § Database Administrators § Security Officers § Network Administrators § Application Developers § Application Administrators § Database Users
they are people who interact with a database system in different ways and they are as follow 1- end users 2-database designers 3- database administrators 4- application programmers
Database comes from the end user or the database users. Combining all the data database system is formed.
database software
Sam (security account database)database is used control local users and groups for work group model
database
Ability of a database to allow multiple users to access information at the same time
4 Types of Database Users Users are differentiated by the way they expect to interact with the system: · Application programmers - interact with system through DML calls. · Sophisticated users - form requests in a database query language. · Specialized users - write specialized database applications that do not fit into the traditional data processing framework. · Naive users - invoke one of the permanent application programs that have been written previously.FROM: Database Systems Concepts 1.17 Silberschatz, Korth and Sudarshan c1997
Database auditing involves observing a database so as to be aware of the actions of database users. Database administrators and consultants often set up auditing for security purposes.
A centralised database is a single database under the control of a single Database Management System. All users and client applications connect directly to the DBMS. This means that the database is stored in only one location and everyone in the system is directly connected to it. Unlike a distributeddatabase which is a set of connected databases stored on multiple computers that appears to users as a single database.
A centralized database contains all the data tables in one place which all users access. A decentralized database creates copies of the database design in different areas and any given copy contains only that data which is relevant to its particular users.
Limited audit log settings