answersLogoWhite

0

System security is OS level security like you have username password to logon on your system.

Database security is db level security governed by your database software.like you have different schemas that have different passwords.You can decide grants and permissions for various db objects based on these db level users.

User Avatar

Wiki User

15y ago

What else can I help you with?

Related Questions

What security features of the operating system can be used to simplify the design of the database management system?

A)What security features of the operating system can be used to simplify the design of the database management system?


Who is responsible for database security?

Each database can have a security administrator who is in charge of enforcing and maintaining the database security policy. If the database system is small, the database administrator may also have security administrator responsibilities. To learn more about data science please visit- Learnbay.co


How is a database different from a database management system?

A database is simply the data that has been stored in tables. A database management system includes all the elements that are required to work with the database. This would include things like the language to write queries, facilities for creating reports, controls over security and access of data and other elements.


What is a mixed database?

A mixed database is a system that contains different records that are set up in different files. This means that the database system will run several workloads simultaneously.


What are the uses of database program?

Database system can be defined as the collection of interrelated data. Uses of database system are that it maintains data security , data integrity, data can be easily accessed and shared too.


When would you mirror databases and when would you use databases tailored for the local environment?

You would mirror a database when you have a distributed database management system (DDBMS). especially in different countries with different time zones to allow users perform insert, update and delete operations to avoid inconsistency in database values. This is a security and disaster management implementation.


What are users and actors of database system?

they are people who interact with a database system in different ways and they are as follow 1- end users 2-database designers 3- database administrators 4- application programmers


How the database approach and the nondatabase approach differ in terms of ensuring the security of the database?

The database approach implements security through centralized controls like access permissions, encryption, and auditing features directly within the database management system (DBMS), allowing for more robust and systematic protection of data. In contrast, the nondatabase approach relies on external methods such as operating system security, file system permissions, and application-level controls, which can lead to fragmented security and increased vulnerability. The database approach typically offers more granular access control and comprehensive monitoring capabilities, while the nondatabase method may lack integration and consistency in security measures. Overall, the database approach tends to provide a more cohesive and effective framework for ensuring data security.


What is a user name in a database?

It can refer to someone who can use the database. There may be security on it, meaning they have to log on to use it or do some things with it. They would be given an account, and as part of that they would have a user name an a password.


What are the responsibilities of DBA and the database designers?

The responsibilities of the DBA and the database designers is to prevent conflict of data between different departments and to ensure the security of the data.


The concept of security and integrity in database are interrelated Discuss how the two affect database system?

The concept of security in a database involves protecting the system and its data from unauthorized access, alteration, or destruction. This ensures that only authorized users have access to the database and that the data remains confidential. On the other hand, integrity refers to maintaining the accuracy, consistency, and reliability of the data within the database. An important aspect of integrity is ensuring that data is not modified or accessed inappropriately, maintaining its quality and reliability. Overall, security measures help maintain data integrity, as unauthorized access or modifications can compromise the integrity of the data within the database system.


What are the advantage of distributed database over centralized database?

The database can be of two types either distributed or centralized . In distributed database the data is in different systems. In centralized database the data is in a single central system.We can categorize database as either distributed or centralized . In centralized database the data is in a single centralized system. While In distributed database the data is in different systems .