Control methods of Database Security Last Updated : 15 Dec, 2021 Comments Improve Suggest changes 18 Likes Like Report Database Security means keeping sensitive information safe and prevent the loss of data. Security of data base is controlled by Database Administrator (DBA). The following are the main control measures are used to provide security of data in databases: 1. Authentication 2. Access control 3. Inference control 4. Flow control 5. Database Security applying Statistical Method 6. Encryption These are explained as following below. Authentication : Authentication is the process of confirmation that whether the user log in only according to the rights provided to him to perform the activities of data base. A particular user can login only up to his privilege but he can’t access the other sensitive data. The privilege of accessing sensitive data is restricted by using Authentication. By using these authentication tools for biometrics such as retina and figure prints can prevent the data base from unauthorized/malicious users. Access Control : The security mechanism of DBMS must include some provisions for restricting access to the data base by unauthorized users. Access control is done by creating user accounts and to control login process by the DBMS. So, that database access of sensitive data is possible only to those people (database users) who are allowed to access such data and to restrict access to unauthorized persons. The database system must also keep the track of all operations performed by certain user throughout the entire login time. Inference Control : This method is known as the countermeasures to statistical database security problem. It is used to prevent the user from completing any inference channel. This method protect sensitive information from indirect disclosure. Inferences are of two types, identity disclosure or attribute disclosure. Flow Control : This prevents information from flowing in a way that it reaches unauthorized users. Channels are the pathways for information to flow implicitly in ways that violate the privacy policy of a company are called convert channels. Database Security applying Statistical Method : Statistical database security focuses on the protection of confidential individual values stored in and used for statistical purposes and used to retrieve the summaries of values based on categories. They do not permit to retrieve the individual information. This allows to access the database to get statistical information about the number of employees in the company but not to access the detailed confidential/personal information about the specific individual employee. Encryption : This method is mainly used to protect sensitive data (such as credit card numbers, OTP numbers) and other sensitive numbers. The data is encoded using some encoding algorithms. An unauthorized user who tries to access this encoded data will face difficulty in decoding it, but authorized users are given decoding keys to decode data. Create Quiz Comment H hasani Follow 18 Improve H hasani Follow 18 Improve Article Tags : DBMS Explore Basics of DBMSIntroduction of DBMS6 min readHistory of DBMS7 min readDBMS Architecture 1-level, 2-Level, 3-Level6 min readDifference between File System and DBMS6 min readER & Relational ModelIntroduction of ER Model9 min readStructural Constraints of Relationships in ER Model5 min readGeneralization, Specialization and Aggregation in ER Model4 min readIntroduction of Relational Model and Codd Rules in DBMS14 min readKeys in Relational Model6 min readMapping from ER Model to Relational Model5 min readStrategies for Schema design in DBMS6 min readRelational AlgebraIntroduction of Relational Algebra in DBMS8 min readSQL Joins (Inner, Left, Right and Full Join)4 min readJoin operation Vs Nested query in DBMS3 min readTuple Relational Calculus (TRC) in DBMS4 min readDomain Relational Calculus in DBMS4 min readFunctional Dependencies & NormalisationAttribute Closure in DBMS4 min readArmstrong's Axioms in Functional Dependency in DBMS4 min readCanonical Cover of Functional Dependencies in DBMS7 min readNormal Forms in DBMS5 min readThe Problem of Redundancy in Database3 min readLossless Join and Dependency Preserving Decomposition4 min readDenormalization in Databases4 min readTransactions & Concurrency ControlACID Properties in DBMS5 min readTypes of Schedules in DBMS5 min readConcurrency Control in DBMS3 min readGraph Based Concurrency Control Protocol in DBMS3 min readMultiple Granularity Locking in DBMS3 min readDatabase Recovery Techniques in DBMS4 min readDeadlock in DBMS4 min readAdvanced DBMSIndexing in Databases6 min readIntroduction of B Tree8 min readIntroduction of B+ Tree5 min readBitmap Indexing in DBMS3 min readInverted Index7 min readSQL Queries on Clustered and Non-Clustered Indexes6 min readFile Organization in DBMS4 min readPractice QuestionsLast Minute Notes - DBMS15+ min readDBMS Interview Questions with Answers15+ min readCommonly asked DBMS Interview Questions | Set 25 min readDatabase Management System - GATE CSE Previous Year Questions2 min read Like