tailieunhanh - Controlling User Access - les13
After completing this lesson, you should be able to do the following: Create users Create roles to ease setup and maintenance of the security model Use the GRANT and REVOKE statements to grant and revoke object privileges Create and access database links | Controlling User Access Schedule: Timing Topic 20 minutes Lecture 20 minutes Practice 40 minutes Total Objectives After completing this lesson, you should be able to do the following: Create users Create roles to ease setup and maintenance of the security model Use the GRANT and REVOKE statements to grant and revoke object privileges Create and access database links Lesson Aim In this lesson, you learn how to control database access to specific objects and add new users with different levels of access privileges. Controlling User Access Database administrator Users Username and password Privileges Controlling User Access In a multiple-user environment, you want to maintain security of the database access and use. With Oracle server database security, you can do the following: Control database access Give access to specific objects in the database Confirm given and received privileges with the Oracle data dictionary Create synonyms for database objects Database security can be . | Controlling User Access Schedule: Timing Topic 20 minutes Lecture 20 minutes Practice 40 minutes Total Objectives After completing this lesson, you should be able to do the following: Create users Create roles to ease setup and maintenance of the security model Use the GRANT and REVOKE statements to grant and revoke object privileges Create and access database links Lesson Aim In this lesson, you learn how to control database access to specific objects and add new users with different levels of access privileges. Controlling User Access Database administrator Users Username and password Privileges Controlling User Access In a multiple-user environment, you want to maintain security of the database access and use. With Oracle server database security, you can do the following: Control database access Give access to specific objects in the database Confirm given and received privileges with the Oracle data dictionary Create synonyms for database objects Database security can be classified into two categories: system security and data security. System security covers access and use of the database at the system level, such as the username and password, the disk space allocated to users, and the system operations that users can perform. Database security covers access and use of the database objects and the actions that those users can have on the objects. Privileges Database security: System security Data security System privileges: Gaining access to the database Object privileges: Manipulating the content of the database objects Schemas: Collections of objects, such as tables, views, and sequences Privileges Privileges are the right to execute particular SQL statements. The database administrator (DBA) is a high-level user with the ability to grant users access to the database and its objects. The users require system privileges to gain access to the database and object privileges to manipulate the content of the objects in the database. Users can also be given the .
đang nạp các trang xem trước