Explain the following database security features: (i) Authorization (ii) Authentication

      

Explain the following database security features:
(i) Authorization
(ii) Authentication

  

Answers


gregory
(i) Authorization
It involves determining the access rights to various system resources (hardware e.g. printers,
disk drives, etc or programs e.g. payroll applications, inventory applications, etc).
Authorization is done by an authorization policy, which defines activities permitted or
prohibited within the system. Authorization mechanisms implement the authorization policy
and includes directory of access rights, access control lists (ACL) and access tickets or
capabilities.
(ii) Authentication
It involves verification of the identity of the subject (Are you who you say you are? Prove it!).
The most common form of authentication is the password based access control.
gregorymasila answered the question on November 23, 2017 at 12:51


Next: Describe the functional components of a typical computer system
Previous: State and explain the levels of measurement in Psychology.

View More Computer Science Questions and Answers | Return to Questions Index


Exams With Marking Schemes

Related Questions