Spread Knowledge

Virtual University of Pakistan Video Lectures, Handouts, PPT, Quizzes, Assignments & Papers

CS403 - Database Management Systems - Lecture Handout 39

User Rating:  / 0

Related Content: CS403 - VU Lectures, Handouts, PPT Slides, Assignments, Quizzes, Papers & Books of Database Management Systems

Overview of Lecture

  • Introduction to Views
  • Views, Data Independence, Security
  • Choosing a Vertical and Horizontal Subset of a Table
  • A View Using Two Tables
  • A View of a View
  • A View Using a Function
  • Updates on Views

Views

Views are generally used to focus, simplify, and customize the perception each user has of the database. Views can be used as security mechanisms by allowing users to access data through the view, without granting the users permissions to directly access the underlying base tables of the view.

Read more: CS403 - Database Management Systems - Lecture Handout 39

CS507 - Information Systems - Lecture Handout 34

User Rating:  / 0

Related Content: CS507 - VU Lectures, Handouts, PPT Slides, Assignments, Quizzes, Papers & Books of Information Systems

Types of Controls

Implementation of controls is a critical security feature of information systems. They block and detect various forms of intrusion and protect various components of the entire information systems, are these telecommunication lines or computer software’s and hard wares.

  1. Access Controls – Controlling who can access the system.
  2. Input Controls – Controls over how the data is input to the system.
  3. Communication Controls – Controls over the transfer of data between LAN, WAN or internet.
  4. Processing Controls – controlling the processing of data
  5. Database Controls – Securing the most important asset of the organization
  6. Output controls – controlling the privacy of the data.

Access Controls

These controls establish the interface between the would-be user of the computer system and the computer itself. These controls monitor the initial handshaking procedure of the user with the operating system. For example when a customer enter the card and the pin code in an automatic teller machine (ATM), the access controls are exercised by the system to block unwanted or illegitimate access.

Read more: CS507 - Information Systems - Lecture Handout 34