chapter 10Database Security

Security has become an essential consideration in modern systems. In addition to the potential damage from database security breaches, nothing can be more embarrassing to an organization than a media story regarding sensitive data or trade secrets that were electronically stolen from their computer systems. In this chapter, we will discuss the need for security, the security considerations for deploying database servers and clients that access those servers, and methods for implementing database access security. We conclude with a discussion of security monitoring and auditing.


In this chapter, the reader should:

• Know why security is necessary.

• Understand database server security issues and precautions, ...

Get Databases DeMYSTiFieD, 2nd Edition, 2nd Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.