zoukankan      html  css  js  c++  java
  • Database Security: Application Access Assessment

    Most users do not access a database by directly logging into the database system.

    Instead they access the database through an application program.

    A simple tool, known as a security (or CRUD) matrix can be used to explicitly identify the required access rights needed by an application program.

    Specifically, the security matrix provides a visual depiction of the correlation between the operations or authorizations needed for database objects and input/output sources such as forms and reports.

    Operations depicted in a security matrix include Select, Create (insert), Update,and Delete.

    The top row of the matrix lists database table objects.

    Application programs are listed in the left-most column.

    The letters C, R, U, D are placed in intersecting cells to identify the type of access required by a particular program.

    Any given cell may contain any combination of these letters or none at all.

    An empty cell denotes that a program does not need access to the intersecting table.

    Conversely, a cell with all four letters, CRUD, needs full access to the table.

  • 相关阅读:
    游标+递归 查询 客户 子客户 查询财务信用
    导入EXCEL
    ftp读取txt数据并插入数据库
    查询通话时间报表
    4.10上午
    4.7下午
    4.6下午
    4.6上午
    4.5上午
    4.1下午
  • 原文地址:https://www.cnblogs.com/hbuwyg/p/11031352.html
Copyright © 2011-2022 走看看