IndexAuthenticationAuthorizationEncryptionChange Tracking"The database security community has developed multiple techniques and approaches to ensure data confidentiality, availability, and integrity. Key database security concepts include authentication, encryption, authorization and modification trackingSay no to plagiarism. Get a tailor-made essay on "Why violent video games should not be banned" Get an original essayAuthenticationIt is the process of identifying or confirming the identity of one person The method of confirming the identity of an individual can be capitalized through the validation of one's documents and the verification of the authenticity of the digital certificate. Authentication involves verifying the validity of at least one specific identification , which includes single-factor verification, multi-factor validation, and two-factor authentication and secure authentication. Most applications use two-factor authentication, where two independent factors are used to identify a user and at the same time two factors must not share a common vulnerability. In most two-factor authentication schemes, passwords are used as the first factor and smart cards or other encryption devices are used as the second factor. In addition to two-factor authentication, there are many types of authentication methods such as biometric authentication, token-based authentication, and certificate-based authentication. All of these types of authentication play a similar role in confirming a person's identity. Authentication helped confirm the identity of people and the authenticity of products. Authorization It is the progression of allowing or denying admission to a secure system. In most cases, cybersecurity schemes are based on verification and authorization. The purpose is to stipulate the admission to rights to data security-related assets. Authorization determines what a user can do on the database. Through authorization, you can control access to your data by unwanted users. Using GRANT, DENY and REVOKE we can give permission on database objects. Authorization is critical to ensuring that security systems are kept secure and free from disruption by intruders. Encryption Encryption is the progression of indoctrinating posts and data so that only accredited people can have access to the information or messages. The encryption scheme uses an algorithmically generated pseudo-random key to prevent intruders from evaluating unauthorized data and messages. There are two categories of encryption, including symmetric key and public key. The difference between symmetric key and public key is that public key is free while symmetric key is private and purchasable. Authentication is also performed using encryption. The decrypted key is required to perform decryption on the encryption data. Tracking ChangesThe trivial clarification provides mechanisms for applications. To ensure that query implementation for data changes and information access is related to changes, it is essential that application developers implement custom change tracking. Applications leverage change detection to determine the type of rows that have changed for a user table. To configure change tracking, you can use SQL Server Management Studio. To track changes, you need to enable tracking"
tags