Database two- factor authentication and secure authentication. . Most

Database SecurityConceptsThedatabase security community has developed multiple techniques and approaches toensure that there is data confidentiality, availability, and integrity.

Theprincipal database security concepts include authentication, encryption,authorization and change tracking.  AuthenticationItis the process of identifying or confirming the identity of a person. Themethod of confirming the identity of an individual can be capitalized throughvalidating their documents and through verifying the authenticity of thedigital certificate.

Best services for writing your paper according to Trustpilot

Premium Partner
From $18.00 per page
4,8 / 5
4,80
Writers Experience
4,80
Delivery
4,90
Support
4,70
Price
Recommended Service
From $13.90 per page
4,6 / 5
4,70
Writers Experience
4,70
Delivery
4,60
Support
4,60
Price
From $20.00 per page
4,5 / 5
4,80
Writers Experience
4,50
Delivery
4,40
Support
4,10
Price
* All Partners were chosen among 50+ writing services by our Customer Satisfaction Team

Authentication involves testing the validity of at least aspecific identification.  There aredifferent types of identification, which includes single-factor verification,multi-factor validation, two- factor authentication and secure authentication. . Most of theapplications use two-factor authentication, in which two independent factorsare used to identify a user and at the same time two factors should not share acommon vulnerability. In most of the two-factor authentication schemespasswords are used as the first factor and smart cards or other encryptiondevices are used as the second factor.

Apart from the two-factor authenticationthere are many types of authentication methods like biometric authentication,Token-Based authentication and certificate based authenticationAll these kinds of authentication play a similar role of confirming theidentity of a person.. Therefore, authentication has helped in confirming theidentity of people and authenticity of products (Johnson & Smith, 2006).EncryptionEncryption is the progressionof indoctrinating posts and data in such a way that only the accreditedindividuals can have access to the information or messages.

The scheme ofencryption employs pseudo-random key generated by algorithms to preventintruders from assessing unauthorized data and messages. There are two categoriesof encryption including symmetric key and public key. The difference betweensymmetric key and the public key is that public key is free while the symmetrickey is private and it is purchasable. Encryption is also used to carry outother tasks such as authentication.

 AuthorizationItis the progression of permitting or rejecting admission to a secure system.Mostly, the computer safety schemes are based on verification andauthorization. It is the purpose of stipulating admits to rights to assets interrelatedto data safety. By using the GRANT, DENY and REVOKE we can give authorizationon database objects. Therefore, authorization is vital in ensuring thatsecurity systems are kept secure and free from interruption from intruders (Johnson& Smith, 2006).Change trackingThetrivial clarification provides mechanisms for applications. To ensure thatimplementation of the query for changes of data and access to information isrelated to changes, it is essential for application developers to implementcustom change tracking. Applications capitalize change tracking in determiningthe type of rows that have been changed for a user table.

To configure changetracking, there is the usage of SQL Server management studio. To track changes,there is the need of enabling change tracking and then would allow tables to betracked within the database (Silberschatz, Korth & Sudarshan, 2007).