Security of database file access

To avoid unauthorized access to the database computer you must first disable anonymous log in. Secondly, you should enable the logging system of the computer to have audit system to check out any abnormal dial-in and/or log-in. This would suffer a little CPU resource. Thirdly, you can assign rights/privileges to some experienced database administrator and also enable the logging of write records for auditing any intended/unintended data overwrite mistakes. Again, this would also consume CPU time.

    Requires Free Membership to View

This was first published in July 2001

Join the conversationComment

Share
Comments

    Results

    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.

    Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.