Security of database file access

This member-submitted tip explains how to avoid unauthorized access to the database computer.

To avoid unauthorized access to the database computer you must first disable anonymous log in. Secondly, you should enable the logging system of the computer to have audit system to check out any abnormal dial-in and/or log-in. This would suffer a little CPU resource. Thirdly, you can assign rights/privileges to some experienced database administrator and also enable the logging of write records for auditing any intended/unintended data overwrite mistakes. Again, this would also consume CPU time.
This was last published in July 2001

Dig Deeper on Network Security Best Practices and Products

PRO+

Content

Find more PRO+ content and other member only offers, here.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchSDN

SearchEnterpriseWAN

SearchUnifiedCommunications

SearchMobileComputing

SearchDataCenter

SearchITChannel

Close