Open In App

Computer based control in Database

In this article, we will discuss the overview of computer-based controls and will discuss computer-based control available in a multi-user database environment in detail. Let’s discuss it one by one.

Overview :
The different forms of countermeasure to threats on the computer systems from physical controls to the managerial procedure. In spite of the range of the computer-based controls that are pre-existing, it is nothing that the security of DBMS is good as that of an operating system, due to close associate among them. Today, a lot of computer-based controls are available in a multi-user database environment.  



Computer-based control available in the database :
Most of them are as follows.

Let’s discuss it one by one.



Authorization and Authentication :

  1. User ID
  2. Authentication token

Access controls :

Views :

Backup and recovery :

Integrity :

Encryption and Decryption :

RAID tools :

S.No. RAID level Type
1. RAID 0 Non-redundant.  
2. RAID 1 Mirrored
3. RAID 2 Error-correcting codes
4. RAID 3 Bit- Interleaved parity
5. RAID 4 Block Interleaved parity
6. RAID 5 Block-Interleaved distributed party
7. RAID 6 It is an extension of leave 5
Article Tags :