Scholarly Activity
Using the SQL for Dummies textbook in an Online Library, refer to Table 3-4 "Types of Protection" on page 74 to create three scenarios in which the use of protection operations are used to secure a database.
Describe the scenario, select which protection operations users should use in the scenario, and then explain your selection.
Your paper should be three pages in length. All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations, and cited per APA guidelines.
Table 3-4 summarizes the SQL statements that you use to grant and revoke privileges.
Table 3-4 Types of Protection Statement- pg. 74 below
Protection operation Statement
Enable user to see a table GRANT SELECT
Prevent user from seeing a table REVOKE SELECT
Enable user to add rows to a table GRANT INSERT
Prevent user from adding rows to a table REVOKE INSERT
Enable user to change data in table rows GRANT UPDATE
Prevent user from changing data in table rowsREVOKE UPDATE
Enable user to delete table rows GRANT DELETE
Prevent user from deleting table rows REVOKE DELETE
Enable user to reference a table GRANT REFERENCES
Prevent user from referencing a table REVOKE REFERENCES
Enable user to use a domain, character set, translation, or collationGRANT USAGE ON DOMAIN, GRANT USAGE ON CHARACTER SET, GRANT USAGE ON COLLATION, GRANT USAGE ON TRANSLATIONON CHARACTER SET, GRANT USAGE ON COLLATION, GRANT USAGE ON TRANSLATION
Prevent user from using a domain, character set, collation, or translationREVOKE USAGE ON DOMAIN, REVOKE USAGE ON CHARACTER SET, REVOKE USAGE ON COLLATION, REVOKE USAGE ON TRANSLATION
Book- Taylor, Allen G. SQL For Dummies, Wiley, 2013. ProQuest Ebook Central