Saved Bookmarks
| 1. |
Match the description to the method below for protecting databases. Methods may match more thanone description.Method: Privilege managementRecords may be restrictedPermissions are set via internal access controlsIntegration with system security is possibleData is extracted from tablesLogging is a common implementationActivity may be monitored and acted upon |
|
Answer» Answer: Match the description to the method below for PROTECTING databases. Methods may match more than one description. iction Method: Triggers c Database FUNDAMENTALS DBA Role of Views in SECURITY Drver Database Fundamentals w of Database Security Database Fundamentals SQL y Concepts so Security "rivilege Records may be restricted Permissions are set via internal access controls Activity may be MONITORED and acted upon Integration with system security is possible Logging is a common implementation Froduction Data is extracted from tables Please make me as Brainliest |
|