Repository logo
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Suomi
  • Svenska
  • Türkçe
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Yкраї́нська
  • Log In
    New user? Click here to register.Have you forgotten your password?
Repository logo
  • Communities & Collections
  • All of DSpace
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Suomi
  • Svenska
  • Türkçe
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Yкраї́нська
  • Log In
    New user? Click here to register.Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "Masaba, Rita"

Now showing 1 - 1 of 1
Results Per Page
Sort Options
  • Loading...
    Thumbnail Image
    Item
    Enhancing database security and integrity for employees in an organization a case study of mukwano industry, Makindye division.
    (Kampala International University,School of Computing and Information Technology, 2010-06) Nantanda, Irene Robinnah; Masaba, Rita
    Database security refers to protecting the database from user operations that, by their nature would compromise the integrity or security of the database. Some off these problems are caused by user carelessness for example; a user update leaving the database in the state violates one of its integrity constraints. Other problems are caused by malicious user behaviors, for example, a user accessing information he/she is not authorized to obtain; or even modify data with malicious intent In Mukwano there was a problem of careless scheduling of concurrent database accesses especially when two or more users attempt to access or change the same data. As a result of such problems, user actions perfectly legitimate in their own right might have unlimited consequences, leaving the database in a state inconsistent with reality. Because of such problems, we used the two modes that is windows authentication and mixed mode which has both windows authentication and SQL server authentication. It is emphasized that, with windows authentication, there is no need to have to specify a login name and password, to connect to SQL Server but instead, access to SQL Server is controlled by Windows operating system or the group to which a particular account belongs. With SQL server authentication it is only the database administrator to make changes to the Database using login as seen in chapter four.

KIU INSTITUTIONAL REPOSITORY copyright © 2002-2025

  • Cookie settings
  • Privacy policy
  • End User Agreement
  • Send Feedback