15 Dec 2022

75

Relationship Between Users and Roles in Databases

Format: APA

Academic level: College

Paper type: Research Paper

Words: 523

Pages: 2

Downloads: 0

The relationship between users and roles in databases can be seen from the fact that roles seek to provide some form of template that would help in the assignment of permissions to the individual database users. The relationship reflects more on the fact that each user must be assigned a specified role while manipulating a database, especially in ensuring that the information in the database is not damaged or stolen. User functions may differ depending on the expectations of the user with regard to handling the database with some users have both read and write privileges, others having the read or write only privileges. That serves as a clear indication of the fact that roles seek to play a critical role towards defining the extent to which a user would be able to manipulate a database.

On the other hand, it can also be argued that the relationship reflects more on the fact that users are assigned roles, which seek to define the permissions that they would have when manipulating the database. When assigning permissions, the administrators do not assign permissions to users but assign them to roles. That means that if a user is assigned a given task, he or she would have a clear guideline of what he or she is expected to do as part of the manipulation process of the database. Users may have varied roles depending on the assignment by the database administrators. That serves as a clear aspect that seeks to highlight the existing relationship between users and roles while considering their usability as part of the manipulation of a database.

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

The main reason why administrators use roles rather than merely assigning rights and privileges to each user is to help in maintaining data security, especially when dealing with highly confidential data. One of the key challenges that companies and organizations are facing revolves around the issue of data security, as it becomes essential for them to consider all aspects of advancing overall security. By assigning rights and privileges to an individual user, the companies seek to expose themselves to high possibilities of infiltration, as a third party may seek to use the user’s credentials to access private data. Consequently, this creates the need for having to use roles, which seek to create limitations in terms of what the users would be able to do concerning their manipulation of the database. The outcome is that this serves as a guarantee that the database administrators would be in a favorable position that would allow for limitation of access to private data.

When dealing with new hires, the primary expectation for the administrator is that they would be given minimal roles, which, in most cases, is read-only in a bid to ensuring that they are not able to manipulate the data in a manner that adversely affect the company. However, as the hires rise in their positions within the company, they would be accorded extra roles, which may include writing privileges, meaning that they would be able to change the data within the database. In the case of job changes, one of the critical expectations is that administrators would be expected to revoke all user credentials from an employee that is leaving the firm or company. That seeks to ensure that the former employees would not access data that they would use in other companies or manipulate the data negatively.

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 16). Relationship Between Users and Roles in Databases.
https://studybounty.com/relationship-between-users-and-roles-in-databases-research-paper

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Security Implication of the Internet of Things

The Internet of Things (IoT) can be described as s system of interconnected devices that have the ability to transfer information over a computer network without the need of human-to-computer or human-to-human...

Words: 892

Pages: 3

Views: 96

Modern Day Attacks Against Firewalls and VPNs

Introduction The need to have an enhanced security of the computer connectivity happens to be one of the reasons that attract companies and organizations towards wide usage of VPNs. Several simple techniques...

Words: 2025

Pages: 7

Views: 134

How to Deploy and Administer Windows Server 2012

Securing a reliable, and expandable configuration for a company is important to build a strong network. The new and enhanced features of the Windows Server 2012 can be used to implement the network. In this...

Words: 1673

Pages: 6

Views: 87

Deployment Model in Cloud Computing

Deployment model is a representation of a cloud environment primarily distinguished by parameters such as accessibility, proprietorship, and storage size. The National Institute of Standards and Technology gives the...

Words: 254

Pages: 1

Views: 81

How to Use Web Search Engines for Business Research

The advancement of technology has made it possible for many people around the world to have easy access to information whenever they want. The development of the Wide World Web-enabled different kinds of information...

Words: 773

Pages: 3

Views: 86

Distributed Database Management System (DDBMS)

Introduction Data management has been a headache to many technology enthusiasts for quite a long period of time. They have successfully managed to logically collect interrelated data and share it. If the data is...

Words: 799

Pages: 3

Views: 127

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration