User Authority Policy to protect Databases{1}

The conference article  i read, titled ” A MIS Security Strategy Based on Client/Server Architecture,” is mainly about database security. The key point the author tries to get across is that the best way to defend against attacks to establish an authority policy that meets the practical needs of the database. What the authority policy is is a creation of tables that allow users to enter their information, whether it be their name, id number, or any other form of identification, and when entered correctly it allows them to access that database. The user authority policy also only allows certain individuals to access only parts of a database, so that way there is less chance of an intrusion.

This article relates to what we discussed in class because we use databases and tables within the database. When we start using databases to manage company information, it will be important to protect it, and using user authority policies can be a great step in maintaining the systems integrity

The reason i enjoyed this article was because it was easy to understand, and allowed me to relate to exactly what the article was saying. Creating tables and adding information to them is something we did in previous projects, and this journal article shows how it can be used to protect our databases.

Source: Zhang Yufang; Xiong Zhongyang; , “An MIS security strategy based on client/server architecture,” High Performance Computing in the Asia-Pacific Region, 2000. Proceedings. The Fourth International Conference/Exhibition on , vol.2, no., pp.676-677 vol.2, 14-17 May 2000
doi: 10.1109/HPC.2000.843523 retrieved from