The normal database-privilege mechanisms are based on the GRANT and REVOKE statements, which Granting Privileges discusses. However, you can sometimes use the facilities of the operating system as an additional way to control access to a database.
No matter what access controls the operating system gives you, when the contents of an entire database are highly sensitive, you might not want to leave it on a public disk that is fixed to the computer. You can circumvent normal software controls when the data must be secure.
When you or another authorized person is not using the database, it does not have to be available online. You can make it inaccessible in one of the following ways, which have varying degrees of inconvenience:
Instead of removing the entire database directory, you can copy and then erase the files that represent individual tables. Do not overlook the fact that index files contain copies of the data from the indexed column or columns. Remove and erase the index files as well as the table files.
Home | [ Top of Page | Previous Page | Next Page | Contents | Index ]