- Data security is the protection of the data from unauthorized users.
- Only the authorized users allowed to access the data.
- Most of the users allowed to access a part of database i.e., the data that is related to them or related to their department.
- Mostly, the DBA or head of department can access all the data in the database.
- Some users may permit only to retrieve data, whereas other allowed to retrieve as well as to update data.
- The database access controlled by the DBA.
- He/she creates the accounts of users and gives rights to access the database.
- Users or group of users are given usernames protected by passwords.
- The user enters his/her account number (or username) and password to access the data from the database.
For example, if you have an account in the “yahoo.com” (a popular website), then you have to give your correct username and password to access your account or e-mail. Similarly, when you insert your ATM card into the Automated Teller Machine (ATM), the machine reads your ID number printed on the card and then asks you to enter your pin code (or password). In this way, you can access your account.
- Data security defines a prevention of data corruption through the use of controlled access mechanisms.
- Moreover, Data security deals with protection of data.
- Also, Data security is making sure only the people who should have access to the data are the only ones who can access the data.
- Data security refers to the making sure that data is accessed by its intended users, thus ensuring the privacy and protection of data.
- Authentication/authorization, encryptions, and masking are some of the popular means of data security.
- Data integrity defines a quality of data, which guarantees the data is complete and has a whole structure.
- So, Data integrity deals with the validity of data.
- Moreover, Data integrity is making sure the data is correct and not corrupt.
- Data integrity refers to the structure of the data and how it matches the schema of the database.
- Backing up, designing the suitable user interface and error detection/correction in data are some of the means to preserve integrity.