Oracle has always been a leader in the database field due to its good data security and stability. "Shangguan Oracle Getting Started to Mastering Video Tutorial" is designed for database developers and introduces Oracle from scratch. In addition to basic SQL syntax, it also brings you custom functions and stored procedures that are necessary in the database development process.
Course playback address: http://www.php.cn/course/549.html
The teacher’s teaching style:
The teacher’s lectures are simple, clear, layer-by-layer analysis, interlocking, rigorous argumentation, rigorous structure, and use the logical power of thinking to attract students’ attention Strength, use reason to control the classroom teaching process. By listening to the teacher's lectures, students not only learn knowledge, but also receive thinking training, and are also influenced and infected by the teacher's rigorous academic attitude
The more difficult point in this video is the security of the database:
Database security control
User identification and identification
User identification and identification are the most important features provided by the system. Outer security measures. The method is for the system to provide a certain way for users to identify their identity or name. Every time a user requests to enter the system, the system will verify it and provide machine usage rights only after passing the authentication.
User Identification (User Identification)
Use a user name or user identification number (UID) to indicate the user's identity. The system internally records the identification of all legal users, and the system identifies whether this user is a legal user.
Password
In order to further verify the user, the system often requires the user to enter a password. The system checks the password to authenticate the user.
Access Control
The most important point of database security is to ensure that only qualified users are authorized to access the database, and at the same time, all unauthorized users cannot access the data. This is mainly through Implementation of database access control mechanism.
The access control mechanism mainly consists of two parts:
1. Define user permissions and register user permissions in the data dictionary.
2. Legal authority check
Includes discretionary access control (DAC) and mandatory access control (MAC). The simple definition of these two methods is:
In In the autonomous access control method, users have different access rights to different database objects, and different users also have different rights to the same object, and users can also transfer their access control rights to other users. Discretionary access control is therefore very flexible.
In the mandatory access control method, each database object is marked with a certain confidentiality level, and each user is also granted a certain level of license. For any user, only users with legal licenses can access, so the forced access method is stricter.
Discretionary Access Control (DAC) method
User permissions mainly consist of two elements: database objects and operation types. In a database system, defining access permissions is called authorization.
1. Security functions of database
a) User identification and authentication. User identification and authentication provide the outermost layer of security protection measures. The method is that the system provides certain methods for users to Identify your name or identity. All legal user IDs are recorded internally in the system. Every time you request to enter the system, the system will verify it. Only after passing the authentication will the right to use the machine be provided
b) Access control : Database access control is to ensure that only qualified users can access the database, while preventing all unauthorized people from accessing the data. The database system provides two access control mechanisms, autonomous access control and strong access control. In the autonomous access control method, users have different permissions on different database objects, and different users also have different permissions on the same object. Permissions, strong access control, mean that the database is divided into certain secret levels. Each user is granted a certain level of license. Only legal users can access. Strong access control is equivalent to the previous mandatory access control model (MAC ), autonomous access control is equivalent to the previous autonomous access control (DAC), see Access Control Technology
for detailsThe database mode includes the creation of database SCHEMA, basic table TABLE, view VIEW and index INDEX. Autonomous access control mainly grants permissions to users through the GRANT statement and revokes permissions through the REVOKE statement. ###
The above is the detailed content of Detailed introduction of Shangguan Oracle’s video tutorials from getting started to mastering. For more information, please follow other related articles on the PHP Chinese website!