home *** CD-ROM | disk | FTP | other *** search
/ New Perspectives on Computer Concepts / New Perspectives on Computer Concepts.iso / np2010c / page723.pag < prev    next >
Portable Network Graphic  |  2008-10-02  |  124KB  |  817x1045  |  8-bit (256 colors)
Labels: chat room | computer | hakham | laptop | monitor
OCR: DATABASES 655 response to a query typically decreases efficient query processing. com puter hosting database that is constantly queried by hundreds of users would spend most of its processing resources in an endless cycle encryption and decryption. Most active, operational databases are not encrypted while being used, but the data they contain can be encrypted before it is archived. Thieves who gain access to a database archive cannot make sense of the data if it is encrypted. Also, database data that's transmitted over the Web can be encrypted using encryption technologies such as SSL or SHTTP Encryption is useful tool in the security arsenal, but database administra- tors must take additional steps to secure database data What are access controls? An access control limits access to syste ...