Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Consider a scenario of IT infrastructure where all employees can access the resources from a centralized server. The server stores the database of employees such
Consider a scenario of IT infrastructure where all employees can access the resources from a
centralized server. The server stores the database of employees such as employee details
EMPDetails and login credentials EMPLogins of the employees to the centralized server.
Then assume that you are a database administrator who can set authentication and authorization
for employees logins and privileged connecting to the database resided in the server.
EMPDetails table will contain attributes as EID, ENAME, designation, email, mobile,
address, bankaccno
EMPLogins table will contain attributes as EID, LoginID password
a LoginID should be automatically created as EID@mycom.org and password should
be automatically created as EID@ using trigger.
The EMPLogins table should not be accessible by the employees.
Employees can be given with a privilege to view their own details.
As an administrator, create a view of EMPDetails where the mobile and bankaccno of an
employee are deidentified and protect EMPLogins from active directory attacks. write down the mysql commands and insert some values into both tables and show the proper output of the commands using the inserted values and use ecryption commands like kyring, datamasking for step where the mobile and bankaccno of an employee are deidentified
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started