In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-03-29 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Database >
Share
Shulou(Shulou.com)06/01 Report--
1. Security mechanism of SQL:
① client Security: system Security
② server security: login to SQL instance security
③ database security: access database security
④ object security: operational security for database objects
2. Server security: security permissions of login account
Verification method:
Windows authentication: the account must be a system account and added as a SQL user
SQL authentication: users created in SQL
Permission settings: valid for the entire instance and managed by roles
Fixed role of the server:
Sysadmin: execute task activities, administrators attribute group
Serveradmin: startup of the management server
Diskadmin: managing disk files
Dbcreator: managing databases
Public: only allowed to log in to the database, the default role of ordinary users, the default database is master
3. Database security:
Acting on a single database, you must become a database user to be authorized, and the login account must be mapped to a database user.
Built-in database users:
Dbo: the creator of the database, and the owner has arbitrary permissions on the data
Guest: guest user, disabled by default
Permission settings: granted through database roles
The main fixed roles are:
Db_datareader: read, query
Db_datawriter: changing permissions
Db_ddladmin: create, delete, change object permissions
Db_owner: owner, arbitrary permission
4. Object-level permissions:
Acting on the specified object, the permissions are more detailed.
5. Backup type:
Full backup: back up all data, log files, etc.
Differential backup: backing up updated data since the last full backup
Transaction log backups: backing up SQL statements
6. Recovery model:
① simple recovery model: only restore data files, do not support log file recovery, can only restore to the data backup point
② full recovery model: can restore data backup or log backup, can restore to the point of failure
③ bulk log recovery model: suitable for mass updates and can only be restored to the backup point
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.