Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Rights Management and data recovery

2025-03-29 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Database >

Share

Shulou(Shulou.com)06/01 Report--

1. Security mechanism of SQL:

① client Security: system Security

② server security: login to SQL instance security

③ database security: access database security

④ object security: operational security for database objects

2. Server security: security permissions of login account

Verification method:

Windows authentication: the account must be a system account and added as a SQL user

SQL authentication: users created in SQL

Permission settings: valid for the entire instance and managed by roles

Fixed role of the server:

Sysadmin: execute task activities, administrators attribute group

Serveradmin: startup of the management server

Diskadmin: managing disk files

Dbcreator: managing databases

Public: only allowed to log in to the database, the default role of ordinary users, the default database is master

3. Database security:

Acting on a single database, you must become a database user to be authorized, and the login account must be mapped to a database user.

Built-in database users:

Dbo: the creator of the database, and the owner has arbitrary permissions on the data

Guest: guest user, disabled by default

Permission settings: granted through database roles

The main fixed roles are:

Db_datareader: read, query

Db_datawriter: changing permissions

Db_ddladmin: create, delete, change object permissions

Db_owner: owner, arbitrary permission

4. Object-level permissions:

Acting on the specified object, the permissions are more detailed.

5. Backup type:

Full backup: back up all data, log files, etc.

Differential backup: backing up updated data since the last full backup

Transaction log backups: backing up SQL statements

6. Recovery model:

① simple recovery model: only restore data files, do not support log file recovery, can only restore to the data backup point

② full recovery model: can restore data backup or log backup, can restore to the point of failure

③ bulk log recovery model: suitable for mass updates and can only be restored to the backup point

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Database

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report