Preview

SQLserverSecurity

Good Essays
Open Document
Open Document
393 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
SQLserverSecurity
SQL Server Security
Chris Sargent
University of Phoenix Online
DBM/502
July 14, 2014 There are a number of ways to secure MS SQL Server 2012. Security measures range from the physical location of the server, to operating system security measures, and finally permissions granted within MS SQL Server 2012. This paper will detail the steps to password protect MS SQL Server 2012 and how to use TSQL to add users with various permissions.
Password Protection
MS SQL server allows two types of logins Windows/operating system authenticated and SQL server authentication. This can be accomplished in either the configuration manager or through TSQL. In this case, the configuration manager will be used to create a user login. This will create a password of the database on a per user instance. Using Windows login will allow permissions based upon Windows groups with assigned privileges. The following steps are used:
1. Open the Microsoft SQL Server Management Studio
2. Right click on Security
3. Select New
4. Select Login
5. Change from Windows Authentication to SQL Server Authentication
6. Either enter or search for a specific user name
7. Enter password
8. Confirm password
9. At the bottom of the dialog box under default database select the database to password.
10. Click ok

User Matrix The below matrix is a listing of three users and what permissions the users would need to work with the database.
User
Read
Insert
Delete
Modify
Database Admin
X
X
X
X
Regular User
X
X

Sales Manager
X

Power User
X
X
X

Add a User With Permissions
Regular User JohnS
TSQL Add user: CREATE LOGIN [software\JohnS]

FROM WINDOWS (uses windows authentication for database engine access)

WITH DEFAULT_DATABASE = [Trucking];
GO

Granting a login to the specific database
USE [Trucking];
GO

CREATE USER [JohnS] FOR LOGIN [software\JohnS];
GO

TSQL Grant permissions Read and Insert:
Grant Read ON Parts_Movement TO JohnS;
GO
Grant Insert on Parts_Movement TO JohnS;
GO



References: Microsoft Developer Network. (2014). Retrieved from http://msdn.microsoft.com/en- us/library/ms365303(v=sql.110).aspx

You May Also Find These Documents Helpful

  • Good Essays

    Whereas SQL Server supports two authentication systems, Microsoft Access supports three. Unfortunately, three is not necessarily better than two, and the Access security system is not suited for large enterprise usage. The most commonly used is Database Password. A database password is simply a password that Access prompts you to type in when opening the database. A database can have only one password. You cannot assign a different password to different users. This…

    • 406 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Pt2520 Unit 6 Lab 1

    • 292 Words
    • 2 Pages

    24. What is the difference between the logical design and the physical design of a database?…

    • 292 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS3350 week 1

    • 287 Words
    • 3 Pages

    9. Security controls and security countermeasures to help protect the Master SQL Database that houses customer privacy data and intellectual property assets.…

    • 287 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    • Designer - user/users group with access rights to change all database information, including data documents and design elements;…

    • 767 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Hollis IS3230 Unit 3 Lab3

    • 766 Words
    • 4 Pages

    2. Describe one way to help prevent unauthorized users from logging onto another person’s user account and accessing his/her data.…

    • 766 Words
    • 4 Pages
    Good Essays
  • Good Essays

    IS3110 U5D1

    • 712 Words
    • 3 Pages

    There are several different types of controls that you can take advantage of for securing your servers. Below are official guidelines from the (National Institute for Standards and Technology), or NIST.…

    • 712 Words
    • 3 Pages
    Good Essays
  • Good Essays

    2) Is it good practice to include the account or user name in the password? Why or why not?…

    • 518 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Week 5 Quiz

    • 531 Words
    • 3 Pages

    Limit what services are running on the server to only what is absolutely needed, use unique id/strong password in combination with principle of least privilege to help prevent unauthorized access, use up-to-date anti-malware software, use firewalls to prevent unauthorized access, use intrusion detection software to monitor for unauthorized access…

    • 531 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Linux Security Lab 2

    • 304 Words
    • 2 Pages

    2. Given a scenereo where there are 5 database admins that may periodically need access to a given system. Discuss a better concept to better manage the admins access permissions.…

    • 304 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Database Sql Server

    • 328 Words
    • 2 Pages

    User access refers to what objects and data in a database a user has permissions to use. True…

    • 328 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Java Project

    • 419 Words
    • 2 Pages

    4) Your system should have at least two levels of access: 1) account holder, and 2) administrator.…

    • 419 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Running Rsa as Service

    • 323 Words
    • 2 Pages

    For the logon account, you must specify a Windows user account that is valid for the…

    • 323 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application. Thus when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and thereby unexpectedly executed. The code for this attack can be inserted from the application by the attacker so the idea behind to avoid sql injection is to analyze the query at the application layer so that the vulnerable code never get executed. We have analyzed that a small piece of code injected from the application could let the user to bypass the login system. So we will analyze the code at the application layer to see that if any malicious sql statements are present then the application would stop that code to be executed by the sql server. The objective of the project is to design a secure layer at the application level so that the whole sql query will be parsed and analyze by the application to see if the query contains any…

    • 1324 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    STEP 1: Download Microsoft® SQL Server® 2008 Management Studio Express and select either SQLManagementStudio_x64_ENU.exe or SQLManagementStudio_x86_ENU.exe depending on your machine’s OS bit-ness.…

    • 569 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Writing Sql Statement

    • 478 Words
    • 2 Pages

    1. 2. Select Start -> MySQL -> MySQL Server 5.1 -> MySQL Command Line Client. Enter password to access the MySQL server. The password is specified when MySQL is installed. 3. Type CREATE DATABASE mydatabase to create the database.…

    • 478 Words
    • 2 Pages
    Good Essays