Sep 21

Build security into your systems part 1

Developers and network administrators must assume the responsibility for managing security in the design and deployment of their database files, and for managing security on a routine basis, in a large company and small business. If you are running a home business, you need to make sure that you have enough security and back ups in place in the event of major mishaps, theft, and acts of nature, including human nature.
Restrict access with accounts and privilege sets
The primary way to protect your files is to define accounts and privileges in whatever database solution you decide to opt for.

It’s a good practice to restrict access to every file, with an Admin password that only you know. This will protect files if other security measures have been bypassed.
Any  database solution you choose should have detailed instructions for doing this.
Accounts authenticate users who are attempting to open a protected file.
•Each account specifies an account name and (optimally) a password.
•Each database file contains two predefined accounts: Admin and Guest. The Admin account, which should be renamed for better security, is assigned the Full Access privilege set.
The Guest account, which cannot be renamed, permits users to open a file without providing an account name and password. By default, the Guest account is assigned the Read-Only Access privilege set, but you can assign a different privilege set in Accounts and Privileges.
•For maximum security, create a unique account for each user.
Privilege sets specify a level of access to a database file. Each database file contains three predefined privilege sets: Full Access, Data Entry Only, and Read-Only Access.
•Each account is assigned one privilege set, which determines the level of access when someone opens a file using that account.
•You can create privilege sets to limit database access, such as which layouts and menus are available, and whether printing is permitted. Privilege sets can also restrict access to records or fields from particular tables within a file.
Extended privileges determine the data sharing options that are permitted by a privilege set. You can enable privileges to access files shared with a network, via Instant Web Publishing, Custom Web Publishing with XML or XSLT, from clients, and so on. Again, depending on which solution you choose, you will have a variety of options.
All extended privileges should be disabled by default.
For maximum security, create accounts that require user names and passwords for all files. Take advantage of the most robust security features by requiring users to change passwords after a specified duration and specifying a minimum character length for passwords.

Leave a Reply