Content deleted Content added
Vicent-ustb (talk | contribs) |
Tag: Reverted |
||
Line 13:
* Policy-based access control
* Fine-grained authorization
[https://www.softwarequery.com/2021/06/database-security.html Database security access points* OS * DBMS* Data Files * DataData Integrity violation processSecurity gaps are points at which security is missing, and the system is vulnerable. Vulnerability is a state in which an object can potentially be affected by a force or another object or even a situation but not necessarily is or will be. The threat is defined as a security risk that has a high possibility of becoming a system breach.]
==Components==
|