?
Solved

Database Security

Posted on 2003-03-21
5
Medium Priority
?
147 Views
Last Modified: 2013-12-04
I'm building a database at home for use by several others workers at my place of employment and the database will be placed on a server there.  Do I create the database securty while I'm building the database at home and then move it to the server, or will I need to put the security in place after the database is on the server?   Is the built in MS Access security safe for this type of database.  This database will be storing things like SSN's and only a few workers will be using it but it will be located on a server where several hundered workers have the use of.
0
Comment
Question by:syldania
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
5 Comments
 
LVL 11

Accepted Solution

by:
ghana earned 100 total points
ID: 8180077
If this is a MS Access database you can put the database file(s) in a folder on the server with restricted access. Then the built in Windows file system security (NTFS) will prevent unauthorized access.
0
 
LVL 12

Assisted Solution

by:trywaredk
trywaredk earned 100 total points
ID: 8181192
Supply GHANA's advice with built-in Ms Access security.

Wait until you place the database at the server, because you have to use the servers system.mdw-file

Don't copy the servers system.mdw-file to your home-workstation, and do it there.

Any changes on the servers system.mdw-file will be lost, when you copy your system.mdw-file from home-workstation back to the server.

Many Regards

Jorgen Malmgren
IT-Supervisor
Denmark

:o) Your brain is like a parachute. It works best when it's open
0
 

Expert Comment

by:CleanupPing
ID: 9070641
syldania:
This old question needs to be finalized -- accept an answer, split points, or get a refund.  For information on your options, please click here-> http:/help/closing.jsp#1 
EXPERTS:
Post your closing recommendations!  No comment means you don't care.
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This is a guide to the following problem (not exclusive but here) on Windows: Users need our support and we supporters often use global administrative accounts to do this. Using these accounts safely is a real challenge. Any admin who takes se…
Many people tend to confuse the function of a virus with the one of adware, this misunderstanding of the basic of what each software is and how it operates causes users and organizations to take the wrong security measures that would protect them ag…
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…
In this video, Percona Solution Engineer Dimitri Vanoverbeke discusses why you want to use at least three nodes in a database cluster. To discuss how Percona Consulting can help with your design and architecture needs for your database and infras…
Suggested Courses
Course of the Month8 days, 12 hours left to enroll

765 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question