Background Database Security | Database Management System

Background Database Security | Database Management System

Background Database Security : As computing has evolved, different ways of transferring data between database Systems and users have also evolved. There are now three common architectures for database-backed systems.

  1. A direct connection to a computer on which ail work is performed.
  2. A client/server two-tier) architecture.
  3. A thin client (three-tier) architecture.

In the first approach, the database software, database(s), application code, and everything else is housed locally on one machine, as depicted below.

 

Direct Connection to Database Server

In the Second approach, the database software and the database(s) are placed on one platform and the application code is placed on a client or personal computer. In this scenario, queries are carried to the server and data is carried back to the PC by a special querying program, such as Oracle’s SOL Net product. Part of the processing is done on the database server, and part is done on the workstation. The latter mostly includes managing the display and user interface, and application processing that is independent of the database. This second architecture is depicted below.

Client/server Architecture

The latest type of architecture uses a low-capacity workstation as the first tier. This workstation does not actually run the application but only manages displaying the GUI and accepting input from users. It may do more processing by downloading code into the client. The second tier is the Application Server, which holds and executes the applications using some programming language to communicate with the Workstations. The applications executing on this server Communicate with the database server, the third tier, using the protocols of the database. In terms of Security, the three-tier architecture is useful in many ways, it enables minimal Security requirements on the client side, higher security requirements on the application server, and varying amounts of security requirements on the back end database servers.

 

Thin-client Architecture