Enhancing Database Security And Integrityfor Employees In An Organisation A Casestudy Of Mukwano Industry, Makindye Division.

ABSTRACT

Database security refers to protecting the database from user operations that, by their nature would compromise the integrity or security of the database. Some off these

problems are caused by user carelessness for example; a user update leaving the database in the state violates one of its integrity constraints. Other problems are caused by

malicious user behaviors, for example, a user accessing information he/she is not authorized to obtain; or even modify data with malicious intent In Mukwano there was a problem of careless scheduling of concurrent database accesses especially when two or more users attempt to access or change the same data. As a result of such problems, user actions perfectly legitimate in their own right might have unlimited consequences, leaving the database in a state inconsistent with reality. Because

of such problems, we used the two modes that is windows authentication and mixed mode which has both windows authentication and SQL server authentication. It is emphasized that, with windows authentication, there is no need to have to specify a login name and password, to connect to SQL Server but instead, access to SQL Server is controlled by Windows operating system or the group to which a particular account belongs. With SQL server authentication it is only the database administrator to make changes to the Database using login as seen in chapter four.


TABLE OF CONTENTS

Declaration j

Approval jj

Dedication jjj

Acknowlegment iv

Table of contents v

Acronyms vii

Abstract viii

CHAPTER ONE

INTRODUCTION 1

1.0 General Introduction 1

1.1 Background of the Study 1

1.2 Background of Mukwano Industry 2

1.3 Statement of the Problem 3

1.4 Objectives of the Study 3

1.4.1 General Objective 3

1.4.2 Specific Objectives 3

1.5 Scope of the Study 4

1.6 Significance of the Study 4

CHAPTER TWO 6

LITERATURE REVIEW 6

2.0 Introduction 6

2.1 Forms of Database Security! Access Controls 6

2.2 Need for Database Protection and How it can Improve Employee Integrity 6

2.3 Disadvantages of Unprotected Data on Employee Integrity 8

2.4 Developing a Database Security 9

2.5 Designing a System for Database Security 11

2.6 Testing System for Validity 12

CHAPTER THREE 16

METHODOLOGY 16

3.0 Introduction 16

3.1 Research Design 16

3.2 Study Population and Size 16

3.3 Research Instruments 16

3.4.1 Interview 17

3.5 Design Techniques and Tools 17

3.6 Methodology for Development of System 17

3.7 System Development Tools 19

3.7.1 Programming Languages (s) and Tools 19

3.7.2 Operating System 19

3.7.3 Database Management Systems (DBMS) 20

CHAPTER FOUR 21

DESIGN IMPLEMENTATION 21

v

CHAPTER FIVE .37

REFERENCES 38

CONCLUSION 42

APPENDIX (A): INTERVIEW 46

APPENDIX(B) 47