Share this Page URL

Chapter 19. Implementing Security > On Your Own - Pg. 672

Implementing Security 672 Chapter Summary Securing your data is an important part of an overall database implementation. In this chapter, you learned how to secure your data by allowing only those to whom you gave special permissions to access the database. We explored how to create permissions groups so that sets of users could be assigned rights in a single action rather than by giving each user permission individually. We also learned how to fortify your database to prevent hackers from using special tools to extract data from a database to which they don't have permissions. Finally we saw how various security methods work together to protect your data. Though thinking through security involves an initial investment of time, the return for implementing security can be substantial in terms of preventing loss of intel- lectual property and of time to recreate important data. For more information: · See the articles listed under "Security" in the topic "Security and Privacy," in Microsoft Office Access 2003 Assistance, available through Microsoft Office Online. · Also refer to Microsoft Office Access 2003 Inside Out (Microsoft Press, 2003). Q&A Q1: A1: When I'm creating groups, how do I know what groups to create? There are no set rules on how to create permissions groups. Typi- cally, you will have a set of users that will need to just read data, a set of users that will need to read and write data, and a set of users