ABSTRACT
Database security refers to protecting the database from user operations that, by their nature would compromise the integrity or security of the database. Some off these
problems are caused by user carelessness for example; a user update leaving the database in the state violates one of its integrity constraints. Other problems are caused by
malicious user behaviors, for example, a user accessing information he/she is not authorized to obtain; or even modify data with malicious intent In Mukwano there was a problem of careless scheduling of concurrent database accesses especially when two or more users attempt to access or change the same data. As a result of such problems, user actions perfectly legitimate in their own right might have unlimited consequences, leaving the database in a state inconsistent with reality. Because
of such problems, we used the two modes that is windows authentication and mixed mode which has both windows authentication and SQL server authentication. It is emphasized that, with windows authentication, there is no need to have to specify a login name and password, to connect to SQL Server but instead, access to SQL Server is controlled by Windows operating system or the group to which a particular account belongs. With SQL server authentication it is only the database administrator to make changes to the Database using login as seen in chapter four.
TABLE OF CONTENTS
Declaration j
Approval jj
Dedication jjj
Acknowlegment iv
Table of contents v
Acronyms vii
Abstract viii
CHAPTER ONE
INTRODUCTION 1
1.0 General Introduction 1
1.1 Background of the Study 1
1.2 Background of Mukwano Industry 2
1.3 Statement of the Problem 3
1.4 Objectives of the Study 3
1.4.1 General Objective 3
1.4.2 Specific Objectives 3
1.5 Scope of the Study 4
1.6 Significance of the Study 4
CHAPTER TWO 6
LITERATURE REVIEW 6
2.0 Introduction 6
2.1 Forms of Database Security! Access Controls 6
2.2 Need for Database Protection and How it can Improve Employee Integrity 6
2.3 Disadvantages of Unprotected Data on Employee Integrity 8
2.4 Developing a Database Security 9
2.5 Designing a System for Database Security 11
2.6 Testing System for Validity 12
CHAPTER THREE 16
METHODOLOGY 16
3.0 Introduction 16
3.1 Research Design 16
3.2 Study Population and Size 16
3.3 Research Instruments 16
3.4.1 Interview 17
3.5 Design Techniques and Tools 17
3.6 Methodology for Development of System 17
3.7 System Development Tools 19
3.7.1 Programming Languages (s) and Tools 19
3.7.2 Operating System 19
3.7.3 Database Management Systems (DBMS) 20
CHAPTER FOUR 21
DESIGN IMPLEMENTATION 21
v
CHAPTER FIVE .37
REFERENCES 38
CONCLUSION 42
APPENDIX (A): INTERVIEW 46
APPENDIX(B) 47
Research, S. (2022). Enhancing Database Security And Integrityfor Employees In An Organisation A Casestudy Of Mukwano Industry, Makindye Division.. Afribary. Retrieved from https://track.afribary.com/works/enhancing-database-security-and-integrityfor-employees-in-an-organisation-a-casestudy-of-mukwano-industry-makindye-division
Research, SSA "Enhancing Database Security And Integrityfor Employees In An Organisation A Casestudy Of Mukwano Industry, Makindye Division." Afribary. Afribary, 03 Sep. 2022, https://track.afribary.com/works/enhancing-database-security-and-integrityfor-employees-in-an-organisation-a-casestudy-of-mukwano-industry-makindye-division. Accessed 27 Nov. 2024.
Research, SSA . "Enhancing Database Security And Integrityfor Employees In An Organisation A Casestudy Of Mukwano Industry, Makindye Division.". Afribary, Afribary, 03 Sep. 2022. Web. 27 Nov. 2024. < https://track.afribary.com/works/enhancing-database-security-and-integrityfor-employees-in-an-organisation-a-casestudy-of-mukwano-industry-makindye-division >.
Research, SSA . "Enhancing Database Security And Integrityfor Employees In An Organisation A Casestudy Of Mukwano Industry, Makindye Division." Afribary (2022). Accessed November 27, 2024. https://track.afribary.com/works/enhancing-database-security-and-integrityfor-employees-in-an-organisation-a-casestudy-of-mukwano-industry-makindye-division