Safeguarding Data Privacy by Placing Multi-level Access Restrictions

Main Article Content

Lakshmi Bhaskarla


People always tend to protect assets regardless of what they are. For example, a user may keep a memorable picture of his parents in a safe place. However, the degree of protection he provides is directly based on how much he values the assets. If the user highly value the picture of his great-grandparents, he might take an extra measure of precaution by copying it and placing it in a fireproof safe where it is guarded from most natural disasters and from theft, or he may just put it in a frame because he has many similar pictures or because he can reproduce it. Usage of Database management systems to store information in every aspect of an enterprise is rapidly growing. Every company need to protect all tangible assets like valuable information stored in a DBMS is often vital to the business interests of the organization and is regarded as a corporate asset of the company that must be protected. There is no doubt that a password is the key to opening a user account. The Stronger the password, the longer it takes a hacker to break in. User authentication depends on a password to ensure the user account’s identity. Since organizations increase their implementation of database systems as the key data management technology for regular operations and decision making, the security of data managed by these systems is an important task.

Article Details

How to Cite
, L. B. “Safeguarding Data Privacy by Placing Multi-Level Access Restrictions”. International Journal on Recent and Innovation Trends in Computing and Communication, vol. 6, no. 6, June 2018, pp. 227-9, doi:10.17762/ijritcc.v6i6.1662.