Click here to monitor SSC
SQLServerCentral is supported by Red Gate Software Ltd.
 
Log in  ::  Register  ::  Not logged in
 
 
 

Articles with tag security Rss

Search for any content tagged security

<< Newer    Items 41 to 60 of 528    Older >>
 

Unprotected Queries

There are over half a million database servers out on the Internet without protection. How can this happen?  Read more...
By Steve Jones 2012/11/06 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 461 reads

SQL Server Reporting Services 2012 Permissions

As you begin developing reports for deployment to a Report Server, what security considerations need to be taken into account in order to grant users access to run a report.  Read more...
By Additional Articles 2012/10/31 | Source: MSSQLTips.com | Category: reporting services (ssrs)
Rating: (not yet rated)  Rate this |   Briefcase | 3,054 reads

Protecting the SQL Server Backup folder

I want to backup my SQL Server databases to a folder, but I want to minimize who has access to the folder. In other words, I want to make sure that members of the Windows Local Administrators group don't get to the backups without intentionally trying to bypass the security. How do I do that?   Read more...
By Additional Articles 2012/10/02 | Source: SQLServerCentral.com | Category: security
Rating: (not yet rated)  Rate this |   Briefcase | 2,873 reads

Database Security Survey

A database security survey for a CS student. If you can spare a few minutes, I know he'd appreciate it.   Read more...
By Press Release 2012/09/26 | Source: SQLServerCentral.com | Category: survey
Rating: (not yet rated)  Rate this |   Briefcase | 1,784 reads

Rewrite the Coding Rules

If we rewrite the coding rules, will software be more secure? Steve Jones thinks it might and that we should be constantly looking to change the techniques, patterns, and skills we have.  Read more...
By Steve Jones 2012/09/24 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 182 reads

Data Worms

Worms have been around a long time in computer systems. However changes in the global policies of governments and the possible retaliation for cyber warfare should have DBAs concerned.  Read more...
By Steve Jones 2012/09/20 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 140 reads

Make a Backup First

The hack on a Gizmodo writer using Amazon and Apple customer service security holes was shocking. Steve Jones notes that while security is important, backups are even more important.  Read more...
By Steve Jones 2012/08/22 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 154 reads

Separate Accounts

Security is a complex process, one that is becoming more and more important to DBAs all the time. This week Steve Jones wants to know how security is handled for your service accounts.   Read more...
By Steve Jones 2012/08/10 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 181 reads

How to Audit Login Changes on a SQL Server

I've been charged with coming up with a quick solution to audit login changes on my SQL Servers. However, there's no budget so I'm going to have to come up with basic scripts and the like to do the work. Is this tip we cover a solution for you to audit login changes.  Read more...
By Additional Articles 2012/08/06 | Source: MSSQLTips.com | Category: auditing
Rating: (not yet rated)  Rate this |   Briefcase | 2,248 reads

Issues Determining an Individual SQL Server User's Permissions

Recently I was supporting a third party application. It queries to determine what tables it has permissions to before it proceeds with the rest of its functionality. We had implemented permissions based on the best practice of creating roles, assigning the permissions to the roles, and then making the users members of the roles. The application was querying INFORMATION_SCHEMA.TABLE_PRIVILEGES and of course didn't find any permissions directly against the user in question. We ended up granting explicit permissions to the user so the application would work, but I'm more interested in the general case. How can I determine permissions for an individual user?  Read more...
By Additional Articles 2012/08/02 | Source: MSSQLTips.com | Category: security
Rating:  Rate this |   Briefcase | 2,521 reads

Performance Data

Great DBAs collect all kinds of metrics on their instances and let them manage themselves. However many administrators need help monitoring and interpreting the data. Today Steve Jones asks if you think this data needs extra security or is it less of an issue than other PII data.  Read more...
By Steve Jones 2012/07/27 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 340 reads

Security is Improving

Today Steve Jones notes that security is improving at many web sites. It's not great, but it's improving. That's a good sign, or is it?   Read more...
By Steve Jones 2012/07/23 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 100 reads

Write Better Code

Better security can be achieved by writing better code. Steve Jones agrees, but doesn't think it's as easy as it sounds.  Read more...
By Steve Jones 2012/07/16 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 212 reads

SQL Triggers in a Security Context

This article will show you how to use user-defined triggers to supplement your security policies, preventing unauthorised data manipulation and blocking unfriendly logins.  Read more...
By Derek Colley 2012/07/12 | Source: SQLServerCentral.com | Category: sql server
Rating: |  Discuss |   Briefcase | 3,801 reads

Security and Honesty

Today Steve Jones talks security and the need for us to share information about issues, especially those that impact security.  Read more...
By Steve Jones 2012/07/02 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 122 reads

Password Help

Passwords control most of our access to computer systems and provide some level of authentication, but their security depends heavily on their strength and privacy. Steve Jones says you can set a good example for others and hemp improve security on all systems.  Read more...
By Steve Jones 2012/06/28 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 208 reads

We Need to Learn Encryption

With all the recent worms and attacks out there, it's only a matter of time before someone focuses more on databases. With that in mind, Steve Jones thinks it's important we learn and use encryption and better security now.  Read more...
By Steve Jones 2012/06/13 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 237 reads

Securing the Tabular BI Semantic Model

This paper introduces the security model for tabular BI semantic models in SQL Server 2012. You will learn how to create roles, implement dynamic security, configure impersonation settings, manage roles, and choose a method for connecting to models that works in your network security context.  Read more...
By Additional Articles 2012/06/07 | Source: Microsoft MSDN | Category: tabular model
Rating: (not yet rated)  Rate this |   Briefcase | 2,032 reads

New Security Holes

Siri is seen as a data security hole at IBM. This is something that Steve Jones thinks we might need to be more concerned about in the future, especially as more and more processing takes places outside of our walls.  Read more...
By Steve Jones 2012/06/04 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 136 reads

The User Defined Server Roles in SQL Server 2012

This article describes how to create user defined server roles and use stored procedures and queries related.  Read more...
By Daniel Calbimonte 2012/05/25 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 3,465 reads
<< Newer    Items 41 to 60 of 528    Older >>