Previous article Next article
Access articles
Microsoft Access Tighten your Security Controls
Fri 11th January 2008
Security is a primary concern in today's world. Whether we are concerned about personal safety or data protection, measures are available to ensure our safety. In the business world, information is a powerful tool and must be protected to ensure that valuable data is not lost or used inappropriately. Microsoft Access has been designed with this need in mind as it allows you to control who is able to view a database and what activities they are able to perform. This is most important in a multi-user environment. Let us consider some of the measures that are available to control the level of access to a particular database.
Encoding/Decoding
A database is most often encoded when being stored on a disc or transmitted electronically. To be able to access the database again, it must be decoded. These procedures can be carried out by the owner of the Microsoft Access database or a member of the Admin group. This is considered to be the simplest level of protection.
Setting of a password
It is possible to set up Microsoft Access so that a password is required to open a particular database. If the user enters the correct password, they are then able to access all data contained within the database. This simple level of security is most appropriate in an environment where only a single computer is present or the database is to be used by a small number of users.
Implementing User-Level Security
As the name implies, user-level security enables a database administrator to specify the level of access granted to individual users or groups. Using the User-Level Security Wizard, each individual is assigned a personal identification code and a password which must be entered when first accessing the database. The term "permission" is applied to those activities which a user has been enabled to perform such as entering and editing data or simply viewing data.
This is a brief overview of just three of the features available for protecting an Access database. If you have not implemented any security measures to date, it may be worth considering especially if you work in a multi-user environment. Your goal may be simply to prevent unwanted changes being made to your database or perhaps you wish to prohibit copying of your database for privacy reasons. Microsoft Access training courses usually cover this type of material at an advanced level. Once you have the necessary skills, you can implement security measures on your work or home systems and continue to ensure that they are updated regularly.
Original article appears here:
https://www.stl-training.co.uk/article-278-microsoft-access-tighten-your-security-controls.html
Back to article list
Distribution notes
London's widest choice in
dates, venues, and prices
Public Schedule:
Buy now / Live dates
On-site / Closed company:
Get quote
Testimonials
Zemo Partnership Project Officer Timothy Griffen Excel Intermediate
Really useful course. would recommend for anyone who thinks they already know how to use excel. There is so much more to learn, that will save you serious time every single day!!
Network Rail Graduate Development Coach Nicki Beckley Developing Personal Impact & Building Productive Relationships
Really enjoyed the course delivered by Phil. I’ve seen some of the content previously but was really good to cover it all again and was delivered really well. The level of engagement was just right as well. Thanks!
Red Kite Community Housing PA To The Deputy CEO Kim O'neill Taking Minutes
I would have liked to spend more time on the practical scenario - summarising more paragraph examples.
More testimonials |
Clients
· Main client list
Article list
What's this?
Server loaded in 0.12 secs.
PUBLICATION GUIDELINES