Saturday, 28 November 2015

Teradata Database security

Teradata Database security is based on the following concepts.
Security Element
Description
User
An individual or group of individuals represented by a single user identity.
Privileges
The database privileges explicitly or automatically granted to a user or database.
Logon
The process of submitting user credentials when requesting access to the database.
Authentication
The process by which the user identified in the logon is verified.
Authorization
The process that determines the database privileges available to the user.
Security Mechanism
A method that provides specific authentication, confidentiality, and integrity services for a database session.
Network Traffic Protection
The process for protecting message traffic between Teradata Database and network-attached clients against interception, theft, or other form of attack.
Message Integrity
Checks data sent across the network against what was received to ensure no data was lost or changed.
Access Logs
Logs that provide the history of users accessing the database and the database objects accessed.
Users
Users that access Teradata Database must be defined in the database or a supported directory.