Chapter 9: Security Concerns, Encryption, and Database Passwords


Overview

This chapter describes how you can use database encryption and database passwords to protect your database. More importantly, it discusses security issues relating to these techniques and to importing objects and the workgroup file. Fortunately, if you use these protection measures in certain ways, you will reduce the likelihood of security breaches. This chapter details these different approaches so that you can maximize your protection.

Before I embark on the detail, bear in mind that some Access security concerns come about because the product's popularity has built a viable market for companies skilled in breaking security. These concerns are partially due to U.S. government rules on exporting encryption technology, but more likely, they indicate that Microsoft has not invested enough resources in securing Access databases. Personally, I am no more perturbed by some of the issues that I have read about concerning flaws in the Access security model than I am about the security in my office. I have safe, locked windows , a back-to-base security alarm, a double-bolted front door, and the office is in a good neighborhood. Soon I will be thinking about a security guard or a big dog with a deep growl. See what I mean? We must stop somewhere, and this chapter helps draw a line in the sand so that you know the best way to protect your database.

While I was writing this chapter, I was tempted to discuss some alternative techniques that allow Access security measures to be thwarted. In the end, I decided to be deliberately vague on security issues that didn't involve freely available software that you can easily and cheaply purchase on the Internet. The result is that this chapter provides you with a path to avoid pitfalls and better protect your database but does not provide a user guide for those unscrupulous people who want to delve into your intellectual property and information.

The demonstration material for this chapter includes an Access 2002 form that will launch a password-protected database without the user knowing either the location of the database or the password. To find the demonstration form, open either the grMAP2002.mdb or the grMap2003.mdb download database and choose Chapter 9.




Real World Microsoft Access Database Protection and Security
Real World Microsoft Access Database Protection and Security
ISBN: 1590591267
EAN: 2147483647
Year: 2003
Pages: 176

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net