You can start by asking two questions:
Is the person accessing the database allowed to be there?
If the person is allowed to be there, what is he or she allowed, or not allowed, to do?
These two questions lie at the heart of database security. In this age of malicious viruses and computer crimes, we have to be careful that our data, files, and programming code are not illegally accessed or retrieved.
In this chapter we explore security within Access and VBA. You will learn about user authentication, granting and revoking permissions, the Jet Sandbox, and ADOX programming techniques for security.