7/28/2019 Originality Report https://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/originalityReport/ultra?attemptId=2f315153-03be-4838-82ae-54e96bf6e2cb&course_id=_44437_1&i… 1/4 %76 %2 SafeAssign Originality Report Database Security - 201950 - CRN165 - Rucker • Week 4 Paper %78Total Score: High risk Sailendra Manne Submission UUID: 6eb5d3aa-e0e7-5abe-902b-eceffd64ff7d Total Number of Reports 1 Highest Match 78 % Week 4 assignment.docx Average Match 78 % Submitted on 07/28/19 04:29 PM PDT Average Word Count 633 Highest: Week 4 assignme… %78Attachment 1 Institutional database (7) Student paper Student paper Student paper Student paper Student paper Student paper Student paper Global database (1) Student paper Top sources (3) Excluded sources (0) View Originality Report - Old Design Word Count: 633 Week 4 assignment.docx 2 8 4 5 3 6 1 7 2 Student paper 8 Student paper 4 Student paper https://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/originalityReport?attemptId=2f315153-03be-4838-82ae-54e96bf6e2cb&course_id=_44437_1&download=true&includeDeleted=true&print=true&force=true 7/28/2019 Originality Report https://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/originalityReport/ultra?attemptId=2f315153-03be-4838-82ae-54e96bf6e2cb&course_id=_44437_1&i… 2/4 Source Matches (18) Student paper 75% Student paper 70% Database – Users and Roles Introduction For any company in the modern era, databases are the gemstones for every repository of private, sensitive and valued business data and infor- mation. Any business that is thriving is mandated to supply timely and precise data and also protect them. However, security avails a crucial com- petitive edge for every functioning database (Rafiq, 2014). Nonetheless, every database provider must prioritize data protection in order to get loyal customers. The customers, in turn, get to trust the established system that is meant to protect their valued data. Relationship between users and roles in the database Roles can be defined as a collective group of privileges. However, privileges are a permission that allows a user to perform a command on any database project. Privileges can be granted to users or roles.in this case a role can be a database user, group or both. Database objects can be owned by roles and also allocate privileges on those objects. Roles can, however, be affiliates of additional roles: hence, a member role can take over the object privileges of its primary role. When using roles, one should avoid manual grant sets of privileges that are user to user. It merely means administrator role should not be granted to numerous users. Super-users can permit and revoke privileges to users using an administrator role. The relationship between roles and users present much flexibility when granting and revoking the privileges to and from users. A cumula- tive effect comes about when allowing privileges to roles and users and also allowing roles to u ...