Public Schedule Face-to-Face & Online Instructor-Led Training - View dates & book

Previous article   Next article back to categoryAccess articles

Microsoft Access Tighten your Security Controls

Fri 11th January 2008

Security is a primary concern in today's world. Whether we are concerned about personal safety or data protection, measures are available to ensure our safety. In the business world, information is a powerful tool and must be protected to ensure that valuable data is not lost or used inappropriately. Microsoft Access has been designed with this need in mind as it allows you to control who is able to view a database and what activities they are able to perform. This is most important in a multi-user environment. Let us consider some of the measures that are available to control the level of access to a particular database.

Encoding/Decoding


A database is most often encoded when being stored on a disc or transmitted electronically. To be able to access the database again, it must be decoded. These procedures can be carried out by the owner of the Microsoft Access database or a member of the Admin group. This is considered to be the simplest level of protection.

Setting of a password


It is possible to set up Microsoft Access so that a password is required to open a particular database. If the user enters the correct password, they are then able to access all data contained within the database. This simple level of security is most appropriate in an environment where only a single computer is present or the database is to be used by a small number of users.

Implementing User-Level Security


As the name implies, user-level security enables a database administrator to specify the level of access granted to individual users or groups. Using the User-Level Security Wizard, each individual is assigned a personal identification code and a password which must be entered when first accessing the database. The term "permission" is applied to those activities which a user has been enabled to perform such as entering and editing data or simply viewing data.

This is a brief overview of just three of the features available for protecting an Access database. If you have not implemented any security measures to date, it may be worth considering especially if you work in a multi-user environment. Your goal may be simply to prevent unwanted changes being made to your database or perhaps you wish to prohibit copying of your database for privacy reasons. Microsoft Access training courses usually cover this type of material at an advanced level. Once you have the necessary skills, you can implement security measures on your work or home systems and continue to ensure that they are updated regularly.

Original article appears here:
https://www.stl-training.co.uk/article-278-microsoft-access-tighten-your-security-controls.html

Back to article list

Publication Guidelines

  • You have permission to publish this article for free providing the "About the Author" box is included in its entirety.
  • Do not post/reprint this article in any site or publication that contains hate, violence, porn, warez, or supports illegal activity.
  • Do not use this article in violation of the US CAN-SPAM Act. If sent by email, this article must be delivered to opt-in subscribers only.
  • If you publish this article in a format that supports linking, please ensure that all URLs and email addresses are active links, without the rel='nofollow' tag.
  • Software Training London Ltd. owns this article. Please respect the author's copyright and above publication guidelines.
  • If you do not agree to these terms, please do not use this article.

Access courses in London and UK wide.

» Next available dates

 

Training courses

 

London's widest choice in
dates, venues, and prices

Public Schedule:

Buy now / Live dates

On-site / Closed company:

Get quote

Testimonials

More testimonials

Connect with us:

0207 987 3777

Call for assistance

Request Callback

We will call you back

Server loaded in 0.3 secs.