473,405 Members | 2,379 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,405 software developers and data experts.

some security concerns

We have a TON of access databases on our servers.

after 10 yrs a person went in and wiped about 50 files in one.
ALL hell broke loose.

A few questions if I may.
one person said ok we can link tables and put the data on another
server..WELL you can still remove records..

we can log every person who logs into the database, and we can log
times..but if we store this info in the table they are working on how
will we know what they did if they delete the record.

Put logs into another table...is there a way to say ok bob logged in
on 9/25 he added records 201,202,203 and deleted record ....###
adding would be easy but editing and deleting sound like a pain to
track....correct ?

they do not want locked down databases....one of the people even said
they wanted to know who deleted a database. I told them to call IT
maybe they knew how to track that...can they?

overall it still comes down to training of the data entry people as
well as the statistics people. AND TRAINING is degrading to a stat
phd. Training data entry people cost money, and they should not be a
problem with them....ok forget this last paragraph its a no win
arguement around here.

thanks for any comments on this or anything else about securing from
this type of thing.
Nov 7 '07 #1
6 1285

"sparks" <js******@swbell.netwrote in message
news:cj********************************@4ax.com...
We have a TON of access databases on our servers.

after 10 yrs a person went in and wiped about 50 files in one.
ALL hell broke loose.

A few questions if I may.
one person said ok we can link tables and put the data on another
server..WELL you can still remove records..

we can log every person who logs into the database, and we can log
times..but if we store this info in the table they are working on how
will we know what they did if they delete the record.

Put logs into another table...is there a way to say ok bob logged in
on 9/25 he added records 201,202,203 and deleted record ....###
adding would be easy but editing and deleting sound like a pain to
track....correct ?

they do not want locked down databases....one of the people even said
they wanted to know who deleted a database. I told them to call IT
maybe they knew how to track that...can they?

overall it still comes down to training of the data entry people as
well as the statistics people. AND TRAINING is degrading to a stat
phd. Training data entry people cost money, and they should not be a
problem with them....ok forget this last paragraph its a no win
arguement around here.

thanks for any comments on this or anything else about securing from
this type of thing.

Sounds like you need to upsize to a SQL server with all the security and
logging options engaged. I don't think a Jet database can be secured to the
level you indicated needing.
Nov 7 '07 #2
The biggest thing is they don't want to make it hard for ANYONE to log
in and enter whatever, add, delete or edit a record.

BUT they want to know who what when and where. BUT only if there is a
problem.
On Wed, 7 Nov 2007 11:34:11 -0600, "paii, Ron" <no**@no.comwrote:
>
"sparks" <js******@swbell.netwrote in message
news:cj********************************@4ax.com.. .
>We have a TON of access databases on our servers.

after 10 yrs a person went in and wiped about 50 files in one.
ALL hell broke loose.

A few questions if I may.
one person said ok we can link tables and put the data on another
server..WELL you can still remove records..

we can log every person who logs into the database, and we can log
times..but if we store this info in the table they are working on how
will we know what they did if they delete the record.

Put logs into another table...is there a way to say ok bob logged in
on 9/25 he added records 201,202,203 and deleted record ....###
adding would be easy but editing and deleting sound like a pain to
track....correct ?

they do not want locked down databases....one of the people even said
they wanted to know who deleted a database. I told them to call IT
maybe they knew how to track that...can they?

overall it still comes down to training of the data entry people as
well as the statistics people. AND TRAINING is degrading to a stat
phd. Training data entry people cost money, and they should not be a
problem with them....ok forget this last paragraph its a no win
arguement around here.

thanks for any comments on this or anything else about securing from
this type of thing.


Sounds like you need to upsize to a SQL server with all the security and
logging options engaged. I don't think a Jet database can be secured to the
level you indicated needing.
Nov 7 '07 #3

"sparks" <js******@swbell.netwrote in message
news:oa********************************@4ax.com...
The biggest thing is they don't want to make it hard for ANYONE to log
in and enter whatever, add, delete or edit a record.
I'm not an expert on MS SQL Server, but if you are using Active Directory; I
think the serve can use the AD login. Access security will require a
password for the database which cannot be linked to Active Directory.
BUT they want to know who what when and where. BUT only if there is a
problem.
There are example of logging code for Jet but nothing that could be used to
rebuild your database after a mass delete of records. As for deleting MDBs,
Windows server has Shadow Copy that will generate backups that can be
restored. Also your IT department should be doing regular backups.
>
On Wed, 7 Nov 2007 11:34:11 -0600, "paii, Ron" <no**@no.comwrote:

"sparks" <js******@swbell.netwrote in message
news:cj********************************@4ax.com...
We have a TON of access databases on our servers.

after 10 yrs a person went in and wiped about 50 files in one.
ALL hell broke loose.

A few questions if I may.
one person said ok we can link tables and put the data on another
server..WELL you can still remove records..

we can log every person who logs into the database, and we can log
times..but if we store this info in the table they are working on how
will we know what they did if they delete the record.

Put logs into another table...is there a way to say ok bob logged in
on 9/25 he added records 201,202,203 and deleted record ....###
adding would be easy but editing and deleting sound like a pain to
track....correct ?

they do not want locked down databases....one of the people even said
they wanted to know who deleted a database. I told them to call IT
maybe they knew how to track that...can they?

overall it still comes down to training of the data entry people as
well as the statistics people. AND TRAINING is degrading to a stat
phd. Training data entry people cost money, and they should not be a
problem with them....ok forget this last paragraph its a no win
arguement around here.

thanks for any comments on this or anything else about securing from
this type of thing.

Sounds like you need to upsize to a SQL server with all the security and
logging options engaged. I don't think a Jet database can be secured to
the
level you indicated needing.

Nov 7 '07 #4
On Nov 7, 7:56 am, sparks <jstal...@swbell.netwrote:
We have a TON of access databases on our servers.

after 10 yrs a person went in and wiped about 50 files in one.
ALL hell broke loose.

A few questions if I may.
one person said ok we can link tables and put the data on another
server..WELL you can still remove records..

we can log every person who logs into the database, and we can log
times..but if we store this info in the table they are working on how
will we know what they did if they delete the record.

Put logs into another table...is there a way to say ok bob logged in
on 9/25 he added records 201,202,203 and deleted record ....###
adding would be easy but editing and deleting sound like a pain to
track....correct ?

they do not want locked down databases....one of the people even said
they wanted to know who deleted a database. I told them to call IT
maybe they knew how to track that...can they?

overall it still comes down to training of the data entry people as
well as the statistics people. AND TRAINING is degrading to a stat
phd. Training data entry people cost money, and they should not be a
problem with them....ok forget this last paragraph its a no win
arguement around here.

thanks for any comments on this or anything else about securing from
this type of thing.
Another method is to create three fields for each of your tables:

UserID Text 25
ModifyDate Date/Time
Deleted Yes/No Default = No

Every time a user adds or modifies a record, the user's logon id can
be placed into the UserID field with date and time into the ModifyDate
field. If a record is to be deleted, it will simply be marked for
deletion instead of actually deleting it. To mark a record for
deletion, the Deleted field should be set to 'Yes' along with who
(UserID) and when (ModifyDate).

Now, I'm not saying this is the best solution. It's just an idea to
consider. It might not be because marking records for deletion will
never shrink the size of the database, unless a process is created to
archive this data on a periodic basis.

I hope this helps!

Nov 7 '07 #5
On Nov 7, 7:56 am, sparks <jstal...@swbell.netwrote:
We have a TON of access databases on our servers.

after 10 yrs a person went in and wiped about 50 files in one.
ALL hell broke loose.

A few questions if I may.
one person said ok we can link tables and put the data on another
server..WELL you can still remove records..

we can log every person who logs into the database, and we can log
times..but if we store this info in the table they are working on how
will we know what they did if they delete the record.

Put logs into another table...is there a way to say ok bob logged in
on 9/25 he added records 201,202,203 and deleted record ....###
adding would be easy but editing and deleting sound like a pain to
track....correct ?

they do not want locked down databases....one of the people even said
they wanted to know who deleted a database. I told them to call IT
maybe they knew how to track that...can they?

overall it still comes down to training of the data entry people as
well as the statistics people. AND TRAINING is degrading to a stat
phd. Training data entry people cost money, and they should not be a
problem with them....ok forget this last paragraph its a no win
arguement around here.

thanks for any comments on this or anything else about securing from
this type of thing.
Sparks,
I have done this exact thing. On any database it's tough, on an
access database it is monsterous.
In access all your activity would have to be form driven and then you
would have to have code events on the form that wrote the changes both
before and after to another table. What if 3 people changed a record,
you would need to know who changed what from what. As far as deletes,
you also have to worry about related tables. What if I delete a client
and all their related invoices should get deleted to. If I want to
see who deleted that invoice how do I know that it was from a client
deletion. All of that would have to be managed by code and written to
a table. Really ugly.

If you upgrade to sql server like Ron suggested - sql express is free,
you can set up triggers on the tables so that any changes you make can
automatically written to a log table. Still a lot of work, but only
on the database side as opposed to on the client side. Much easier to
manage and maintain.
Good luck
P

Nov 8 '07 #6
yes its a big mess trying to track this stuff. Like you said did
someone delete a record out of a subtable or did they delete the
primary key and auto delete all the linked table data.

Basically they rely on IT for backups...2 weeks on site and 1 yr
offsite but as they mentioned...HOW will they tell when or what
happened. AS WELL AS we didn't notice if for a year.
I told them that is a main problem.
Reports that can be run weekly for record counts....if it goes down
OUCH ??????? that is the only thing I could think of.
but I think they need to have someone watching this kind of thing.

one other point can IT tell you who made a file?
I mean if you go in and copy a database and call it data1BACKUP the
owner of the backup is you but is the owner the creater of the file?

On 7 Nov 2007 17:07:33 -0800, Pachydermitis <pr*******@gmail.com>
wrote:
>On Nov 7, 7:56 am, sparks <jstal...@swbell.netwrote:
>We have a TON of access databases on our servers.

after 10 yrs a person went in and wiped about 50 files in one.
ALL hell broke loose.

A few questions if I may.
one person said ok we can link tables and put the data on another
server..WELL you can still remove records..

we can log every person who logs into the database, and we can log
times..but if we store this info in the table they are working on how
will we know what they did if they delete the record.

Put logs into another table...is there a way to say ok bob logged in
on 9/25 he added records 201,202,203 and deleted record ....###
adding would be easy but editing and deleting sound like a pain to
track....correct ?

they do not want locked down databases....one of the people even said
they wanted to know who deleted a database. I told them to call IT
maybe they knew how to track that...can they?

overall it still comes down to training of the data entry people as
well as the statistics people. AND TRAINING is degrading to a stat
phd. Training data entry people cost money, and they should not be a
problem with them....ok forget this last paragraph its a no win
arguement around here.

thanks for any comments on this or anything else about securing from
this type of thing.

Sparks,
I have done this exact thing. On any database it's tough, on an
access database it is monsterous.
In access all your activity would have to be form driven and then you
would have to have code events on the form that wrote the changes both
before and after to another table. What if 3 people changed a record,
you would need to know who changed what from what. As far as deletes,
you also have to worry about related tables. What if I delete a client
and all their related invoices should get deleted to. If I want to
see who deleted that invoice how do I know that it was from a client
deletion. All of that would have to be managed by code and written to
a table. Really ugly.

If you upgrade to sql server like Ron suggested - sql express is free,
you can set up triggers on the tables so that any changes you make can
automatically written to a log table. Still a lot of work, but only
on the database side as opposed to on the client side. Much easier to
manage and maintain.
Good luck
P
Nov 8 '07 #7

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

1
by: Duncan Allen | last post by:
Hi, Using VB.NET I need to access a shared drive on a server using a specific account, check for a subdirectory, add it if it doesn't exist and then change the access security for the...
4
by: Nicolae Fieraru | last post by:
Hi All, I am working on a web site in asp which will be hosted on a Windows 2003 server. I use the following code to connect to the database: Set objConn =...
6
by: Ken Galer | last post by:
I am working on a small project that I started at home. It originally was on the C: drive and was working properly. After bringing it to work I placed it in a folder on the server with the other...
14
by: WebMatrix | last post by:
Hello, I have developed a web application that connects to 2 different database servers. The connection strings with db username + password are stored in web.config file. After a code review,...
2
by: allyn44 | last post by:
HI--a simple question about access security--am having brain lock--if I make queries read only to a chosen user group (as defined by access security) will they stil be able to open forms based on...
1
by: Oenone | last post by:
I've been working on migration of my company's VB6 ASP system to VB2005 over the last year or so, and am currently presenting my findings and recommended course of action to our management team....
15
by: himilecyclist | last post by:
My State government organization has written a PHP/MySQL application which has been in production for about 6 months and has been highly successful. We are now embarking on a similar database...
6
by: plaguna | last post by:
Basically I have Three questions about Jet U-L Security: 1.Every time I create new Groups, new Users and Permissions using the User and Group Accounts dialog box, It creates User security for...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.