MySQL - SPLessons

MySQL Security

Chapter 28

SPLessons 5 Steps, 3 Clicks
5 Steps - 3 Clicks

MySQL Security

MySQL Security

shape Description

Control Access Lists are used in MySQL for each and every query operations and connections, that are a part of security for accessing the database accounts. There is additionally bolster for SSL-encoded associations among MySQL servers and MySQL users. A significant number of the ideas performed are not particular to only MySQL database and the same general thoughts apply to all the functions.

shape Conceptual
figure

  • SSH – Stands for secure shell
  • SSL – Stands for secure socket layer

Security for MySQL database

shape Description

The following steps explain some of the key instructions related to MySQL Security related to database.

Summary

shape Key Points

  • MySQL Security – Are the privilege measures that are taken as a part of the database.