Page 128 - Computer Software Application TP - Volume 1
P. 128
COMPUTER SOFTWARE APPLICATION - CITS
EXERCISE 35 : Implementing MySQL Security
Objectives
At the end of this exercise you shall be able to
• secure MySQL database
Requirements
Tools/Materials
• Desktop/Laptop with latest configuration
• Operating system: window 10:11
• XAMPP server r3.3.0
Procedure
TASK 1 : The process of securing MySQL.
1 Change ROOT Password if needed
ALTER USER ‘root’@’localhost’ IDENTIFIED BY ‘new password’;
2 Create the New User
Create a new user with restricted privileges:
CREATE USER ‘your username’@’localhost’ IDENTIFIED BY ‘your password’;
3 Grant Permissions
Grant specific permissions to your new user.
Replace your database with the name of the database you want to grant access to.
GRANT ALL PRIVILEGES ON your database.* TO ‘your username’@’localhost’;
FLUSH PRIVILEGES;
4 Remove Anonymous User
Remove anonymous users for security:
DROP USER ‘’@’localhost’;
113
CITS : IT & ITES - Computer Software Application - Exercise 34