Page 128 - Computer Software Application TP - Volume 1
P. 128

COMPUTER SOFTWARE APPLICATION - CITS




           EXERCISE 35 : Implementing MySQL Security


            Objectives

            At the end of this exercise you shall be able to
           •  secure MySQL database

           Requirements


           Tools/Materials
           •   Desktop/Laptop with latest configuration
           •   Operating system: window 10:11
           •  XAMPP server r3.3.0


           Procedure


           TASK 1 : The process of securing MySQL.
           1  Change ROOT Password if needed
           ALTER USER ‘root’@’localhost’ IDENTIFIED BY ‘new password’;










           2  Create the New User
           Create a new user with restricted privileges:
           CREATE USER ‘your username’@’localhost’ IDENTIFIED BY ‘your password’;










           3  Grant Permissions
           Grant specific permissions to your new user.
           Replace your database with the name of the database you want to grant access to.
           GRANT ALL PRIVILEGES ON your database.* TO ‘your username’@’localhost’;

           FLUSH PRIVILEGES;







           4  Remove Anonymous User

           Remove anonymous users for security:
           DROP USER ‘’@’localhost’;



                                                           113
 CITS : IT & ITES - Computer Software Application - Exercise 34
   123   124   125   126   127   128   129   130   131   132   133