MOS Access Associate (Office 365 and Office 2019)
1 Introduction to Microsoft Access
1-1 Overview of Microsoft Access
1-2 Understanding the Access interface
1-3 Navigating the Ribbon and Backstage view
1-4 Customizing the Quick Access Toolbar
1-5 Using the Tell Me feature
2 Creating and Managing Databases
2-1 Creating a new database
2-2 Opening and closing databases
2-3 Saving and backing up databases
2-4 Converting databases between file formats
2-5 Managing database properties
3 Designing Tables
3-1 Understanding table structure
3-2 Creating tables using table design view
3-3 Defining field properties
3-4 Setting primary keys
3-5 Creating relationships between tables
3-6 Enforcing referential integrity
3-7 Using lookup fields
4 Entering and Managing Data
4-1 Entering data into tables
4-2 Editing and deleting records
4-3 Using data entry forms
4-4 Sorting and filtering data
4-5 Using validation rules and messages
4-6 Importing and exporting data
5 Creating and Customizing Forms
5-1 Understanding forms
5-2 Creating forms using the Form Wizard
5-3 Customizing form layout
5-4 Adding controls to forms
5-5 Setting control properties
5-6 Using form views (Form View, Layout View, Design View)
5-7 Creating subforms
6 Creating and Customizing Reports
6-1 Understanding reports
6-2 Creating reports using the Report Wizard
6-3 Customizing report layout
6-4 Adding controls to reports
6-5 Setting control properties
6-6 Using report views (Report View, Layout View, Design View)
6-7 Grouping and summarizing data in reports
6-8 Printing and exporting reports
7 Querying Data
7-1 Understanding queries
7-2 Creating queries using the Query Wizard
7-3 Using query design view
7-4 Adding fields to queries
7-5 Using criteria and operators
7-6 Sorting and grouping query results
7-7 Creating calculated fields
7-8 Using aggregate functions
7-9 Creating and using parameter queries
7-10 Creating and using crosstab queries
8 Macros and Automation
8-1 Understanding macros
8-2 Creating and editing macros
8-3 Using macro actions
8-4 Assigning macros to events
8-5 Debugging macros
8-6 Understanding VBA (Visual Basic for Applications)
8-7 Writing simple VBA procedures
9 Securing and Sharing Databases
9-1 Setting database passwords
9-2 Encrypting databases
9-3 Managing user-level security
9-4 Sharing databases with others
9-5 Using SharePoint and OneDrive for data storage
9-6 Collaborating with others in real-time
10 Maintaining and Optimizing Databases
10-1 Compact and repair databases
10-2 Analyzing and optimizing database performance
10-3 Using the Database Documenter
10-4 Managing database objects
10-5 Backing up and restoring databases
10-6 Migrating databases to newer versions of Access
Securing and Sharing Databases in Microsoft Access

Securing and Sharing Databases in Microsoft Access

Key Concepts

Securing and sharing databases in Microsoft Access involves understanding the following key concepts:

Database Security

Database security refers to the measures taken to protect the database from unauthorized access, data breaches, and other security threats. This includes setting up user permissions, encrypting sensitive data, and regularly backing up the database.

User-Level Security

User-level security involves defining specific permissions for different users or groups of users. This ensures that only authorized users can access certain parts of the database. User-level security is managed through the Access Security Wizard.

Encryption

Encryption is the process of converting data into a format that cannot be easily understood by unauthorized users. In Microsoft Access, you can encrypt the database file to protect sensitive information. Encryption ensures that even if the file is accessed, the data remains secure.

Sharing Databases

Sharing databases involves making the database accessible to multiple users over a network. This can be done by setting up a shared folder or using Access Services in SharePoint. Proper sharing configurations ensure that users can collaborate effectively without compromising security.

Permissions and Roles

Permissions and roles define what actions users can perform within the database. Roles group users with similar permissions, making it easier to manage access. Common roles include Administrators, Editors, and Viewers. Properly configured permissions and roles ensure that users have the appropriate level of access.

Backups and Recovery

Backups and recovery are essential for protecting the database from data loss due to hardware failure, corruption, or other issues. Regular backups ensure that you can restore the database to a previous state if needed. Recovery plans outline the steps to follow in case of a data loss event.

Trusted Locations

Trusted locations are specific folders on your computer or network where Access can open databases without security warnings. Setting up trusted locations ensures that users can open databases without interruptions, while still maintaining security.

Digital Signatures

Digital signatures are used to verify the authenticity and integrity of a database. By digitally signing a database, you can ensure that it has not been tampered with and that it comes from a trusted source. Digital signatures provide an additional layer of security.

Collaboration Tools

Collaboration tools in Microsoft Access include features like co-authoring, version control, and real-time editing. These tools enable multiple users to work on the same database simultaneously, improving productivity and collaboration.

Examples and Analogies

Imagine database security as a fortress protecting valuable treasures. Just as a fortress has guards, walls, and locks to keep intruders out, a database has user permissions, encryption, and backups to protect its data. For example, user-level security is like assigning different keys to different guards, ensuring that only authorized personnel can access certain areas.

Another analogy is a shared office space. Just as an office space has different rooms for different tasks and access cards for different employees, a shared database has different permissions and roles for different users. For example, an office manager might have access to all rooms, while a receptionist might only have access to the front desk.

By mastering the concepts of database security, user-level security, encryption, sharing databases, permissions and roles, backups and recovery, trusted locations, digital signatures, and collaboration tools, you can effectively secure and share databases in Microsoft Access.