Podcast
Questions and Answers
What is meant by database security?
What is meant by database security?
Which of the following is NOT a component of an information system?
Which of the following is NOT a component of an information system?
What does the 'C' in the C.I.A. triangle represent?
What does the 'C' in the C.I.A. triangle represent?
Which of the following is NOT a reason a system may become unavailable?
Which of the following is NOT a reason a system may become unavailable?
Signup and view all the answers
Which functionalities are included in a Database Management System (DBMS)?
Which functionalities are included in a Database Management System (DBMS)?
Signup and view all the answers
What does information security primarily aim to protect?
What does information security primarily aim to protect?
Signup and view all the answers
What is essential for information to have integrity?
What is essential for information to have integrity?
Signup and view all the answers
How should company information typically be classified?
How should company information typically be classified?
Signup and view all the answers
Which option best describes the value of information as an asset?
Which option best describes the value of information as an asset?
Signup and view all the answers
Which element is NOT a part of the major components of information security architecture?
Which element is NOT a part of the major components of information security architecture?
Signup and view all the answers
What aspect of confidentiality does information classification address?
What aspect of confidentiality does information classification address?
Signup and view all the answers
Which of the following is a necessity for maintaining system availability?
Which of the following is a necessity for maintaining system availability?
Signup and view all the answers
Which of the following is a key purpose of enforcing data security policies and procedures in a DBMS?
Which of the following is a key purpose of enforcing data security policies and procedures in a DBMS?
Signup and view all the answers
In information system components, which of the following does NOT include a physical aspect?
In information system components, which of the following does NOT include a physical aspect?
Signup and view all the answers
What does the availability aspect of security ensure?
What does the availability aspect of security ensure?
Signup and view all the answers
What is one consequence of overly strict security policies?
What is one consequence of overly strict security policies?
Signup and view all the answers
What is a primary objective of enforcing security at all database levels?
What is a primary objective of enforcing security at all database levels?
Signup and view all the answers
What component can be defined as a weakness in any information system component?
What component can be defined as a weakness in any information system component?
Signup and view all the answers
Which of the following defines a security violation or attack that may occur at any time?
Which of the following defines a security violation or attack that may occur at any time?
Signup and view all the answers
What does the C.I.A triangle in database security stand for?
What does the C.I.A triangle in database security stand for?
Signup and view all the answers
Which of the following is NOT one of the asset types mentioned in database security?
Which of the following is NOT one of the asset types mentioned in database security?
Signup and view all the answers
What is a potential consequence of reducing data access point size?
What is a potential consequence of reducing data access point size?
Signup and view all the answers
What term is used to describe known security gaps intentionally left open?
What term is used to describe known security gaps intentionally left open?
Signup and view all the answers
What do auditing procedures and tools help to maintain in a database security system?
What do auditing procedures and tools help to maintain in a database security system?
Signup and view all the answers
What is the definition of a relational database?
What is the definition of a relational database?
Signup and view all the answers
What is an example of a human asset in the context of database security?
What is an example of a human asset in the context of database security?
Signup and view all the answers
Study Notes
Database Security and Auditing - Chapter 1: Security Architecture
- Objectives: Define security, describe information systems and their components, define database management system functionalities, outline the concept of information security, identify major components of information security architecture, define database security, list types of information assets and their values, describe security methods.
Security
- Database security: The degree to which data is fully protected from tampering or unauthorized acts.
- Includes: Information system and information security concepts.
Information Systems
-
Wise decisions require: Accurate and timely information and information integrity.
-
Information system: Components working together to generate accurate information.
-
Categorized by usage:
- Expert systems (ESS) — Long-term goals
- Decision support systems (DSS) — Middle-level management
- Management information systems (MIS) — Middle-level management
- Transaction processing systems (TPS) — Lower-level management
-
Components include: Data, Procedures, Hardware, Software, Network, People
Database Management
-
Essential for information system success.
-
DBMS functionalities:
- Organize data
- Store and retrieve data efficiently
- Manipulate data (update/delete)
- Enforce referential integrity and consistency
- Enforce and implement data security policies and procedures
- Back up, recover, and restore data
-
DBMS components include: Data, Hardware, Software, Networks, Procedures, Database servers
Information Security
- Information is a valuable asset.
- Information security: Procedures and measures to protect information systems components.
- C.I.A. triangle: Confidentiality, Integrity, Availability.
- Security policies need balance.
Confidentiality
- Addresses: Prevention of unauthorized access and information disclosure based on classification.
- Classification levels: (e.g., Unclassified, External in-confidence, Internal in-confidence, Restricted, Classified)
Integrity
- Consistent and valid data: Processed correctly, yields accurate information.
-
Information has integrity if:
- It is accurate
- It has not been tampered with
- Read consistency: Each user sees only their changes and others committed.
Availability
- Systems must be available: To authorized users.
- Systems determine: User access to information.
-
Reasons for system unavailability:
- External attacks and lack of protection
- System failure (lack of disaster recovery)
- Overly stringent/obscure security policies
- Poorly implemented authentication
Information Security Architecture
- Protects: Data and information
- Overall design: Company's implementation of the C.I.A. triangle
- Components include: Policies, procedures, security staff, detection equipment, security programs, monitoring equipment, auditing procedures & tools.
Database Security
- Enforce security: At all database levels.
- Security access point: Location where database security must be protected and applied.
- Data needs highest protection: Data access points should be small.
- Reducing access point size: Reduces security risks.
- Security gaps, vulnerabilities, threats: Points of missing security, system flaws, and potential breaches, respectively.
Database Security Levels
- Relational database: A collection of related data files.
- Data file: A collection of related tables.
- Table: A collection of related rows (records).
- Row: A collection of related columns (fields).
Menaces (Threats) to Databases
- Security vulnerability: Weakness in any information system component.
-
Categories of database security vulnerabilities:
- User mistakes
- Software issues
- Design and implementation flaws
- Installation and configuration errors
- Security threat: Security violation or attack due to a vulnerability.
-
Categories of database security threats:
- People issues
- Technological disasters
- Malicious code
- Natural disasters
- Security risk: Known security gap intentionally left open.
Asset Types and Their Value
- Security measures based on asset value.
- Types of assets: Physical, Logical, Intangible, Human
Security Methods
- Methods to protect components: (Examples in Table 1-6)
Database Security Methodology
- Database security implementation methodology (Example in Figure 1-16)
Summary
- Security: Level and degree of being free from danger and threats.
- Database security: Degree to which data is protected from unauthorized tampering.
- Information systems: Backbone of daily company operations.
- DBMS: Programs to manage databases.
- C.I.A. triangle: Confidentiality, Integrity, Availability.
- Secure access points, vulnerabilities, threats & risks: Important components for overall security.
- Information security architecture: A model protecting logical and physical assets.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.