Database Security CIT 603 Lec 1: Introduction to DB Security (Part I)
18 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What aspect of DB security focuses on preventing unauthorized physical access or hardware failures?

  • Organizational DB Security
  • Logical DB Security
  • Availability
  • Physical DB Security (correct)
  • Which aspect of DB security concentrates on preventing unauthorized logical access to data through software?

  • Logical DB Security (correct)
  • Physical DB Security
  • Organizational DB Security
  • Secrecy
  • What does the aspect of confidentiality in DB security primarily aim to prevent?

  • System failures
  • Data modification
  • Disclosure of data to unauthorized entities (correct)
  • Unauthorized hardware access
  • Which aspect of DB security focuses on detecting unauthorized modification of data?

    <p>Integrity</p> Signup and view all the answers

    What does the aspect of availability in DB security aim to prevent?

    <p>Denial of access attacks</p> Signup and view all the answers

    Which DB security aspect involves info management constraints, policies, and operational procedures for protection?

    <p>Organizational DB Security</p> Signup and view all the answers

    What aspect of data protection does an interception attack target?

    <p>Confidentiality</p> Signup and view all the answers

    Which security attack is specifically aimed at tampering with the integrity of data?

    <p>Modification</p> Signup and view all the answers

    What is the primary role of cryptographic techniques in enhancing database security?

    <p>Protecting data confidentiality</p> Signup and view all the answers

    Which of the following is NOT an aspect that database security aims to provide?

    <p>Transparency</p> Signup and view all the answers

    In the context of database security, what is meant by a 'man-in-the-middle (MITM)' attack?

    <p>An attack where the attacker secretly intercepts and possibly alters communications between two parties</p> Signup and view all the answers

    Which element is NOT encompassed by database security measures?

    <p>Applications</p> Signup and view all the answers

    What is the primary function of Access Control in database security?

    <p>Preventing the unauthorized use of a resource</p> Signup and view all the answers

    Which security principle is most closely related to Access Control?

    <p>Authenticity</p> Signup and view all the answers

    What is the role of risk analysis in database security?

    <p>All of the above</p> Signup and view all the answers

    Which security service is responsible for the assurance that data is received as it was sent by an authorized entity?

    <p>Data Integrity</p> Signup and view all the answers

    What is the main objective of security mechanism selection in database security?

    <p>Balancing cost and performance</p> Signup and view all the answers

    What is the purpose of Accountability in database security?

    <p>Ensuring that actions of an entity can be traced uniquely to that entity</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser