Database Security CIT 603 Lec 1: Introduction to DB Security (Part I)
18 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What aspect of DB security focuses on preventing unauthorized physical access or hardware failures?

  • Organizational DB Security
  • Logical DB Security
  • Availability
  • Physical DB Security (correct)

Which aspect of DB security concentrates on preventing unauthorized logical access to data through software?

  • Logical DB Security (correct)
  • Physical DB Security
  • Organizational DB Security
  • Secrecy

What does the aspect of confidentiality in DB security primarily aim to prevent?

  • System failures
  • Data modification
  • Disclosure of data to unauthorized entities (correct)
  • Unauthorized hardware access

Which aspect of DB security focuses on detecting unauthorized modification of data?

<p>Integrity (D)</p> Signup and view all the answers

What does the aspect of availability in DB security aim to prevent?

<p>Denial of access attacks (C)</p> Signup and view all the answers

Which DB security aspect involves info management constraints, policies, and operational procedures for protection?

<p>Organizational DB Security (B)</p> Signup and view all the answers

What aspect of data protection does an interception attack target?

<p>Confidentiality (B)</p> Signup and view all the answers

Which security attack is specifically aimed at tampering with the integrity of data?

<p>Modification (C)</p> Signup and view all the answers

What is the primary role of cryptographic techniques in enhancing database security?

<p>Protecting data confidentiality (B)</p> Signup and view all the answers

Which of the following is NOT an aspect that database security aims to provide?

<p>Transparency (C)</p> Signup and view all the answers

In the context of database security, what is meant by a 'man-in-the-middle (MITM)' attack?

<p>An attack where the attacker secretly intercepts and possibly alters communications between two parties (D)</p> Signup and view all the answers

Which element is NOT encompassed by database security measures?

<p>Applications (B)</p> Signup and view all the answers

What is the primary function of Access Control in database security?

<p>Preventing the unauthorized use of a resource (B)</p> Signup and view all the answers

Which security principle is most closely related to Access Control?

<p>Authenticity (C)</p> Signup and view all the answers

What is the role of risk analysis in database security?

<p>All of the above (D)</p> Signup and view all the answers

Which security service is responsible for the assurance that data is received as it was sent by an authorized entity?

<p>Data Integrity (B)</p> Signup and view all the answers

What is the main objective of security mechanism selection in database security?

<p>Balancing cost and performance (B)</p> Signup and view all the answers

What is the purpose of Accountability in database security?

<p>Ensuring that actions of an entity can be traced uniquely to that entity (D)</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser