Database Security Classification Quiz

ProblemFreeQuail avatar
ProblemFreeQuail
·
·
Download

Start Quiz

Study Flashcards

25 Questions

What does the term 'security' refer to in the context of the database?

Protection of the database against unauthorized access, intentional or accidental

What does database security encompass?

Hardware, software, people, and data

In relation to database security, what may breaches of security affect?

Other parts of the system, which may in turn affect the database

What are some situations considered in relation to database security?

Theft and fraud; loss of confidentiality; loss of privacy; loss of integrity; loss of availability

Which method can be used to protect the backend database in Access?

Encrypt with Password option in the File/Info section

What are the two main purposes of proxy servers in a Web environment?

Improving performance and filtering requests

What type of security does Oracle provide for data?

System security and data security

What key aspects are associated with securing information transmission over the Internet?

Privacy, integrity, authenticity, and nonrepudiation

What is the encryption algorithm used by PGP (Pretty Good Privacy) for bulk encryption?

128-bit symmetric algorithm

Which RAID level provides the highest redundancy and improved reliability?

RAID 6

What is the most well-known asymmetric encryption algorithm for public key cryptosystems?

RSA

Which method in Microsoft Office Access 2010 is considered the most secure way to protect data?

Splitting the database

What does mandatory access control (MAC) in database systems involve?

System-wide policies that cannot be changed by individual users, involving security class assignments and clearance for users

What is the responsibility of a system administrator in a database management system?

Creating individual user accounts and granting access to a computer system

What does loss of availability in a database management system mean?

Data or the system cannot be accessed, severely impacting an organization's financial performance

What does confidentiality ensure in a database management system?

Secrecy over critical organizational data

What are the two restrictions imposed by the Bell–LaPadula model on reading and writing database objects?

Simple Security Property and *-Property

What is the Data Encryption Standard (DES) key length and its transformation of plaintext blocks?

56-bit key, transforming each 64-bit block of plaintext

What is the purpose of a cryptosystem in data transmission?

To transmit data securely over insecure networks using encryption and decryption keys and algorithms

What is the purpose of journaling in database management?

Maintaining a log file of all changes made to the database for effective recovery in case of failure

What is the primary purpose of the Package-and-Sign feature in Access?

To place the database in an Access Deployment (.accdc) file and sign the package

What type of security does Oracle provide for data?

Both system security (user name and password mechanism) and data security (privileges)

What are the key aspects of securing information transmission over the Internet?

Privacy, integrity, authenticity, and nonrepudiation

What do roles in Oracle allow for?

Granting a group of privileges to a role, which can then be assigned to users

What is the primary purpose of proxy servers in a Web environment?

Improving performance and filtering requests

Study Notes

Database Security and Administration

  • Security classes are assigned to database objects and subjects, with an ordered system of top secret (TS), secret (S), confidential (C), and unclassified (U).
  • The Bell–LaPadula model imposes two restrictions on reading and writing database objects: Simple Security Property and *-Property.
  • Multilevel relations in a relational DBMS involve assigning security classes to database objects, leading to the concept of a multilevel relation and views as a flexible security mechanism.
  • Backup involves periodically copying the database and log file to offline storage media, essential for database recovery following failure.
  • Journaling is the process of maintaining a log file of all changes made to the database, enabling effective recovery in case of failure.
  • Integrity constraints contribute to maintaining a secure database by preventing invalid data and misleading results.
  • Encryption encodes data with a special algorithm, rendering it unreadable without the decryption key, and some DBMSs provide encryption facilities for sensitive data.
  • Cryptosystem is required to transmit data securely over insecure networks, and it includes encryption and decryption keys and algorithms.
  • The Data Encryption Standard (DES) is a standard encryption algorithm developed by IBM, using a 56-bit key to transform each 64-bit block of plaintext.
  • Most working systems are based on user keys shorter than the message, although longer keys are considered more secure.
  • Encryption also protects data transmitted over communication lines.
  • DES is not universally regarded as very secure, and some authors maintain that a larger key is required for security.

Database Security and Administration

  • Backend database can be protected by assigning a password and specifying its location
  • Setting a password for the database is available through the Encrypt with Password option in the File/Info section
  • Trust Center can be used to trust (enable) the disabled content in a database and set security options for Office Access 2010 databases
  • Package-and-Sign feature in Access places the database in an Access Deployment (.accdc) file and signs the package
  • Oracle provides system security (user name and password mechanism) and data security (privileges)
  • Oracle privileges include system privileges (action on any schema objects) and object privileges (action on specific objects)
  • Roles in Oracle can be granted to users or a group of privileges can be granted to a role, which is then assigned to users
  • Internet communication relies on TCP/IP, which was not designed with security in mind
  • Privacy, integrity, authenticity, and nonrepudiation are key aspects of securing information transmission over the Internet
  • Proxy servers in a Web environment intercept requests to determine if they can fulfill them and have two main purposes: improving performance and filtering requests

Test your knowledge of database security classification with this quiz. Learn about assigning security classes to database objects and clearances for subjects.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free
Use Quizgecko on...
Browser
Browser