Database Security Classification Quiz
25 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What does the term 'security' refer to in the context of the database?

  • Encryption of the entire database contents
  • Implementation of complex algorithms within the database system
  • Regular backup of the database to prevent data loss
  • Protection of the database against unauthorized access, intentional or accidental (correct)
  • What does database security encompass?

  • Network security protocols
  • Hardware, software, people, and data (correct)
  • Physical security measures for the database server
  • Only data encryption techniques
  • In relation to database security, what may breaches of security affect?

  • Hardware components exclusively
  • Other parts of the system, which may in turn affect the database (correct)
  • Only the data held in the database
  • Software updates and patches
  • What are some situations considered in relation to database security?

    <p>Theft and fraud; loss of confidentiality; loss of privacy; loss of integrity; loss of availability</p> Signup and view all the answers

    Which method can be used to protect the backend database in Access?

    <p>Encrypt with Password option in the File/Info section</p> Signup and view all the answers

    What are the two main purposes of proxy servers in a Web environment?

    <p>Improving performance and filtering requests</p> Signup and view all the answers

    What type of security does Oracle provide for data?

    <p>System security and data security</p> Signup and view all the answers

    What key aspects are associated with securing information transmission over the Internet?

    <p>Privacy, integrity, authenticity, and nonrepudiation</p> Signup and view all the answers

    What is the encryption algorithm used by PGP (Pretty Good Privacy) for bulk encryption?

    <p>128-bit symmetric algorithm</p> Signup and view all the answers

    Which RAID level provides the highest redundancy and improved reliability?

    <p>RAID 6</p> Signup and view all the answers

    What is the most well-known asymmetric encryption algorithm for public key cryptosystems?

    <p>RSA</p> Signup and view all the answers

    Which method in Microsoft Office Access 2010 is considered the most secure way to protect data?

    <p>Splitting the database</p> Signup and view all the answers

    What does mandatory access control (MAC) in database systems involve?

    <p>System-wide policies that cannot be changed by individual users, involving security class assignments and clearance for users</p> Signup and view all the answers

    What is the responsibility of a system administrator in a database management system?

    <p>Creating individual user accounts and granting access to a computer system</p> Signup and view all the answers

    What does loss of availability in a database management system mean?

    <p>Data or the system cannot be accessed, severely impacting an organization's financial performance</p> Signup and view all the answers

    What does confidentiality ensure in a database management system?

    <p>Secrecy over critical organizational data</p> Signup and view all the answers

    What are the two restrictions imposed by the Bell–LaPadula model on reading and writing database objects?

    <p>Simple Security Property and *-Property</p> Signup and view all the answers

    What is the Data Encryption Standard (DES) key length and its transformation of plaintext blocks?

    <p>56-bit key, transforming each 64-bit block of plaintext</p> Signup and view all the answers

    What is the purpose of a cryptosystem in data transmission?

    <p>To transmit data securely over insecure networks using encryption and decryption keys and algorithms</p> Signup and view all the answers

    What is the purpose of journaling in database management?

    <p>Maintaining a log file of all changes made to the database for effective recovery in case of failure</p> Signup and view all the answers

    What is the primary purpose of the Package-and-Sign feature in Access?

    <p>To place the database in an Access Deployment (.accdc) file and sign the package</p> Signup and view all the answers

    What type of security does Oracle provide for data?

    <p>Both system security (user name and password mechanism) and data security (privileges)</p> Signup and view all the answers

    What are the key aspects of securing information transmission over the Internet?

    <p>Privacy, integrity, authenticity, and nonrepudiation</p> Signup and view all the answers

    What do roles in Oracle allow for?

    <p>Granting a group of privileges to a role, which can then be assigned to users</p> Signup and view all the answers

    What is the primary purpose of proxy servers in a Web environment?

    <p>Improving performance and filtering requests</p> Signup and view all the answers

    Study Notes

    Database Security and Administration

    • Security classes are assigned to database objects and subjects, with an ordered system of top secret (TS), secret (S), confidential (C), and unclassified (U).
    • The Bell–LaPadula model imposes two restrictions on reading and writing database objects: Simple Security Property and *-Property.
    • Multilevel relations in a relational DBMS involve assigning security classes to database objects, leading to the concept of a multilevel relation and views as a flexible security mechanism.
    • Backup involves periodically copying the database and log file to offline storage media, essential for database recovery following failure.
    • Journaling is the process of maintaining a log file of all changes made to the database, enabling effective recovery in case of failure.
    • Integrity constraints contribute to maintaining a secure database by preventing invalid data and misleading results.
    • Encryption encodes data with a special algorithm, rendering it unreadable without the decryption key, and some DBMSs provide encryption facilities for sensitive data.
    • Cryptosystem is required to transmit data securely over insecure networks, and it includes encryption and decryption keys and algorithms.
    • The Data Encryption Standard (DES) is a standard encryption algorithm developed by IBM, using a 56-bit key to transform each 64-bit block of plaintext.
    • Most working systems are based on user keys shorter than the message, although longer keys are considered more secure.
    • Encryption also protects data transmitted over communication lines.
    • DES is not universally regarded as very secure, and some authors maintain that a larger key is required for security.

    Database Security and Administration

    • Backend database can be protected by assigning a password and specifying its location
    • Setting a password for the database is available through the Encrypt with Password option in the File/Info section
    • Trust Center can be used to trust (enable) the disabled content in a database and set security options for Office Access 2010 databases
    • Package-and-Sign feature in Access places the database in an Access Deployment (.accdc) file and signs the package
    • Oracle provides system security (user name and password mechanism) and data security (privileges)
    • Oracle privileges include system privileges (action on any schema objects) and object privileges (action on specific objects)
    • Roles in Oracle can be granted to users or a group of privileges can be granted to a role, which is then assigned to users
    • Internet communication relies on TCP/IP, which was not designed with security in mind
    • Privacy, integrity, authenticity, and nonrepudiation are key aspects of securing information transmission over the Internet
    • Proxy servers in a Web environment intercept requests to determine if they can fulfill them and have two main purposes: improving performance and filtering requests

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Test your knowledge of database security classification with this quiz. Learn about assigning security classes to database objects and clearances for subjects.

    More Like This

    Use Quizgecko on...
    Browser
    Browser