Podcast
Questions and Answers
What does the term 'security' refer to in the context of the database?
What does the term 'security' refer to in the context of the database?
What does database security encompass?
What does database security encompass?
In relation to database security, what may breaches of security affect?
In relation to database security, what may breaches of security affect?
What are some situations considered in relation to database security?
What are some situations considered in relation to database security?
Signup and view all the answers
Which method can be used to protect the backend database in Access?
Which method can be used to protect the backend database in Access?
Signup and view all the answers
What are the two main purposes of proxy servers in a Web environment?
What are the two main purposes of proxy servers in a Web environment?
Signup and view all the answers
What type of security does Oracle provide for data?
What type of security does Oracle provide for data?
Signup and view all the answers
What key aspects are associated with securing information transmission over the Internet?
What key aspects are associated with securing information transmission over the Internet?
Signup and view all the answers
What is the encryption algorithm used by PGP (Pretty Good Privacy) for bulk encryption?
What is the encryption algorithm used by PGP (Pretty Good Privacy) for bulk encryption?
Signup and view all the answers
Which RAID level provides the highest redundancy and improved reliability?
Which RAID level provides the highest redundancy and improved reliability?
Signup and view all the answers
What is the most well-known asymmetric encryption algorithm for public key cryptosystems?
What is the most well-known asymmetric encryption algorithm for public key cryptosystems?
Signup and view all the answers
Which method in Microsoft Office Access 2010 is considered the most secure way to protect data?
Which method in Microsoft Office Access 2010 is considered the most secure way to protect data?
Signup and view all the answers
What does mandatory access control (MAC) in database systems involve?
What does mandatory access control (MAC) in database systems involve?
Signup and view all the answers
What is the responsibility of a system administrator in a database management system?
What is the responsibility of a system administrator in a database management system?
Signup and view all the answers
What does loss of availability in a database management system mean?
What does loss of availability in a database management system mean?
Signup and view all the answers
What does confidentiality ensure in a database management system?
What does confidentiality ensure in a database management system?
Signup and view all the answers
What are the two restrictions imposed by the Bell–LaPadula model on reading and writing database objects?
What are the two restrictions imposed by the Bell–LaPadula model on reading and writing database objects?
Signup and view all the answers
What is the Data Encryption Standard (DES) key length and its transformation of plaintext blocks?
What is the Data Encryption Standard (DES) key length and its transformation of plaintext blocks?
Signup and view all the answers
What is the purpose of a cryptosystem in data transmission?
What is the purpose of a cryptosystem in data transmission?
Signup and view all the answers
What is the purpose of journaling in database management?
What is the purpose of journaling in database management?
Signup and view all the answers
What is the primary purpose of the Package-and-Sign feature in Access?
What is the primary purpose of the Package-and-Sign feature in Access?
Signup and view all the answers
What type of security does Oracle provide for data?
What type of security does Oracle provide for data?
Signup and view all the answers
What are the key aspects of securing information transmission over the Internet?
What are the key aspects of securing information transmission over the Internet?
Signup and view all the answers
What do roles in Oracle allow for?
What do roles in Oracle allow for?
Signup and view all the answers
What is the primary purpose of proxy servers in a Web environment?
What is the primary purpose of proxy servers in a Web environment?
Signup and view all the answers
Study Notes
Database Security and Administration
- Security classes are assigned to database objects and subjects, with an ordered system of top secret (TS), secret (S), confidential (C), and unclassified (U).
- The Bell–LaPadula model imposes two restrictions on reading and writing database objects: Simple Security Property and *-Property.
- Multilevel relations in a relational DBMS involve assigning security classes to database objects, leading to the concept of a multilevel relation and views as a flexible security mechanism.
- Backup involves periodically copying the database and log file to offline storage media, essential for database recovery following failure.
- Journaling is the process of maintaining a log file of all changes made to the database, enabling effective recovery in case of failure.
- Integrity constraints contribute to maintaining a secure database by preventing invalid data and misleading results.
- Encryption encodes data with a special algorithm, rendering it unreadable without the decryption key, and some DBMSs provide encryption facilities for sensitive data.
- Cryptosystem is required to transmit data securely over insecure networks, and it includes encryption and decryption keys and algorithms.
- The Data Encryption Standard (DES) is a standard encryption algorithm developed by IBM, using a 56-bit key to transform each 64-bit block of plaintext.
- Most working systems are based on user keys shorter than the message, although longer keys are considered more secure.
- Encryption also protects data transmitted over communication lines.
- DES is not universally regarded as very secure, and some authors maintain that a larger key is required for security.
Database Security and Administration
- Backend database can be protected by assigning a password and specifying its location
- Setting a password for the database is available through the Encrypt with Password option in the File/Info section
- Trust Center can be used to trust (enable) the disabled content in a database and set security options for Office Access 2010 databases
- Package-and-Sign feature in Access places the database in an Access Deployment (.accdc) file and signs the package
- Oracle provides system security (user name and password mechanism) and data security (privileges)
- Oracle privileges include system privileges (action on any schema objects) and object privileges (action on specific objects)
- Roles in Oracle can be granted to users or a group of privileges can be granted to a role, which is then assigned to users
- Internet communication relies on TCP/IP, which was not designed with security in mind
- Privacy, integrity, authenticity, and nonrepudiation are key aspects of securing information transmission over the Internet
- Proxy servers in a Web environment intercept requests to determine if they can fulfill them and have two main purposes: improving performance and filtering requests
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge of database security classification with this quiz. Learn about assigning security classes to database objects and clearances for subjects.