Database Security Mechanisms and Techniques Overview

CrispNiobium avatar
CrispNiobium
·
·
Download

Start Quiz

Study Flashcards

18 Questions

What does the term 'cryptography' mean in Greek?

Secret writing

Which cryptographic technique is used to transform messages to become secure against all forms of attack?

Cryptography in general

In symmetric key encipherment, what is shared between the communicating parties?

Shared secret key

In asymmetric key encipherment, which key is used to encrypt the data being sent?

Public key

What is the purpose of hashing in cryptography?

To create a fixed-length digest message from the original message

Which cryptographic technique is used to hide a message within another text or image?

Steganography

What is the primary purpose of encipherment as described in the text?

To hide data and maintain its confidentiality

Which term refers to the process of adding check values to data for the recipient to verify the integrity of data?

Data Integrity

How does a digital signature help in confirming a sender's identity?

By allowing the recipient to verify the sender's signature electronically

Which encryption technology mentioned in the text is used for hiding data within images?

Steganography

What is the role of a recipient when verifying data integrity using check values?

Computing the check values themselves on the received data

In the context of security mechanisms, what is the function of digital signatures?

Verifying the authenticity of senders

Which of the following is NOT a security mechanism discussed in the text?

Cryptography

What is the primary purpose of the Notarization security mechanism?

To prevent parties from denying their actions in a communication

Which security mechanism involves switching between different routing methods to confuse potential eavesdroppers?

Routing Control

What is the purpose of the Traffic Padding security mechanism?

To add non-useful data to real data, making the data as a whole misleading for data traffic analysis attacks

Which security mechanism is used to determine user access permissions to data and resources owned by the system?

Access Control

What is the primary purpose of the Authentication Exchange security mechanism?

To verify the identities of communicating parties

Study Notes

Cryptography

  • Cryptography refers to the science and art of transforming messages to become secure against all forms of attack.
  • It involves three techniques: Symmetric key encipherment, Asymmetric key encipherment, and Hashing.

Symmetric Key Encipherment

  • Uses a shared secret key between the communicating parties.
  • Encryption is performed using a single key.

Asymmetric Key Encipherment

  • Uses two keys: a public key and a private key.
  • Data is encrypted using the public key of the receiving party.
  • The private key is used for decryption.

Hashing

  • Creates a Fixed-length Digest Message from the content of the message.
  • The resulting digest message is much smaller than the original message.

Security Mechanisms

  • Encipherment: hides data to maintain confidentiality.
  • Data Integrity: adds check values to the data to verify its integrity.
  • Digital Signature: allows the sender to electronically sign data and the recipient to verify the signature.
  • Authentication Exchange: verifies the identity of both parties through message exchange.
  • Traffic Padding: adds non-useful data to real data to mislead data traffic analysis attacks.
  • Routing Control: selects and switches between routing methods to confuse eavesdroppers.
  • Notarization: uses a trusted third party to control communication and prevent denial.
  • Access Control: determines user access permissions to data and resources based on passwords or secret codes.

Explore an overview of security mechanisms and techniques for database security, including encipherment for maintaining confidentiality. Learn about encryption technologies like steganography and cryptography, essential for building a robust security service.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Role-Based Access Control (RBAC) Quiz
36 questions
Database Security Classification Quiz
25 questions
Database Security Model Quiz
20 questions
Use Quizgecko on...
Browser
Browser