Database Security Model Quiz
20 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Database security encompasses only the protection of the data held in a database

False

Breaches of security may affect only the data held in a database

False

Theft and fraud can alter data in a database

False

Database security should focus on reducing the opportunities for theft and fraud

<p>True</p> Signup and view all the answers

Loss of availability means data or the system cannot be accessed, severely impacting an organization's financial performance.

<p>True</p> Signup and view all the answers

Countermeasures to threats on computer systems range from physical controls to administrative procedures.

<p>True</p> Signup and view all the answers

The security of a DBMS is closely associated with the security of the operating system.

<p>True</p> Signup and view all the answers

Mandatory Access Control (MAC) is based on system-wide policies that cannot be changed by individual users and involves security class assignments and clearance for users.

<p>True</p> Signup and view all the answers

Setting a password for the database is available through the Encrypt with Password option in the File/Info section

<p>True</p> Signup and view all the answers

Roles in Oracle can be granted to users or a group of privileges can be granted to a role, which is then assigned to users

<p>True</p> Signup and view all the answers

Internet communication relies on TCP/IP, which was not designed with security in mind

<p>True</p> Signup and view all the answers

Proxy servers in a Web environment intercept requests to determine if they can fulfill them and have two main purposes: improving performance and filtering requests

<p>True</p> Signup and view all the answers

True or false: The Bell-LaPadula model imposes three restrictions on reading and writing database objects: Simple Security Property, *-Property, and Discretionary Access Control?

<p>False</p> Signup and view all the answers

True or false: Journaling is the process of maintaining a log file of all changes made to the database, enabling effective recovery in case of failure?

<p>True</p> Signup and view all the answers

True or false: The Data Encryption Standard (DES) uses a 64-bit key to transform each 56-bit block of plaintext?

<p>False</p> Signup and view all the answers

True or false: Most working systems are based on user keys longer than the message, as longer keys are considered more secure?

<p>False</p> Signup and view all the answers

PGP (Pretty Good Privacy) uses a 128-bit symmetric algorithm for bulk encryption, which is currently considered unbreakable by existing technologies and knowledge.

<p>True</p> Signup and view all the answers

Keys with 64 bits are likely breakable by major governments with special hardware, with 80-bit keys potentially becoming breakable in the future.

<p>True</p> Signup and view all the answers

RAID levels include RAID 0, RAID 1, RAID 0+1, RAID 2, RAID 3, RAID 4, RAID 5, and RAID 6, each with different redundancy and performance characteristics.

<p>True</p> Signup and view all the answers

Microsoft Office Access 2010 does not support SQL GRANT and REVOKE statements for access control, instead providing methods like splitting the database, setting a password, enabling disabled content, and packaging, signing, and deploying the database.

<p>True</p> Signup and view all the answers

Study Notes

Data Security and Administration in Database Management Systems

  • PGP (Pretty Good Privacy) uses a 128-bit symmetric algorithm for bulk encryption, which is currently considered unbreakable by existing technologies and knowledge.
  • Keys with 64 bits are likely breakable by major governments with special hardware, with 80-bit keys potentially becoming breakable in the future.
  • Asymmetric encryption, such as the public key cryptosystems, uses different keys for encryption and decryption, with the most well-known being RSA.
  • The hardware running the DBMS should be fault-tolerant, with RAID (Redundant Array of Independent Disks) technology providing redundancy and improved reliability.
  • RAID levels include RAID 0, RAID 1, RAID 0+1, RAID 2, RAID 3, RAID 4, RAID 5, and RAID 6, each with different redundancy and performance characteristics.
  • Microsoft Office Access 2010 does not support SQL GRANT and REVOKE statements for access control, instead providing methods like splitting the database, setting a password, enabling disabled content, and packaging, signing, and deploying the database.
  • Splitting the database, separating database tables from application objects, is the most secure way to protect data and can be done using the Database Splitter Wizard in Office Access 2010.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Description

Test your understanding of the security model for assigning security classes to database objects and subjects. Learn about the ordering of security classes and how clearances are assigned to subjects in the system.

More Like This

Use Quizgecko on...
Browser
Browser