Click here to load reader
Upload
niyishaka-patrick
View
24
Download
2
Embed Size (px)
Citation preview
Week 9 Database Security and Authorization
Threats to data security
Authorization
Authentication
View
Backup
Journalizing
Integrity
Encryption
user-defined procedures
Checking point of Countermeasures
summary Real-life example quiz
summary Real-life example quiz
Week 9 Database Security and Authorization
A Typical example of database security in real life would be:
Students who can gain access to their electronic mark sheets and upgrade their marks as they wish. This would be a misuse of data.
summary Real-life example quiz
Week 9 Database Security and Authorization
A Typical example of database authorization in real life would be:
A bank cashier who has the right to see the amounts of customer accounts and then divulgate them to robbers who, themselves can blackmail customers or threaten them and demand them ransoms. This is a badly granted right on the important data.
1. Database security is the protection of the data against accidental or intentional loss, destruction, or misuse. A. True B. False
2. Which is not a threat to data security? A. Human error. B. Software failure. C. Theft and fraud. D. Forgetting a password. E. Loss of secrecy
3. The encryption is the compilation of the data by a special algorithm that renders the data accessible safely. A. True B. False
summary Real-life example quiz
Week 9 Database Security and Authorization
Enter answer,,,. 1. 2. 3.
1. Database security is the protection of the data against accidental or intentional loss, destruction, or misuse. A. True B. False
2. Which is not a threat to data security? A. Human error. B. Software failure. C. Theft and fraud. D. Forgetting a password. E. Loss of secrecy
3. The encryption is the compilation of the data by a special algorithm that renders the data accessible safely. A. True B. False
summary Real-life example quiz
Week 9 Database Security and Authorization
Enter answer,,,. 1. A 2. D 3. B
4. The granting of a right or privilege, which enables a subject to legitimately have access to a system or a system’s object is: A. Authentication B. Authorization C. Validation D. Verification E. Acceptance
5. What action to take in case of Database destruction? A. Rollback B. Start from scratch C. Buy a new DBMS D. Back up the system E. Switch to duplicate database
summary Real-life example quiz
Week 9 Database Security and Authorization
answer is: 4. 5.
4. The granting of a right or privilege, which enables a subject to legitimately have access to a system or a system’s object is: A. Authentication B. Authorization C. Validation D. Verification E. Acceptance
5. What action to take in case of Database destruction? A. Rollback B. Start from scratch C. Buy a new DBMS D. Back up the system E. Switch to duplicate database
summary Real-life example quiz
Week 9 Database Security and Authorization
answer is: 4. B 5. E