7

Click here to load reader

3 summary

Embed Size (px)

Citation preview

Page 1: 3 summary

Week 9 Database Security and Authorization

Threats to data security

Authorization

Authentication

View

Backup

Journalizing

Integrity

Encryption

user-defined procedures

Checking point of Countermeasures

summary Real-life example quiz

Page 2: 3 summary

summary Real-life example quiz

Week 9 Database Security and Authorization

A Typical example of database security in real life would be:

Students who can gain access to their electronic mark sheets and upgrade their marks as they wish. This would be a misuse of data.

Page 3: 3 summary

summary Real-life example quiz

Week 9 Database Security and Authorization

A Typical example of database authorization in real life would be:

A bank cashier who has the right to see the amounts of customer accounts and then divulgate them to robbers who, themselves can blackmail customers or threaten them and demand them ransoms. This is a badly granted right on the important data.

Page 4: 3 summary

1. Database security is the protection of the data against accidental or intentional loss, destruction, or misuse. A. True B. False

2. Which is not a threat to data security? A. Human error. B. Software failure. C. Theft and fraud. D. Forgetting a password. E. Loss of secrecy

3. The encryption is the compilation of the data by a special algorithm that renders the data accessible safely. A. True B. False

summary Real-life example quiz

Week 9 Database Security and Authorization

Enter answer,,,. 1. 2. 3.

Page 5: 3 summary

1. Database security is the protection of the data against accidental or intentional loss, destruction, or misuse. A. True B. False

2. Which is not a threat to data security? A. Human error. B. Software failure. C. Theft and fraud. D. Forgetting a password. E. Loss of secrecy

3. The encryption is the compilation of the data by a special algorithm that renders the data accessible safely. A. True B. False

summary Real-life example quiz

Week 9 Database Security and Authorization

Enter answer,,,. 1. A 2. D 3. B

Page 6: 3 summary

4. The granting of a right or privilege, which enables a subject to legitimately have access to a system or a system’s object is: A. Authentication B. Authorization C. Validation D. Verification E. Acceptance

5. What action to take in case of Database destruction? A. Rollback B. Start from scratch C. Buy a new DBMS D. Back up the system E. Switch to duplicate database

summary Real-life example quiz

Week 9 Database Security and Authorization

answer is: 4. 5.

Page 7: 3 summary

4. The granting of a right or privilege, which enables a subject to legitimately have access to a system or a system’s object is: A. Authentication B. Authorization C. Validation D. Verification E. Acceptance

5. What action to take in case of Database destruction? A. Rollback B. Start from scratch C. Buy a new DBMS D. Back up the system E. Switch to duplicate database

summary Real-life example quiz

Week 9 Database Security and Authorization

answer is: 4. B 5. E