際際滷

際際滷Share a Scribd company logo
Week 9 Database Security and Authorization
summary

Real-life example

 Threats to data security

 Authorization
 Authentication
 View
 Backup
 Journalizing
 Integrity
 Encryption

 user-defined procedures
 Checking point of Countermeasures

quiz
Week 9 Database Security and Authorization
summary

Real-life example

quiz

A Typical example of database security in real life would be:

Students who can gain access to their electronic mark sheets and
upgrade their marks as they wish. This would be a misuse of data.
Week 9 Database Security and Authorization
summary

Real-life example

quiz

A Typical example of database authorization in real life
would be:
A bank cashier who has the right to see the amounts of
customer accounts and then divulgate them to robbers
who, themselves can blackmail customers or threaten them
and demand them ransoms.
This is a badly granted right on the important data.
Week 9 Database Security and Authorization
summary

Real-life example

quiz

1. Database security is the protection of the data against accidental or
intentional loss, destruction, or misuse.
A. True
B. False
2. Which is not a threat to data security?
A. Human error.
B. Software failure.
C. Theft and fraud.
D. Forgetting a password.
E. Loss of secrecy

3. The encryption is the compilation of the data by a special algorithm that
renders the data accessible safely.
A. True
B. False
Enter answer,,,.
1.

2.

3.
Week 9 Database Security and Authorization
summary

Real-life example

quiz

1. Database security is the protection of the data against accidental or
intentional loss, destruction, or misuse.
A. True
B. False
2. Which is not a threat to data security?
A. Human error.
B. Software failure.
C. Theft and fraud.
D. Forgetting a password.
E. Loss of secrecy

3. The encryption is the compilation of the data by a special algorithm that
renders the data accessible safely.
A. True
B. False
Enter answer,,,.
1. A

2. D

3. B
Week 9 Database Security and Authorization
summary

Real-life example

quiz

4. The granting of a right or privilege, which enables a subject to legitimately
have access to a system or a systems object is:
A. Authentication
B. Authorization
C. Validation
D. Verification
E. Acceptance
5. What action to take in case of Database destruction?
A. Rollback
B. Start from scratch
C. Buy a new DBMS
D. Back up the system
E. Switch to duplicate database

answer is:
4.

5.
Week 9 Database Security and Authorization
summary

Real-life example

quiz

4. The granting of a right or privilege, which enables a subject to legitimately
have access to a system or a systems object is:
A. Authentication
B. Authorization
C. Validation
D. Verification
E. Acceptance
5. What action to take in case of Database destruction?
A. Rollback
B. Start from scratch
C. Buy a new DBMS
D. Back up the system
E. Switch to duplicate database

answer is:
4. B

5. E

More Related Content

Similar to 3 summary (20)

Download full ebook of n instant download pdf
Download full ebook of n instant download pdfDownload full ebook of n instant download pdf
Download full ebook of n instant download pdf
elougabakst
Download full ebook of d instant download pdf
Download full ebook of d instant download pdfDownload full ebook of d instant download pdf
Download full ebook of d instant download pdf
aminosedades60
Assessment with few question Grade 9 A & C.pptx
Assessment with few question Grade 9 A & C.pptxAssessment with few question Grade 9 A & C.pptx
Assessment with few question Grade 9 A & C.pptx
dejen6
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
ssuser2209e8
test bank MANAGEMENT of INFORMATION SECURITY, Fifth Edition
test bank MANAGEMENT of INFORMATION SECURITY, Fifth Editiontest bank MANAGEMENT of INFORMATION SECURITY, Fifth Edition
test bank MANAGEMENT of INFORMATION SECURITY, Fifth Edition
husseinalshomali
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdfSECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
JohnRicos
Residency ResearchISOL 536 Security Architecture and Design.docx
Residency ResearchISOL 536 Security Architecture and Design.docxResidency ResearchISOL 536 Security Architecture and Design.docx
Residency ResearchISOL 536 Security Architecture and Design.docx
brittneyj3
Top Network Security Interview Questions That You Should Know.pptx
Top Network Security Interview Questions That You Should Know.pptxTop Network Security Interview Questions That You Should Know.pptx
Top Network Security Interview Questions That You Should Know.pptx
Infosectrain3
CISSP Exam-Certified Information Systems Security Professional
CISSP Exam-Certified Information Systems Security Professional CISSP Exam-Certified Information Systems Security Professional
CISSP Exam-Certified Information Systems Security Professional
Isabella789
EM - Security and Privacy Incidents - Module 4 Powerpoint Presentation
EM - Security and Privacy Incidents - Module 4 Powerpoint PresentationEM - Security and Privacy Incidents - Module 4 Powerpoint Presentation
EM - Security and Privacy Incidents - Module 4 Powerpoint Presentation
trevor501353
dokumen_tips_computer_security_by_william_stallings_ch_1_mcq.docx
dokumen_tips_computer_security_by_william_stallings_ch_1_mcq.docxdokumen_tips_computer_security_by_william_stallings_ch_1_mcq.docx
dokumen_tips_computer_security_by_william_stallings_ch_1_mcq.docx
ams1ams11
Cissp cbk final_exam-answers_v5.5
Cissp cbk final_exam-answers_v5.5Cissp cbk final_exam-answers_v5.5
Cissp cbk final_exam-answers_v5.5
madunix
Data base security & integrity
Data base security &  integrityData base security &  integrity
Data base security & integrity
Pooja Dixit
Cis 333 Education Redefined - snaptutorial.com
Cis 333     Education Redefined - snaptutorial.comCis 333     Education Redefined - snaptutorial.com
Cis 333 Education Redefined - snaptutorial.com
DavisMurphyC75
IT 549 Scenario Assignment Module Six Guidelines and Rubric .docx
IT 549 Scenario Assignment Module Six Guidelines and Rubric .docxIT 549 Scenario Assignment Module Six Guidelines and Rubric .docx
IT 549 Scenario Assignment Module Six Guidelines and Rubric .docx
vrickens
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
infosec train
Security in network computing
Security in network computingSecurity in network computing
Security in network computing
Manoj VNV
Module1_Intro to Security1111111_Final.ppt
Module1_Intro to Security1111111_Final.pptModule1_Intro to Security1111111_Final.ppt
Module1_Intro to Security1111111_Final.ppt
VijaykumarMaloth2
Module1_Intro to Security_Final.ppt power point
Module1_Intro to Security_Final.ppt power pointModule1_Intro to Security_Final.ppt power point
Module1_Intro to Security_Final.ppt power point
Madeena Saifullah
Module1_Intro to Security_Finallllllll.ppt
Module1_Intro to Security_Finallllllll.pptModule1_Intro to Security_Finallllllll.ppt
Module1_Intro to Security_Finallllllll.ppt
TRIOSTECHNOLOGIES2
Download full ebook of n instant download pdf
Download full ebook of n instant download pdfDownload full ebook of n instant download pdf
Download full ebook of n instant download pdf
elougabakst
Download full ebook of d instant download pdf
Download full ebook of d instant download pdfDownload full ebook of d instant download pdf
Download full ebook of d instant download pdf
aminosedades60
Assessment with few question Grade 9 A & C.pptx
Assessment with few question Grade 9 A & C.pptxAssessment with few question Grade 9 A & C.pptx
Assessment with few question Grade 9 A & C.pptx
dejen6
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
ssuser2209e8
test bank MANAGEMENT of INFORMATION SECURITY, Fifth Edition
test bank MANAGEMENT of INFORMATION SECURITY, Fifth Editiontest bank MANAGEMENT of INFORMATION SECURITY, Fifth Edition
test bank MANAGEMENT of INFORMATION SECURITY, Fifth Edition
husseinalshomali
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdfSECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
JohnRicos
Residency ResearchISOL 536 Security Architecture and Design.docx
Residency ResearchISOL 536 Security Architecture and Design.docxResidency ResearchISOL 536 Security Architecture and Design.docx
Residency ResearchISOL 536 Security Architecture and Design.docx
brittneyj3
Top Network Security Interview Questions That You Should Know.pptx
Top Network Security Interview Questions That You Should Know.pptxTop Network Security Interview Questions That You Should Know.pptx
Top Network Security Interview Questions That You Should Know.pptx
Infosectrain3
CISSP Exam-Certified Information Systems Security Professional
CISSP Exam-Certified Information Systems Security Professional CISSP Exam-Certified Information Systems Security Professional
CISSP Exam-Certified Information Systems Security Professional
Isabella789
EM - Security and Privacy Incidents - Module 4 Powerpoint Presentation
EM - Security and Privacy Incidents - Module 4 Powerpoint PresentationEM - Security and Privacy Incidents - Module 4 Powerpoint Presentation
EM - Security and Privacy Incidents - Module 4 Powerpoint Presentation
trevor501353
dokumen_tips_computer_security_by_william_stallings_ch_1_mcq.docx
dokumen_tips_computer_security_by_william_stallings_ch_1_mcq.docxdokumen_tips_computer_security_by_william_stallings_ch_1_mcq.docx
dokumen_tips_computer_security_by_william_stallings_ch_1_mcq.docx
ams1ams11
Cissp cbk final_exam-answers_v5.5
Cissp cbk final_exam-answers_v5.5Cissp cbk final_exam-answers_v5.5
Cissp cbk final_exam-answers_v5.5
madunix
Data base security & integrity
Data base security &  integrityData base security &  integrity
Data base security & integrity
Pooja Dixit
Cis 333 Education Redefined - snaptutorial.com
Cis 333     Education Redefined - snaptutorial.comCis 333     Education Redefined - snaptutorial.com
Cis 333 Education Redefined - snaptutorial.com
DavisMurphyC75
IT 549 Scenario Assignment Module Six Guidelines and Rubric .docx
IT 549 Scenario Assignment Module Six Guidelines and Rubric .docxIT 549 Scenario Assignment Module Six Guidelines and Rubric .docx
IT 549 Scenario Assignment Module Six Guidelines and Rubric .docx
vrickens
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
infosec train
Security in network computing
Security in network computingSecurity in network computing
Security in network computing
Manoj VNV
Module1_Intro to Security1111111_Final.ppt
Module1_Intro to Security1111111_Final.pptModule1_Intro to Security1111111_Final.ppt
Module1_Intro to Security1111111_Final.ppt
VijaykumarMaloth2
Module1_Intro to Security_Final.ppt power point
Module1_Intro to Security_Final.ppt power pointModule1_Intro to Security_Final.ppt power point
Module1_Intro to Security_Final.ppt power point
Madeena Saifullah
Module1_Intro to Security_Finallllllll.ppt
Module1_Intro to Security_Finallllllll.pptModule1_Intro to Security_Finallllllll.ppt
Module1_Intro to Security_Finallllllll.ppt
TRIOSTECHNOLOGIES2

More from Mr Patrick NIYISHAKA (20)

2 ddb architecture
2 ddb architecture2 ddb architecture
2 ddb architecture
Mr Patrick NIYISHAKA
4 summary
4 summary4 summary
4 summary
Mr Patrick NIYISHAKA
3 summary
3 summary3 summary
3 summary
Mr Patrick NIYISHAKA
2 con control
2 con control2 con control
2 con control
Mr Patrick NIYISHAKA
1 con exe
1 con exe1 con exe
1 con exe
Mr Patrick NIYISHAKA
1 basic concepts
1 basic concepts1 basic concepts
1 basic concepts
Mr Patrick NIYISHAKA
2 recovery
2 recovery2 recovery
2 recovery
Mr Patrick NIYISHAKA
3 transaction
3 transaction3 transaction
3 transaction
Mr Patrick NIYISHAKA
3 summary
3 summary3 summary
3 summary
Mr Patrick NIYISHAKA
1 query processing
1 query processing1 query processing
1 query processing
Mr Patrick NIYISHAKA
1 query processing
1 query processing1 query processing
1 query processing
Mr Patrick NIYISHAKA
2 optimization
2 optimization2 optimization
2 optimization
Mr Patrick NIYISHAKA
2 collision
2 collision2 collision
2 collision
Mr Patrick NIYISHAKA
4 summary
4 summary4 summary
4 summary
Mr Patrick NIYISHAKA
3 summary
3 summary3 summary
3 summary
Mr Patrick NIYISHAKA
2 normalization
2 normalization2 normalization
2 normalization
Mr Patrick NIYISHAKA
1 fn dependency
1 fn dependency1 fn dependency
1 fn dependency
Mr Patrick NIYISHAKA
4 summary
4 summary4 summary
4 summary
Mr Patrick NIYISHAKA
2 dml
2 dml2 dml
2 dml
Mr Patrick NIYISHAKA
1 ddl
1 ddl1 ddl
1 ddl
Mr Patrick NIYISHAKA

Recently uploaded (20)

TLE 7 - 2nd Topic - Codes and Standards in Industrial Arts Services.pptx
TLE 7 - 2nd Topic - Codes and Standards in Industrial Arts Services.pptxTLE 7 - 2nd Topic - Codes and Standards in Industrial Arts Services.pptx
TLE 7 - 2nd Topic - Codes and Standards in Industrial Arts Services.pptx
RizaBedayo
Modeling-Simple-Equation-Using-Bar-Models.pptx
Modeling-Simple-Equation-Using-Bar-Models.pptxModeling-Simple-Equation-Using-Bar-Models.pptx
Modeling-Simple-Equation-Using-Bar-Models.pptx
maribethlacno2
The Broccoli Dog's inner voice (look A)
The Broccoli Dog's inner voice  (look A)The Broccoli Dog's inner voice  (look A)
The Broccoli Dog's inner voice (look A)
merasan
Kaun TALHA quiz Prelims - El Dorado 2025
Kaun TALHA quiz Prelims - El Dorado 2025Kaun TALHA quiz Prelims - El Dorado 2025
Kaun TALHA quiz Prelims - El Dorado 2025
Conquiztadors- the Quiz Society of Sri Venkateswara College
Adventure Activities Final By H R Gohil Sir
Adventure Activities Final By H R Gohil SirAdventure Activities Final By H R Gohil Sir
Adventure Activities Final By H R Gohil Sir
GUJARATCOMMERCECOLLE
CBSE Arabic Grammar - Class 10 ppt.pptx
CBSE Arabic Grammar - Class 10   ppt.pptxCBSE Arabic Grammar - Class 10   ppt.pptx
CBSE Arabic Grammar - Class 10 ppt.pptx
suhail849886
Eng7-Q4-Lesson 1 Part 1 Understanding Discipline-Specific Words, Voice, and T...
Eng7-Q4-Lesson 1 Part 1 Understanding Discipline-Specific Words, Voice, and T...Eng7-Q4-Lesson 1 Part 1 Understanding Discipline-Specific Words, Voice, and T...
Eng7-Q4-Lesson 1 Part 1 Understanding Discipline-Specific Words, Voice, and T...
sandynavergas1
cervical spine mobilization manual therapy .pdf
cervical spine mobilization manual therapy .pdfcervical spine mobilization manual therapy .pdf
cervical spine mobilization manual therapy .pdf
SamarHosni3
DUBLIN PROGRAM DUBLIN PROGRAM DUBLIN PROGRAM
DUBLIN PROGRAM DUBLIN PROGRAM DUBLIN PROGRAMDUBLIN PROGRAM DUBLIN PROGRAM DUBLIN PROGRAM
DUBLIN PROGRAM DUBLIN PROGRAM DUBLIN PROGRAM
vlckovar
Digital Tools with AI for e-Content Development.pptx
Digital Tools with AI for e-Content Development.pptxDigital Tools with AI for e-Content Development.pptx
Digital Tools with AI for e-Content Development.pptx
Dr. Sarita Anand
How to attach file using upload button Odoo 18
How to attach file using upload button Odoo 18How to attach file using upload button Odoo 18
How to attach file using upload button Odoo 18
Celine George
TPR Data strategy 2025 (1).pdf Data strategy
TPR Data strategy 2025 (1).pdf Data strategyTPR Data strategy 2025 (1).pdf Data strategy
TPR Data strategy 2025 (1).pdf Data strategy
Henry Tapper
How to Setup WhatsApp in Odoo 17 - Odoo 際際滷s
How to Setup WhatsApp in Odoo 17 - Odoo 際際滷sHow to Setup WhatsApp in Odoo 17 - Odoo 際際滷s
How to Setup WhatsApp in Odoo 17 - Odoo 際際滷s
Celine George
English 4 Quarter 4 Week 4 Classroom Obs
English 4 Quarter 4 Week 4 Classroom ObsEnglish 4 Quarter 4 Week 4 Classroom Obs
English 4 Quarter 4 Week 4 Classroom Obs
NerissaMendez1
Useful environment methods in Odoo 18 - Odoo 際際滷s
Useful environment methods in Odoo 18 - Odoo 際際滷sUseful environment methods in Odoo 18 - Odoo 際際滷s
Useful environment methods in Odoo 18 - Odoo 際際滷s
Celine George
How to Configure Flexible Working Schedule in Odoo 18 Employee
How to Configure Flexible Working Schedule in Odoo 18 EmployeeHow to Configure Flexible Working Schedule in Odoo 18 Employee
How to Configure Flexible Working Schedule in Odoo 18 Employee
Celine George
A PPT Presentation on The Princess and the God: A tale of ancient India by A...
A PPT Presentation on The Princess and the God: A tale of ancient India  by A...A PPT Presentation on The Princess and the God: A tale of ancient India  by A...
A PPT Presentation on The Princess and the God: A tale of ancient India by A...
Beena E S
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
TLE 7 - 3rd Topic - Hand Tools, Power Tools, Instruments, and Equipment Used ...
TLE 7 - 3rd Topic - Hand Tools, Power Tools, Instruments, and Equipment Used ...TLE 7 - 3rd Topic - Hand Tools, Power Tools, Instruments, and Equipment Used ...
TLE 7 - 3rd Topic - Hand Tools, Power Tools, Instruments, and Equipment Used ...
RizaBedayo
Principle and Practices of Animal Breeding || Boby Basnet
Principle and Practices of Animal Breeding || Boby BasnetPrinciple and Practices of Animal Breeding || Boby Basnet
Principle and Practices of Animal Breeding || Boby Basnet
Boby Basnet
TLE 7 - 2nd Topic - Codes and Standards in Industrial Arts Services.pptx
TLE 7 - 2nd Topic - Codes and Standards in Industrial Arts Services.pptxTLE 7 - 2nd Topic - Codes and Standards in Industrial Arts Services.pptx
TLE 7 - 2nd Topic - Codes and Standards in Industrial Arts Services.pptx
RizaBedayo
Modeling-Simple-Equation-Using-Bar-Models.pptx
Modeling-Simple-Equation-Using-Bar-Models.pptxModeling-Simple-Equation-Using-Bar-Models.pptx
Modeling-Simple-Equation-Using-Bar-Models.pptx
maribethlacno2
The Broccoli Dog's inner voice (look A)
The Broccoli Dog's inner voice  (look A)The Broccoli Dog's inner voice  (look A)
The Broccoli Dog's inner voice (look A)
merasan
Adventure Activities Final By H R Gohil Sir
Adventure Activities Final By H R Gohil SirAdventure Activities Final By H R Gohil Sir
Adventure Activities Final By H R Gohil Sir
GUJARATCOMMERCECOLLE
CBSE Arabic Grammar - Class 10 ppt.pptx
CBSE Arabic Grammar - Class 10   ppt.pptxCBSE Arabic Grammar - Class 10   ppt.pptx
CBSE Arabic Grammar - Class 10 ppt.pptx
suhail849886
Eng7-Q4-Lesson 1 Part 1 Understanding Discipline-Specific Words, Voice, and T...
Eng7-Q4-Lesson 1 Part 1 Understanding Discipline-Specific Words, Voice, and T...Eng7-Q4-Lesson 1 Part 1 Understanding Discipline-Specific Words, Voice, and T...
Eng7-Q4-Lesson 1 Part 1 Understanding Discipline-Specific Words, Voice, and T...
sandynavergas1
cervical spine mobilization manual therapy .pdf
cervical spine mobilization manual therapy .pdfcervical spine mobilization manual therapy .pdf
cervical spine mobilization manual therapy .pdf
SamarHosni3
DUBLIN PROGRAM DUBLIN PROGRAM DUBLIN PROGRAM
DUBLIN PROGRAM DUBLIN PROGRAM DUBLIN PROGRAMDUBLIN PROGRAM DUBLIN PROGRAM DUBLIN PROGRAM
DUBLIN PROGRAM DUBLIN PROGRAM DUBLIN PROGRAM
vlckovar
Digital Tools with AI for e-Content Development.pptx
Digital Tools with AI for e-Content Development.pptxDigital Tools with AI for e-Content Development.pptx
Digital Tools with AI for e-Content Development.pptx
Dr. Sarita Anand
How to attach file using upload button Odoo 18
How to attach file using upload button Odoo 18How to attach file using upload button Odoo 18
How to attach file using upload button Odoo 18
Celine George
TPR Data strategy 2025 (1).pdf Data strategy
TPR Data strategy 2025 (1).pdf Data strategyTPR Data strategy 2025 (1).pdf Data strategy
TPR Data strategy 2025 (1).pdf Data strategy
Henry Tapper
How to Setup WhatsApp in Odoo 17 - Odoo 際際滷s
How to Setup WhatsApp in Odoo 17 - Odoo 際際滷sHow to Setup WhatsApp in Odoo 17 - Odoo 際際滷s
How to Setup WhatsApp in Odoo 17 - Odoo 際際滷s
Celine George
English 4 Quarter 4 Week 4 Classroom Obs
English 4 Quarter 4 Week 4 Classroom ObsEnglish 4 Quarter 4 Week 4 Classroom Obs
English 4 Quarter 4 Week 4 Classroom Obs
NerissaMendez1
Useful environment methods in Odoo 18 - Odoo 際際滷s
Useful environment methods in Odoo 18 - Odoo 際際滷sUseful environment methods in Odoo 18 - Odoo 際際滷s
Useful environment methods in Odoo 18 - Odoo 際際滷s
Celine George
How to Configure Flexible Working Schedule in Odoo 18 Employee
How to Configure Flexible Working Schedule in Odoo 18 EmployeeHow to Configure Flexible Working Schedule in Odoo 18 Employee
How to Configure Flexible Working Schedule in Odoo 18 Employee
Celine George
A PPT Presentation on The Princess and the God: A tale of ancient India by A...
A PPT Presentation on The Princess and the God: A tale of ancient India  by A...A PPT Presentation on The Princess and the God: A tale of ancient India  by A...
A PPT Presentation on The Princess and the God: A tale of ancient India by A...
Beena E S
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
TLE 7 - 3rd Topic - Hand Tools, Power Tools, Instruments, and Equipment Used ...
TLE 7 - 3rd Topic - Hand Tools, Power Tools, Instruments, and Equipment Used ...TLE 7 - 3rd Topic - Hand Tools, Power Tools, Instruments, and Equipment Used ...
TLE 7 - 3rd Topic - Hand Tools, Power Tools, Instruments, and Equipment Used ...
RizaBedayo
Principle and Practices of Animal Breeding || Boby Basnet
Principle and Practices of Animal Breeding || Boby BasnetPrinciple and Practices of Animal Breeding || Boby Basnet
Principle and Practices of Animal Breeding || Boby Basnet
Boby Basnet

3 summary

  • 1. Week 9 Database Security and Authorization summary Real-life example Threats to data security Authorization Authentication View Backup Journalizing Integrity Encryption user-defined procedures Checking point of Countermeasures quiz
  • 2. Week 9 Database Security and Authorization summary Real-life example quiz A Typical example of database security in real life would be: Students who can gain access to their electronic mark sheets and upgrade their marks as they wish. This would be a misuse of data.
  • 3. Week 9 Database Security and Authorization summary Real-life example quiz A Typical example of database authorization in real life would be: A bank cashier who has the right to see the amounts of customer accounts and then divulgate them to robbers who, themselves can blackmail customers or threaten them and demand them ransoms. This is a badly granted right on the important data.
  • 4. Week 9 Database Security and Authorization summary Real-life example quiz 1. Database security is the protection of the data against accidental or intentional loss, destruction, or misuse. A. True B. False 2. Which is not a threat to data security? A. Human error. B. Software failure. C. Theft and fraud. D. Forgetting a password. E. Loss of secrecy 3. The encryption is the compilation of the data by a special algorithm that renders the data accessible safely. A. True B. False Enter answer,,,. 1. 2. 3.
  • 5. Week 9 Database Security and Authorization summary Real-life example quiz 1. Database security is the protection of the data against accidental or intentional loss, destruction, or misuse. A. True B. False 2. Which is not a threat to data security? A. Human error. B. Software failure. C. Theft and fraud. D. Forgetting a password. E. Loss of secrecy 3. The encryption is the compilation of the data by a special algorithm that renders the data accessible safely. A. True B. False Enter answer,,,. 1. A 2. D 3. B
  • 6. Week 9 Database Security and Authorization summary Real-life example quiz 4. The granting of a right or privilege, which enables a subject to legitimately have access to a system or a systems object is: A. Authentication B. Authorization C. Validation D. Verification E. Acceptance 5. What action to take in case of Database destruction? A. Rollback B. Start from scratch C. Buy a new DBMS D. Back up the system E. Switch to duplicate database answer is: 4. 5.
  • 7. Week 9 Database Security and Authorization summary Real-life example quiz 4. The granting of a right or privilege, which enables a subject to legitimately have access to a system or a systems object is: A. Authentication B. Authorization C. Validation D. Verification E. Acceptance 5. What action to take in case of Database destruction? A. Rollback B. Start from scratch C. Buy a new DBMS D. Back up the system E. Switch to duplicate database answer is: 4. B 5. E