3-23.2 Flashcards
What are the four DBMS security functions?
Integrity, Availability, Confidentiality, Privacy
What are some techniques used to ensure database Integrity?
Commit Operation (ensures consistent change), Rollback (ends a corrupt or invalid transaction), and OLTP (Online Transaction Processing Systems - Designed to optimize concurrency)
Describe the ACID model.
Atomicity (transactions in entirety or not at all), Consistency (transactions correct across all instances), Isolation (transactions cant interact until completed), and Durability (transactions can’t be rolled back once committed - errors fixed by new transactions).
What are checkpoints vs savepoints?
Checkpoints are snapshots in time, Savepoints are intermediate markers within a transaction that can be rolled back to.
What is data warehousing?
Combines data from multiple sources into a large DB for retrieval and trend analysis.
Name some confidentiality access controls.
Need to know, Least Privilege, Content, Context, Cell Supression, and Database Views.
What is data mining?
The process of analyzing data with tools that look for trends, correlations, or anomalies resulting in metadata.
What is aggregation?
Aggregation is when individual pieces of data are combined to create a bigger picture that may have greater sensitivity than the individual parts.
What is inference?
The ability to derive information that is not explicitly available. This has become increasingly dangerous with the use of AI.