5.2 Database Security Countermeasures P1 Flashcards

1
Q

What are the different types of countermeasures?

A

Computer based - mainly concerned with physical controls to administrative procedures
Policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does authentication work?

A

Can be protected by a password:
System password
Database password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the alternatives to password security (network)?

A

Kerberos - client / server authentication (all communication can also be encrypted using symmetric key cryptology)
Public Key Infrastructure issues a Digital Certificate (this is a password encrypted file that holds the identity of a user or an object)
SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Authorisation?

A

User / application are only given access to database objects they need to fulfil their function (records, fields)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do the roles work in authorisation?

A

Combine ‘groups of users’ into a role & grant privileges to role

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does creating views in authorisation involve?

A

Virtual relation that is produced upon request by particular user at time of request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does privileges work?

A

Assigned based on authentication given

User roles & privileges data are all stored in system catalogue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What actions can be performed by users in order to carry out on a given base table or view?

A
SELECT
INSERT
UPDATE
DELETE 
REFERENCES
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a backup / how does it work?

A

Periodically taking a copy of the database & log file (may include programs) to offline storage media
Stored in different location (insurance requirement)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does RAID stand for?

A

Redundant
Array
Independent
Disks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the characteristic of RAID?

A

Fault tolerant

DBMS should continue to operate even if one of the hardware components fails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is involved in Logging?

A

Contains information about all updates to database (transaction & checkpoint records)
Also used for auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What needs to be considered when auditing?

A
Ensure accuracy of input data
Ensure accuracy of data processing
Prevent and detect errors during program execution
Avoid unauthorised program alteration
Grant and monitor access to data
Ensure documentation is up-to-date
How well did you know this?
1
Not at all
2
3
4
5
Perfectly