Ch. 5 - Vocab Flashcards

1
Q

attribute

A

columns of a relation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

blind SQL injection

A

allows attacker to infer data in database system based on asking the server true/false questions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

cascading authorizations

A

with the grant option, an access right can cascade through a number user; this applies to revocations as well

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

compromise

A

release of secure or private/confidential information to an untrusted environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

data center

A

houses a large number of servers, storage devices, and network switches and equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

data swapping

A

creating pairs of records with similar attributes and then interchanging identifying or sensitive data values among the pairs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

database

A

structured collection of data stored for use by one or more applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

database access control

A

different rights such as create, insert, delete, update, read, and write can be applied to an entire database, to individual tables, or to selected rows or columns within a table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

database management system

A

suite of programs for constructing and maintaining the database and for offering ad hoc query facilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

defensive coding

A

techniques include:
Manual defensive coding practices
Parameterized query insertion
SQL DOM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

detection

A

methods include:
Signature-based
Anomaly-based
Code analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

end-of-line comment

A

Consists of “–”, so remaining queries would not be treated as code, but comments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

foreign key

A

used to create relationships between tables, attributes of a primary key which identify another table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

inband attack

A

uses the same communication channel for injecting SQL code and retrieving results

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

inference

A

deducing unauthorized information from the legitimate responses received

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

inference channel

A

information transfer path by which unauthorized is obtained

17
Q

inferential attack

A

reconstruction of information based on sending requests and observing the resultant behavior

18
Q

out-of-band attack

A

data are retrieved using a different channel

19
Q

parameterized query insertion

A

to more accurately specify the structure of an SQL query and pass the value parameters to it separately

20
Q

partitioning

A

division of a logical database or its constituent elements into distinct independent parts

21
Q

piggybacked queries

A

additional queries beyond the intended query

22
Q

primary key

A

a portion of a row used to uniquely identify a row in a table

23
Q

query language

A

provides a uniform interface to the database for users and applications through a declarative language

24
Q

relation

A

basic building block of a relational database, a flat table

25
Q

relational database

A

enables the creation of multiple tables tied together by a unique identifier that is present in all tables

26
Q

relational database management system

A

It is the software that executes queries on the data, including adding, updating, and searching for values for relational databases

27
Q

run-time prevention

A

checks queries at runtime to see if it conforms to a model of expected queries

28
Q

Structured Query Language

A

standardized language that can be used to define schema, manipulate, and query data in a relational database

29
Q

SQL injection attack

A

designed to exploit the nature of Web application pages. The attacker terminates the text string and appends a new command to query or manipulate the database

30
Q

tautology

A

a statement that is always true, allows all rows in a query to be selected

31
Q

tuple

A

rows of relation

32
Q

view

A

the result of a query that returns selected rows and columns from one or more tables, providing restricted access to a database