Ch. 5 - Vocab Flashcards

1
Q

attribute

A

columns of a relation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

blind SQL injection

A

allows attacker to infer data in database system based on asking the server true/false questions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

cascading authorizations

A

with the grant option, an access right can cascade through a number user; this applies to revocations as well

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

compromise

A

release of secure or private/confidential information to an untrusted environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

data center

A

houses a large number of servers, storage devices, and network switches and equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

data swapping

A

creating pairs of records with similar attributes and then interchanging identifying or sensitive data values among the pairs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

database

A

structured collection of data stored for use by one or more applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

database access control

A

different rights such as create, insert, delete, update, read, and write can be applied to an entire database, to individual tables, or to selected rows or columns within a table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

database management system

A

suite of programs for constructing and maintaining the database and for offering ad hoc query facilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

defensive coding

A

techniques include:
Manual defensive coding practices
Parameterized query insertion
SQL DOM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

detection

A

methods include:
Signature-based
Anomaly-based
Code analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

end-of-line comment

A

Consists of “–”, so remaining queries would not be treated as code, but comments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

foreign key

A

used to create relationships between tables, attributes of a primary key which identify another table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

inband attack

A

uses the same communication channel for injecting SQL code and retrieving results

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

inference

A

deducing unauthorized information from the legitimate responses received

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

inference channel

A

information transfer path by which unauthorized is obtained

17
Q

inferential attack

A

reconstruction of information based on sending requests and observing the resultant behavior

18
Q

out-of-band attack

A

data are retrieved using a different channel

19
Q

parameterized query insertion

A

to more accurately specify the structure of an SQL query and pass the value parameters to it separately

20
Q

partitioning

A

division of a logical database or its constituent elements into distinct independent parts

21
Q

piggybacked queries

A

additional queries beyond the intended query

22
Q

primary key

A

a portion of a row used to uniquely identify a row in a table

23
Q

query language

A

provides a uniform interface to the database for users and applications through a declarative language

24
Q

relation

A

basic building block of a relational database, a flat table

25
relational database
enables the creation of multiple tables tied together by a unique identifier that is present in all tables
26
relational database management system
It is the software that executes queries on the data, including adding, updating, and searching for values for relational databases
27
run-time prevention
checks queries at runtime to see if it conforms to a model of expected queries
28
Structured Query Language
standardized language that can be used to define schema, manipulate, and query data in a relational database
29
SQL injection attack
designed to exploit the nature of Web application pages. The attacker terminates the text string and appends a new command to query or manipulate the database
30
tautology
a statement that is always true, allows all rows in a query to be selected
31
tuple
rows of relation
32
view
the result of a query that returns selected rows and columns from one or more tables, providing restricted access to a database