Chapter 5 Flashcards
a structured collection of data stored for use by one or more applications.
Database
a suite of programs for constructing and maintaining the database and for offering ad hoc query facilities to multiple users and applications
database management system (DBMS)
provides a uniform interface to the database for users and applications
query language
What is the basic building block of a relational database
table of data
In relational database parlance the basic building block is
relation
rows are referred to as
tuples
columns are referred to as
attributes
is defined to be a portion of a row used to uniquely identify a row in a table
primary key
to create a relationship between two tables, the attributes that define the primary key in one table must appear as attributes in another table, where they are referred to as
foreign keys
a ___ is a virtual table. a ____ is the result of a query that returns selected rows and columns from one or more tables.
view
the process of performing authorized queries and deducing unauthorized information from legitimate responses received.
inference
the information transfer path by which unauthorized data is obtained if referred to as ____
inference channel
Statistics are derived from a database by means of a _____
characteristic formula
where a user may infer confidential information about individual entities represented in the SDB
Compromise
Protection of an SDB. ____ rejects a query that can lead to a compromise. The answers provided are accurate
query restriction
protection of an SDB. ____ provides answers to all queries, but the answers are approximate
perturbation
What is the simplest form of query restriction
query size restriction
attribute values are exchanged (swapped) between records in sufficient quantity so that nothing can be deduced from the disclosure of individual records.
data swapping
the data in the SDB can be modified (perturbed) so as to produce statistics that cannot be used to infer values for individual record.
data perturbation
when a statistical query is made, the system can generate statistics that are modified from those that the original database would provide, again thwarting attempts to gain knowledge of individual records; this is referred to as _____
output perturbation
What is the main challenge in the use of perturbation techniques
to determine the average size of the error to be used.
As the size of the database grows, the effectiveness of perturbation techniques _____
increase
On of two Disadvantages for database encryption:
authorized users must have access to decryption key for the data for which they have access.
Key Management
On of two Disadvantages for database encryption:
when part or all of the database is encrypted, it becomes more difficult to perform record searching.
Inflexibility
____ is a complex collection of hardware and software. It requires a large storage capacity and requires skilled personnel to perform maintenance, disaster protection, update, and security.
DBMS (database management system)
A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.
cloud computing