Data Base Flashcards
What is a PA file sight ?
- a ransomware protection and access auditing software
Traditional database security operates on three levels :
- Database level
- Access Level
- Perimeter Level
What is a database level?
- Data security has revolve four main practices
What is a Access level?
- Organizing users of a database according to different authorizing models and allowing for different privileges
What is perimeter level?
- Involves three main methods of building a wall around a data
What does key management means ?
It’s one of the database encryption disadvantages and it means that authorized users must have access to decryption key
What does inflexibility means ?
Its one of the database encryption disadvantages and it means that when a part or all the database encrypted it becomes difficult to search
Data masking definition:
- It’s replacing real data with fake-but-useable data for development , testing and training
Data Masking Includes :
Encryption , scrambling, Substitution and nulling out
Why Data Masking ?
Used for protecting data from insiders threats and mainly used in database backups and data mining
Database tokenization
- It is a technique that comes from credit card industry
- Replaces personally identifiable data with surrogate value
- The key of reversing that process is in separate Database
Physical database security
A range of best practices to protect physical services where data is held
- With industry shift to cloud-based data storage
In perimeter level what are the things that build a wall around a data?
- Firewalls and Web application firewalls , VPNs , User authentication
Firewalls vs. Web application firewalls
- Firewalls : protect a secure local network
- Web application firewalls : protects web web applications by acting like a barrier between external and internal network traffic
Cloud Database Security
- Cloud database dissolve perimeter and with no perimeter means data lose prevention (DLP)