Data Security Challenges Flashcards

1
Q

[Myth or Fact?]

Hackers cause most security breaches.

A

myth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

[Myth or Fact?]

Encryption is only one approach to securing data. Security also requires access control, data integrity, system availability and auditing.

A

Fact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

[Myth or Fact?]

Firewalls make your data secure.

A

Myth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Your computers must be physically inaccessible to unauthorized
users. This means that you must keep them in a secure physical
Environment.

A

Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The people responsible for system administration and data security at your site must be reliable. You may need to perform background checks on DBAs before making hiring decisions.

A

Personnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The procedures used in the operation of your system must assure reliable data.
One person might be responsible for
database backups. His/ her role is to be sure the database is up
and running.

A

Procedural

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Storage, access, manipulation, and transmission of data must be
safeguarded by technology that enforces your particular
information control policies

A

Technical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Basic Security Standards (ung laging tatlo)

A
  • Confidentiality
  • Integrity
  • Availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A secure system ensures the
confidentiality of data.
This means that it
allows individuals to see only the data which they are supposed to see.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Aspects of Confidentiality (4)

A
  1. Privacy of Communication
    2, Secure Storage of Sensitive Data
  2. Authenticated Users
  3. Granular Access Control
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

is the process by which a user’s identity is checked.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

is the process by which the user’s privileges are ascertained.

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

is the process by which the user’s access to physical data in the application is limited, based on his privileges.

A

Access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A secure system ensures that the data it contains is valid.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

means that data is protected from deletion and corruption, both while it resides within the database, and while it is being transmitted over the network.

A

Data integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

is the ability to maintain valid relationships between values in the database, according to rules that have been defined.

A

Referential integrity

16
Q

A secure system makes data available to authorized users, without delay.

A

Availability

17
Q

System Availability Aspects (4)

A
  1. Resistance
  2. Scalability
  3. flexibility
  4. ease of use
18
Q

Secure system must be designed to fend off situations, or deliberate attacks, which might put it out of commision.

A

Resistance

19
Q

System performance must remain adequate regardless of the number of users or processes demanding service.

A

Scalability

20
Q

Administrators must have adequate means of managing the user population.

A

Flexibility

21
Q

The security implementation itself must not diminish the ability of valid users to get their work done.

A

Ease of use

22
Q

The integrity and privacy of data are at risk from unauthorized users, external sources listening in on the network, and internal users giving away the store.

A

Availability

23
Q

Potential attacks (7)

A
  1. Data Tampering
  2. Eavesdropping and Data Theft
  3. Falsifying User Identities
  4. Password-Related Threats
  5. Unauthorized Access to Tables and Columns
  6. Unauthorized Access to Data Rows
  7. Lack of Accountability