Database_Security_Flashcards_More

1
Q

What is encryption?

A

Encryption is a security method where information is encoded so that only authorized parties can access it. It transforms readable data (plaintext) into an unreadable format (ciphertext) using an encryption algorithm and a key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is encryption important?

A
  1. Data Security
  2. Privacy Compliance
  3. Trust
  4. Data Integrity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the types of data that require encryption?

A
  1. Personal Identifiable Information (PII)
  2. Financial Information
  3. Confidential Business Information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is symmetric encryption?

A

Symmetric encryption uses a single key for both encryption and decryption. It is efficient and suitable for encrypting large volumes of data, such as database files or backups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is asymmetric encryption?

A

Asymmetric encryption employs a pair of keys: a public key for encryption and a private key for decryption. It is more secure but also more computationally intensive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are common algorithms for symmetric encryption?

A
  1. Advanced Encryption Standard (AES)
  2. Triple Data Encryption Standard (3DES)
  3. Blowfish
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are common algorithms for asymmetric encryption?

A
  1. RSA (Rivest-Shamir-Adleman)
  2. Elliptic Curve Cryptography (ECC)
  3. Digital Signature Algorithm (DSA)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is encryption at rest?

A

Encryption at rest protects data stored within the database or on disk. Techniques include Transparent Data Encryption (TDE) and file-system level encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is encryption in transit?

A

Encryption in transit secures data as it moves between the database and applications or between servers. Implemented through protocols like TLS and SSL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the difference between application-level and database-level encryption?

A

Application-Level: The application encrypts data before sending it to the database, providing fine-grained control.
Database-Level: The database system manages encryption, offering a straightforward implementation but less flexibility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are best practices for secure data retrieval in encrypted databases?

A
  1. Implement Role-Based Access Control (RBAC)
  2. Use Secure Transmission Protocols
  3. Conduct Regular Audits and Monitoring
  4. Use Dedicated Encryption Key Management Solutions
  5. Employ Data Masking Techniques
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the pgcrypto extension in PostgreSQL?

A

The pgcrypto extension provides cryptographic functionality, supporting symmetric encryption (PGP_SYM, AES) and secure password storage through hashing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the purpose of hashing in password storage?

A

Hashing is a one-way process used for verifying the integrity of data. It ensures that passwords cannot be reversed or decrypted back to their original form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the difference between hashing and encryption?

A

Hashing is a one-way process for data integrity verification.
Encryption is a two-way process for data protection, allowing data to be made unreadable and then returned to its original form using a key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why is the Blowfish algorithm recommended for password hashing in PostgreSQL?

A

Blowfish is favoured for its balance of security and performance, allowing the adjustment of its cost factor to remain robust against increasing computational power.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a salt in the context of password hashing?

A

A salt is a random sequence of characters added to the input of a hash function to produce unique hash values, even for identical passwords, enhancing security.

17
Q

What are best practices for using salts in password hashing?

A
  1. Use a unique salt for each password.
  2. Ensure salts are sufficiently long and random.
  3. Combine salts with secure and slow cryptographic hash functions, such as bcrypt.
18
Q

What is asymmetric encryption with RSA in PostgreSQL used for?

A

Asymmetric encryption with RSA is used for securing sensitive data by encrypting it with a public key and decrypting it with a private key.

19
Q

What are the security considerations for using asymmetric encryption?

A
  1. Properly secure the private key.
  2. Use a secure key management service for key storage.
  3. Ensure only authorized users have access to the necessary keys and encrypted data.