Domain 8. Software Development security Flashcards
Aggregation
When a user does not have the clearance or permission to access specific information, but she does have the permission to access components of this information. She can then figure out the rest and obtain restricted information.
Inference
Ability to derive information that is not explicitly available
Polyinstatiation
Multiple instances of information depending of the clearence
Primary key
Unique identifier for each record
Normalization
Process of removing duplicates and ensuring that each attribute only describes the primary key
Entity integrity
PK field cant be null
Cardinality
Number of rows in the relations
Degree
Number of columns in the relations
Attribute
column
Tuple
Collection of attributes (raw)
ACID
Atomicity
Consistency
Isolation
Durability
DB Checkpoint
Known good point from which the DB can recover
DB Savepoint
Temporary backup that can be configured based on variables (time interval, number of transactions, etc)
DB Cell suppression
Technique used to hide specific cells
DB view
used to permit, allow or restrict users from viewing specific fields or records