Lecture 2 Flashcards

Authentication and Authorization

1
Q

What are the 2 main steps to access data? (!!)

A

-Authentication: confirmation of identity to gain access

-Authorization: permissions given to users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 3 levels of authentication in a database environment? (!!)

A

-OS level
-Database level
-Network/Third party level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are 2 advantages to using OS Authentication?

A

-Convinience

-Centralized account administration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a challenge when applying database-level authentication?

A

A single user must have different passwords for each system which may lead to weak passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name 2 types of Third-party authentication:

A

-Smart Card with PIN.

-Public key infrastructure (PKI): a framework that manages digital certificates and public-key encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which 2 types of policies should be used for maximum effectiveness? (!!)

A

-Clear/written policies
-Server-defined policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are 4 password policies/attributes that may be used in database servers? (!!)

A

-Complexity.

-Limited failed attempts.

-Expired passwords (regularly changing passwords).

-No password reuse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are 3 common standards in equipment usage agreements?

A

-Password discretion (complexity)

-Password sharing

-Password storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the 3 tasks in user management?

A

-Adding users

-Removing users

-Assigning privileges to users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are default accounts, and how do you deal with them? (!!)

A

They are created accounts with predefined credentials and privileges.
Credentials must be changed immediately as they can be found online.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are 3 good practices in user management? (!!)

A

-Always change the default passwords of new users

-Enforcing strong password policies

-Save passwords in encrypted file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a privilege and give 3 examples of them? (!!)

A

A privilege is the ability to access a specific resource or do a specific action.

Examples: Read, write, execute.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are 3 tasks in managing privileges? (!!)

A

-Granting privilege
-denying privilege
-revoking privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are “Roles”, and how do they help?

A

A combination of privileges that can be assigned to multiple users or objects.

Saves time and centralizes administration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the 3 types of roles?

A

-User-defined

-Application: defines what applications can do.

-Public: a way to assign privileges to all users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is inference? (!!)

A

A method for unauthorized users to obtain sensitive information through assumptions based on the database’s responses.

17
Q

What are the 2 types of inference? (!!)

A
  • logical inference: making assumptions based on the database responses.
  • statistical inference: using statistical data to find unauthorized information.
18
Q

What are 4 techniques to limit inference? (list and explain) (!!)

A
  • Polyinstantiation: having multiple fake instances of a record, but may confuse employees.
  • Logging and monitoring: monitoring queries and logs for suspicious activity.
  • Limit user requests: limits the users capability in making queries, like query size, frequency, functions, etc.
  • Limit query responses: limit the information that is provided by the query response. Like returning ranges instead of exact numbers.