Lecture 2 Flashcards
Authentication and Authorization
What are the 2 main steps to access data? (!!)
-Authentication: confirmation of identity to gain access
-Authorization: permissions given to users
What are the 3 levels of authentication in a database environment? (!!)
-OS level
-Database level
-Network/Third party level
What are 2 advantages to using OS Authentication?
-Convinience
-Centralized account administration
What is a challenge when applying database-level authentication?
A single user must have different passwords for each system which may lead to weak passwords
Name 2 types of Third-party authentication:
-Smart Card with PIN.
-Public key infrastructure (PKI): a framework that manages digital certificates and public-key encryption.
Which 2 types of policies should be used for maximum effectiveness? (!!)
-Clear/written policies
-Server-defined policies
What are 4 password policies/attributes that may be used in database servers? (!!)
-Complexity.
-Limited failed attempts.
-Expired passwords (regularly changing passwords).
-No password reuse.
What are 3 common standards in equipment usage agreements?
-Password discretion (complexity)
-Password sharing
-Password storage
What are the 3 tasks in user management?
-Adding users
-Removing users
-Assigning privileges to users
What are default accounts, and how do you deal with them? (!!)
They are created accounts with predefined credentials and privileges.
Credentials must be changed immediately as they can be found online.
What are 3 good practices in user management? (!!)
-Always change the default passwords of new users
-Enforcing strong password policies
-Save passwords in encrypted file
What is a privilege and give 3 examples of them? (!!)
A privilege is the ability to access a specific resource or do a specific action.
Examples: Read, write, execute.
What are 3 tasks in managing privileges? (!!)
-Granting privilege
-denying privilege
-revoking privilege
What are “Roles”, and how do they help?
A combination of privileges that can be assigned to multiple users or objects.
Saves time and centralizes administration.
What are the 3 types of roles?
-User-defined
-Application: defines what applications can do.
-Public: a way to assign privileges to all users.