Untitled Deck Flashcards
What is authentication?
Authentication is the process of validating user credentials to prevent unauthorized users from accessing a system.
What question does authentication evaluate?
Authentication evaluates the question: ‘Does this user have a legitimate right to access the system?’
How can authentication be checked?
Authentication can be checked by requesting the user to provide:
- Something the user knows (usually a password)
- Something the user owns (e.g., a magnetic card or badge)
- Physical characteristics of the user (e.g., signature or fingerprints)
What is the most common method of authentication?
The most common method of authentication is using a name and a password.
What are the two security subsystems in the Database Engine?
The two security subsystems are:
- Windows security
- SQL Server security
What does Windows security specify?
Windows security specifies security at the operating system level, using Windows user accounts for authentication.
What is SQL Server security?
SQL Server security specifies additional security at the system level for users who have logged on to the operating system.
What is a SQL Server login?
A SQL Server login is created within the system and is associated with a password, allowing access to the database server.
What is data encryption?
Data encryption is the process of scrambling information so that it is incomprehensible until decrypted by the intended recipient.
What are the components of the Database Engine’s encryption layers?
The components include:
- Symmetric keys
- Asymmetric keys
- Certificates
What is a public key certificate?
A public key certificate is a digitally signed statement that binds the value of a public key to the identity of the holder of the corresponding private key.
What information does a certificate contain?
A certificate contains:
- The subject’s public key value
- The subject’s identifier information
- Issuer identifier information
- The digital signature of the issuer
What is the first barrier to accessing SQL Server data?
The first barrier is the network logon, where a user must log on to the network before proceeding with the SQL Server login process.
What is the second barrier to accessing SQL Server data?
The second barrier is logging into SQL Server, where a user must be authenticated by SQL Server.
What is the third barrier to accessing SQL Server data?
The third barrier is gaining access to a specific database managed by SQL Server.
What is the final barrier to accessing SQL Server data?
The final barrier is gaining access to tables and other objects within the database, accomplished with permissions.
What is authorization?
Authorization is the process applied after authentication, determining what resources a user can access.
What does tracking changes mean?
Tracking changes means documenting the actions of unauthorized users on the system to protect against users with elevated privileges.