Week 5 Flashcards

1
Q

Database security involves measures to avoid?

A
  1. Theft and fraud
  2. loss of confidentiality
  3. loss of privacy
  4. loss of integrity
  5. loss of availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Threat?

A

Threat is any situation or event, whether intentional or unintentional, that will adversely affect a system and consequently an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

2 jenis approach untuk access controls dalam DBMS?

A
  1. DAC (Discretionary Access Control)
    Each user is given appropriate access rights or privileges on specific database objects through the GRANT and REVOKE commands. GRANT command gives privileges to users and REVOKE command takes away privileges.
  2. MAC (Mandatory Access Control)
    This approach, each database object is assigned a SECURITY CLASS and each user is assigned a CLEARANCE for a security class, and RULES are imposed on reading and writing of database objects by users.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is View?

A

A view is the dynamic result of one or more relational operations operating on the base relations to produce another relation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Backup?

A

The process of periodically copying of the database and log file (and possibly programs) to offline storage media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Journaling?

A

The process of keeping and maintaining a log file ( or journal) of all changes made to the database to enable recovery to be undertaken effectively in the event of a failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Integrity?

A

Prevents data from becoming invalid, and hence giving misleading or incorrect results.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Encryption?

A

The encoding of the data by a special algorithm that renders the data unreadable by any program without the decryption key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

RAID (Redundant Array of Independent Disks)

A

RAID works on having a large disk array comprising an arrangement of several independent disks that are organized to improve reliability and at the same time increase performance.

Levels:
RAID 0 Nonredundant
RAID 1 Mirrored
RAID 0+1 Nonredundant and Mirrored
RAID 2 Memory-Style Error-Correcting Codes   RAID 3 Bit-Interleaved Parity
RAID 4 Block-Interleaved Parity
RAID 5 Block-Interleaved Distributed Parity
RAID 6 P+Q Redundancy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Relation Schema?

A

relation schema is named relation defined by a set of attribute and domain name pairs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Relational database schema?

A

set of relation schemas, each with a distinct name.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

5 relational keys?

A
  1. superkey
    an attribute that uniquely identifies a tuple within a relation
  2. candidate key
    superkey such that no proper subset is a superkey within the relation.
  3. primary key
    candidate key selected to identify tuples uniquely within relation.
  4. alternate key
    candidate key that are not selected to be primary key
  5. foreign key
    attribute within one relation that matches candidate key of some relation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

4 integrity constraints?

A
  1. Null
  2. Entity integrity
  3. referential integrity
  4. general constraint
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

6 jenis privileges dalam DAC (Discretionary Access Control)?

A
  1. SELECT
  2. INSERT
  3. UPDATE
  4. DELETE
  5. REFERENCES
  6. USAGE
How well did you know this?
1
Not at all
2
3
4
5
Perfectly