SlideShare a Scribd company logo
1 of 7
Week 9 Database Security and Authorization
summary

Real-life example

 Threats to data security

 Authorization
 Authentication
 View
 Backup
 Journalizing
 Integrity
 Encryption

 user-defined procedures
 Checking point of Countermeasures

quiz
Week 9 Database Security and Authorization
summary

Real-life example

quiz

A Typical example of database security in real life would be:

Students who can gain access to their electronic mark sheets and
upgrade their marks as they wish. This would be a misuse of data.
Week 9 Database Security and Authorization
summary

Real-life example

quiz

A Typical example of database authorization in real life
would be:
A bank cashier who has the right to see the amounts of
customer accounts and then divulgate them to robbers
who, themselves can blackmail customers or threaten them
and demand them ransoms.
This is a badly granted right on the important data.
Week 9 Database Security and Authorization
summary

Real-life example

quiz

1. Database security is the protection of the data against accidental or
intentional loss, destruction, or misuse.
A. True
B. False
2. Which is not a threat to data security?
A. Human error.
B. Software failure.
C. Theft and fraud.
D. Forgetting a password.
E. Loss of secrecy

3. The encryption is the compilation of the data by a special algorithm that
renders the data accessible safely.
A. True
B. False
Enter answer,,,.
1.

2.

3.
Week 9 Database Security and Authorization
summary

Real-life example

quiz

1. Database security is the protection of the data against accidental or
intentional loss, destruction, or misuse.
A. True
B. False
2. Which is not a threat to data security?
A. Human error.
B. Software failure.
C. Theft and fraud.
D. Forgetting a password.
E. Loss of secrecy

3. The encryption is the compilation of the data by a special algorithm that
renders the data accessible safely.
A. True
B. False
Enter answer,,,.
1. A

2. D

3. B
Week 9 Database Security and Authorization
summary

Real-life example

quiz

4. The granting of a right or privilege, which enables a subject to legitimately
have access to a system or a system’s object is:
A. Authentication
B. Authorization
C. Validation
D. Verification
E. Acceptance
5. What action to take in case of Database destruction?
A. Rollback
B. Start from scratch
C. Buy a new DBMS
D. Back up the system
E. Switch to duplicate database

answer is:
4.

5.
Week 9 Database Security and Authorization
summary

Real-life example

quiz

4. The granting of a right or privilege, which enables a subject to legitimately
have access to a system or a system’s object is:
A. Authentication
B. Authorization
C. Validation
D. Verification
E. Acceptance
5. What action to take in case of Database destruction?
A. Rollback
B. Start from scratch
C. Buy a new DBMS
D. Back up the system
E. Switch to duplicate database

answer is:
4. B

5. E

More Related Content

Similar to 3 summary

Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptxssuser2209e8
 
test bank MANAGEMENT of INFORMATION SECURITY, Fifth Edition
test bank MANAGEMENT of INFORMATION SECURITY, Fifth Editiontest bank MANAGEMENT of INFORMATION SECURITY, Fifth Edition
test bank MANAGEMENT of INFORMATION SECURITY, Fifth Editionhusseinalshomali
 
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdfSECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdfJohnRicos
 
Residency ResearchISOL 536 Security Architecture and Design.docx
Residency ResearchISOL 536 Security Architecture and Design.docxResidency ResearchISOL 536 Security Architecture and Design.docx
Residency ResearchISOL 536 Security Architecture and Design.docxbrittneyj3
 
Top Network Security Interview Questions That You Should Know.pptx
Top Network Security Interview Questions That You Should Know.pptxTop Network Security Interview Questions That You Should Know.pptx
Top Network Security Interview Questions That You Should Know.pptxInfosectrain3
 
CISSP Exam-Certified Information Systems Security Professional
CISSP Exam-Certified Information Systems Security Professional CISSP Exam-Certified Information Systems Security Professional
CISSP Exam-Certified Information Systems Security Professional Isabella789
 
dokumen_tips_computer_security_by_william_stallings_ch_1_mcq.docx
dokumen_tips_computer_security_by_william_stallings_ch_1_mcq.docxdokumen_tips_computer_security_by_william_stallings_ch_1_mcq.docx
dokumen_tips_computer_security_by_william_stallings_ch_1_mcq.docxams1ams11
 
Cissp cbk final_exam-answers_v5.5
Cissp cbk final_exam-answers_v5.5Cissp cbk final_exam-answers_v5.5
Cissp cbk final_exam-answers_v5.5madunix
 
Data base security & integrity
Data base security &  integrityData base security &  integrity
Data base security & integrityPooja Dixit
 
Cis 333 Education Redefined - snaptutorial.com
Cis 333     Education Redefined - snaptutorial.comCis 333     Education Redefined - snaptutorial.com
Cis 333 Education Redefined - snaptutorial.comDavisMurphyC75
 
IT 549 Scenario Assignment Module Six Guidelines and Rubric .docx
IT 549 Scenario Assignment Module Six Guidelines and Rubric .docxIT 549 Scenario Assignment Module Six Guidelines and Rubric .docx
IT 549 Scenario Assignment Module Six Guidelines and Rubric .docxvrickens
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxinfosec train
 
Security in network computing
Security in network computingSecurity in network computing
Security in network computingManoj VNV
 
Module1_Intro to Security_Final.ppt
Module1_Intro to Security_Final.pptModule1_Intro to Security_Final.ppt
Module1_Intro to Security_Final.pptzenotechae
 
Module1_Intro to Security_Final.ppt
Module1_Intro to Security_Final.pptModule1_Intro to Security_Final.ppt
Module1_Intro to Security_Final.pptAshaPagidipalli
 
Module 1 :Introduction to Cyber Security
Module 1 :Introduction to Cyber SecurityModule 1 :Introduction to Cyber Security
Module 1 :Introduction to Cyber SecurityJunYin38
 
Notes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyNotes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyJonathan Bacon
 
Computer security and_privacy_tif_key
Computer security and_privacy_tif_keyComputer security and_privacy_tif_key
Computer security and_privacy_tif_keythinkict
 
Database security
Database securityDatabase security
Database securityCAS
 
Security issue in Cloud computing
Security issue in Cloud computingSecurity issue in Cloud computing
Security issue in Cloud computingSeema Kumari
 

Similar to 3 summary (20)

Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
 
test bank MANAGEMENT of INFORMATION SECURITY, Fifth Edition
test bank MANAGEMENT of INFORMATION SECURITY, Fifth Editiontest bank MANAGEMENT of INFORMATION SECURITY, Fifth Edition
test bank MANAGEMENT of INFORMATION SECURITY, Fifth Edition
 
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdfSECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
 
Residency ResearchISOL 536 Security Architecture and Design.docx
Residency ResearchISOL 536 Security Architecture and Design.docxResidency ResearchISOL 536 Security Architecture and Design.docx
Residency ResearchISOL 536 Security Architecture and Design.docx
 
Top Network Security Interview Questions That You Should Know.pptx
Top Network Security Interview Questions That You Should Know.pptxTop Network Security Interview Questions That You Should Know.pptx
Top Network Security Interview Questions That You Should Know.pptx
 
CISSP Exam-Certified Information Systems Security Professional
CISSP Exam-Certified Information Systems Security Professional CISSP Exam-Certified Information Systems Security Professional
CISSP Exam-Certified Information Systems Security Professional
 
dokumen_tips_computer_security_by_william_stallings_ch_1_mcq.docx
dokumen_tips_computer_security_by_william_stallings_ch_1_mcq.docxdokumen_tips_computer_security_by_william_stallings_ch_1_mcq.docx
dokumen_tips_computer_security_by_william_stallings_ch_1_mcq.docx
 
Cissp cbk final_exam-answers_v5.5
Cissp cbk final_exam-answers_v5.5Cissp cbk final_exam-answers_v5.5
Cissp cbk final_exam-answers_v5.5
 
Data base security & integrity
Data base security &  integrityData base security &  integrity
Data base security & integrity
 
Cis 333 Education Redefined - snaptutorial.com
Cis 333     Education Redefined - snaptutorial.comCis 333     Education Redefined - snaptutorial.com
Cis 333 Education Redefined - snaptutorial.com
 
IT 549 Scenario Assignment Module Six Guidelines and Rubric .docx
IT 549 Scenario Assignment Module Six Guidelines and Rubric .docxIT 549 Scenario Assignment Module Six Guidelines and Rubric .docx
IT 549 Scenario Assignment Module Six Guidelines and Rubric .docx
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
 
Security in network computing
Security in network computingSecurity in network computing
Security in network computing
 
Module1_Intro to Security_Final.ppt
Module1_Intro to Security_Final.pptModule1_Intro to Security_Final.ppt
Module1_Intro to Security_Final.ppt
 
Module1_Intro to Security_Final.ppt
Module1_Intro to Security_Final.pptModule1_Intro to Security_Final.ppt
Module1_Intro to Security_Final.ppt
 
Module 1 :Introduction to Cyber Security
Module 1 :Introduction to Cyber SecurityModule 1 :Introduction to Cyber Security
Module 1 :Introduction to Cyber Security
 
Notes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyNotes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and Privacy
 
Computer security and_privacy_tif_key
Computer security and_privacy_tif_keyComputer security and_privacy_tif_key
Computer security and_privacy_tif_key
 
Database security
Database securityDatabase security
Database security
 
Security issue in Cloud computing
Security issue in Cloud computingSecurity issue in Cloud computing
Security issue in Cloud computing
 

More from Mr Patrick NIYISHAKA (20)

2 ddb architecture
2 ddb architecture2 ddb architecture
2 ddb architecture
 
4 summary
4 summary4 summary
4 summary
 
3 summary
3 summary3 summary
3 summary
 
2 con control
2 con control2 con control
2 con control
 
1 con exe
1 con exe1 con exe
1 con exe
 
1 basic concepts
1 basic concepts1 basic concepts
1 basic concepts
 
2 recovery
2 recovery2 recovery
2 recovery
 
3 transaction
3 transaction3 transaction
3 transaction
 
3 summary
3 summary3 summary
3 summary
 
1 query processing
1 query processing1 query processing
1 query processing
 
1 query processing
1 query processing1 query processing
1 query processing
 
2 optimization
2 optimization2 optimization
2 optimization
 
2 collision
2 collision2 collision
2 collision
 
4 summary
4 summary4 summary
4 summary
 
3 summary
3 summary3 summary
3 summary
 
2 normalization
2 normalization2 normalization
2 normalization
 
1 fn dependency
1 fn dependency1 fn dependency
1 fn dependency
 
4 summary
4 summary4 summary
4 summary
 
2 dml
2 dml2 dml
2 dml
 
1 ddl
1 ddl1 ddl
1 ddl
 

Recently uploaded

fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 

Recently uploaded (20)

fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 

3 summary

  • 1. Week 9 Database Security and Authorization summary Real-life example  Threats to data security  Authorization  Authentication  View  Backup  Journalizing  Integrity  Encryption  user-defined procedures  Checking point of Countermeasures quiz
  • 2. Week 9 Database Security and Authorization summary Real-life example quiz A Typical example of database security in real life would be: Students who can gain access to their electronic mark sheets and upgrade their marks as they wish. This would be a misuse of data.
  • 3. Week 9 Database Security and Authorization summary Real-life example quiz A Typical example of database authorization in real life would be: A bank cashier who has the right to see the amounts of customer accounts and then divulgate them to robbers who, themselves can blackmail customers or threaten them and demand them ransoms. This is a badly granted right on the important data.
  • 4. Week 9 Database Security and Authorization summary Real-life example quiz 1. Database security is the protection of the data against accidental or intentional loss, destruction, or misuse. A. True B. False 2. Which is not a threat to data security? A. Human error. B. Software failure. C. Theft and fraud. D. Forgetting a password. E. Loss of secrecy 3. The encryption is the compilation of the data by a special algorithm that renders the data accessible safely. A. True B. False Enter answer,,,. 1. 2. 3.
  • 5. Week 9 Database Security and Authorization summary Real-life example quiz 1. Database security is the protection of the data against accidental or intentional loss, destruction, or misuse. A. True B. False 2. Which is not a threat to data security? A. Human error. B. Software failure. C. Theft and fraud. D. Forgetting a password. E. Loss of secrecy 3. The encryption is the compilation of the data by a special algorithm that renders the data accessible safely. A. True B. False Enter answer,,,. 1. A 2. D 3. B
  • 6. Week 9 Database Security and Authorization summary Real-life example quiz 4. The granting of a right or privilege, which enables a subject to legitimately have access to a system or a system’s object is: A. Authentication B. Authorization C. Validation D. Verification E. Acceptance 5. What action to take in case of Database destruction? A. Rollback B. Start from scratch C. Buy a new DBMS D. Back up the system E. Switch to duplicate database answer is: 4. 5.
  • 7. Week 9 Database Security and Authorization summary Real-life example quiz 4. The granting of a right or privilege, which enables a subject to legitimately have access to a system or a system’s object is: A. Authentication B. Authorization C. Validation D. Verification E. Acceptance 5. What action to take in case of Database destruction? A. Rollback B. Start from scratch C. Buy a new DBMS D. Back up the system E. Switch to duplicate database answer is: 4. B 5. E