Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
3 summary
1. Week 9 Database Security and Authorization
summary
Real-life example
Threats to data security
Authorization
Authentication
View
Backup
Journalizing
Integrity
Encryption
user-defined procedures
Checking point of Countermeasures
quiz
2. Week 9 Database Security and Authorization
summary
Real-life example
quiz
A Typical example of database security in real life would be:
Students who can gain access to their electronic mark sheets and
upgrade their marks as they wish. This would be a misuse of data.
3. Week 9 Database Security and Authorization
summary
Real-life example
quiz
A Typical example of database authorization in real life
would be:
A bank cashier who has the right to see the amounts of
customer accounts and then divulgate them to robbers
who, themselves can blackmail customers or threaten them
and demand them ransoms.
This is a badly granted right on the important data.
4. Week 9 Database Security and Authorization
summary
Real-life example
quiz
1. Database security is the protection of the data against accidental or
intentional loss, destruction, or misuse.
A. True
B. False
2. Which is not a threat to data security?
A. Human error.
B. Software failure.
C. Theft and fraud.
D. Forgetting a password.
E. Loss of secrecy
3. The encryption is the compilation of the data by a special algorithm that
renders the data accessible safely.
A. True
B. False
Enter answer,,,.
1.
2.
3.
5. Week 9 Database Security and Authorization
summary
Real-life example
quiz
1. Database security is the protection of the data against accidental or
intentional loss, destruction, or misuse.
A. True
B. False
2. Which is not a threat to data security?
A. Human error.
B. Software failure.
C. Theft and fraud.
D. Forgetting a password.
E. Loss of secrecy
3. The encryption is the compilation of the data by a special algorithm that
renders the data accessible safely.
A. True
B. False
Enter answer,,,.
1. A
2. D
3. B
6. Week 9 Database Security and Authorization
summary
Real-life example
quiz
4. The granting of a right or privilege, which enables a subject to legitimately
have access to a system or a system’s object is:
A. Authentication
B. Authorization
C. Validation
D. Verification
E. Acceptance
5. What action to take in case of Database destruction?
A. Rollback
B. Start from scratch
C. Buy a new DBMS
D. Back up the system
E. Switch to duplicate database
answer is:
4.
5.
7. Week 9 Database Security and Authorization
summary
Real-life example
quiz
4. The granting of a right or privilege, which enables a subject to legitimately
have access to a system or a system’s object is:
A. Authentication
B. Authorization
C. Validation
D. Verification
E. Acceptance
5. What action to take in case of Database destruction?
A. Rollback
B. Start from scratch
C. Buy a new DBMS
D. Back up the system
E. Switch to duplicate database
answer is:
4. B
5. E