Week 9 Database Security and Authorization
summary

Real-life example

 Threats to data security

 Authorization
 Authentication
 View
 Backup
 Journalizing
 Integrity
 Encryption

 user-defined procedures
 Checking point of Countermeasures

quiz
Week 9 Database Security and Authorization
summary

Real-life example

quiz

A Typical example of database security in real life would be:

Students who can gain access to their electronic mark sheets and
upgrade their marks as they wish. This would be a misuse of data.
Week 9 Database Security and Authorization
summary

Real-life example

quiz

A Typical example of database authorization in real life
would be:
A bank cashier who has the right to see the amounts of
customer accounts and then divulgate them to robbers
who, themselves can blackmail customers or threaten them
and demand them ransoms.
This is a badly granted right on the important data.
Week 9 Database Security and Authorization
summary

Real-life example

quiz

1. Database security is the protection of the data against accidental or
intentional loss, destruction, or misuse.
A. True
B. False
2. Which is not a threat to data security?
A. Human error.
B. Software failure.
C. Theft and fraud.
D. Forgetting a password.
E. Loss of secrecy

3. The encryption is the compilation of the data by a special algorithm that
renders the data accessible safely.
A. True
B. False
Enter answer,,,.
1.

2.

3.
Week 9 Database Security and Authorization
summary

Real-life example

quiz

1. Database security is the protection of the data against accidental or
intentional loss, destruction, or misuse.
A. True
B. False
2. Which is not a threat to data security?
A. Human error.
B. Software failure.
C. Theft and fraud.
D. Forgetting a password.
E. Loss of secrecy

3. The encryption is the compilation of the data by a special algorithm that
renders the data accessible safely.
A. True
B. False
Enter answer,,,.
1. A

2. D

3. B
Week 9 Database Security and Authorization
summary

Real-life example

quiz

4. The granting of a right or privilege, which enables a subject to legitimately
have access to a system or a system’s object is:
A. Authentication
B. Authorization
C. Validation
D. Verification
E. Acceptance
5. What action to take in case of Database destruction?
A. Rollback
B. Start from scratch
C. Buy a new DBMS
D. Back up the system
E. Switch to duplicate database

answer is:
4.

5.
Week 9 Database Security and Authorization
summary

Real-life example

quiz

4. The granting of a right or privilege, which enables a subject to legitimately
have access to a system or a system’s object is:
A. Authentication
B. Authorization
C. Validation
D. Verification
E. Acceptance
5. What action to take in case of Database destruction?
A. Rollback
B. Start from scratch
C. Buy a new DBMS
D. Back up the system
E. Switch to duplicate database

answer is:
4. B

5. E

3 summary

  • 1.
    Week 9 DatabaseSecurity and Authorization summary Real-life example  Threats to data security  Authorization  Authentication  View  Backup  Journalizing  Integrity  Encryption  user-defined procedures  Checking point of Countermeasures quiz
  • 2.
    Week 9 DatabaseSecurity and Authorization summary Real-life example quiz A Typical example of database security in real life would be: Students who can gain access to their electronic mark sheets and upgrade their marks as they wish. This would be a misuse of data.
  • 3.
    Week 9 DatabaseSecurity and Authorization summary Real-life example quiz A Typical example of database authorization in real life would be: A bank cashier who has the right to see the amounts of customer accounts and then divulgate them to robbers who, themselves can blackmail customers or threaten them and demand them ransoms. This is a badly granted right on the important data.
  • 4.
    Week 9 DatabaseSecurity and Authorization summary Real-life example quiz 1. Database security is the protection of the data against accidental or intentional loss, destruction, or misuse. A. True B. False 2. Which is not a threat to data security? A. Human error. B. Software failure. C. Theft and fraud. D. Forgetting a password. E. Loss of secrecy 3. The encryption is the compilation of the data by a special algorithm that renders the data accessible safely. A. True B. False Enter answer,,,. 1. 2. 3.
  • 5.
    Week 9 DatabaseSecurity and Authorization summary Real-life example quiz 1. Database security is the protection of the data against accidental or intentional loss, destruction, or misuse. A. True B. False 2. Which is not a threat to data security? A. Human error. B. Software failure. C. Theft and fraud. D. Forgetting a password. E. Loss of secrecy 3. The encryption is the compilation of the data by a special algorithm that renders the data accessible safely. A. True B. False Enter answer,,,. 1. A 2. D 3. B
  • 6.
    Week 9 DatabaseSecurity and Authorization summary Real-life example quiz 4. The granting of a right or privilege, which enables a subject to legitimately have access to a system or a system’s object is: A. Authentication B. Authorization C. Validation D. Verification E. Acceptance 5. What action to take in case of Database destruction? A. Rollback B. Start from scratch C. Buy a new DBMS D. Back up the system E. Switch to duplicate database answer is: 4. 5.
  • 7.
    Week 9 DatabaseSecurity and Authorization summary Real-life example quiz 4. The granting of a right or privilege, which enables a subject to legitimately have access to a system or a system’s object is: A. Authentication B. Authorization C. Validation D. Verification E. Acceptance 5. What action to take in case of Database destruction? A. Rollback B. Start from scratch C. Buy a new DBMS D. Back up the system E. Switch to duplicate database answer is: 4. B 5. E