Loading, please wait ...
Open its course - Database Systems

Short Questions for Security in Databases

  • 1 Which security measures are associated with DBMSs on the Web?

    Proxy servers, firewalls, message digest algorithms and digital signatures, digital certificates, kerberos, Secure Sockets Layer (SSL) and Secure HTTP (S-HTTP), Secure Electronic Transactions (SET) and Secure Transaction Technology (SST), Java security, and ActiveX security.

  • 2 What is Discretionary Access Control (DAC)?

    It is an approach to manage privileges. The SQL standard supports DAC through the GRANT and REVOKE commands. The GRANT command gives privileges to users, and the REVOKE command takes away privileges.

  • 3 What are the computer-based security controls in a multi-user environment?


    • authorization
    • access controls
    • views
    • backup and recovery
    • integrity
    • encryption
    • RAID technology

  • 4 List down some common know threats for database security?

    Common known threats are: 

    1. Using another person’s means of access
    2. Unauthorized amendment or copying of data 
    3. Program alteration
    4. Inadequate policies and procedures that allow a mix of confidential and normal output
    5. Wire tapping
    6. Illegal entry by hacker
    7. Blackmail
    8. Creating ‘trapdoor’ into system
    9. Theft of data, programs, and equipment
    10. Failure of security mechanisms, giving greater access than normal
    11. Staff shortages or strikes
    12. Inadequate staff training
    13. Viewing and disclosing unauthorized data
    14. Electronic interference and radiation
    15. Data corruption owing to power loss or surge
    16. Fire (electrical fault, lightning strike, arson), flood, bomb
    17. Physical damage to equipment
    18. Breaking cables or disconnection of cables
    19. Introduction of viruses

  • 5 In which situations database security should be considered important?

    We consider database security in relation to the following situations: 

    • Theft and fraud
    • Loss of confidentiality
    • Loss of privacy
    • Loss of integrity
    • Loss of availability

  • 6 Types Of Locks??

    1. Shared Lock When a shared lock is applied on data item, other transactions can only read the item, but can't write into it. 2. Exclusive Lock When an exclusive lock is applied on data item, other transactions can't read or write into the data item.

Contact Us

Write to Us View Help
Subject Expert Logo

Subject Expert

Learn, Evaluate and Optimize

Follow Us
Facebook Switch Display Mode Enable Translation
© 2024 - Subject Expert