O'Reilly logo

Database Systems: Concepts, Design and Applications by S. K. Singh

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 14 Database Security

State True/False

1.True
2.True
3.True
4.True
5.True
6.False
7.True
8.True
9.False
10.True
11.True
12.True
13.True.

 

Tick (✓) the Appropriate Answer

1.(d)
2.(c)
3.(b)
4.(b)
5.(c)
6.(a)
7.(b)
8.(c)
9.(d)
10.(b)
11.(a)
12.(a)
13.(b)
14.(c)
15.(c)
16.(d).

 

Fill in the Blanks

1.Protection, threats
2.Database security
3.(a) sabotage of hardware, (b) sabotage of applications
4.Invalid, corrupted
5.Authorization
6.GRANT, REVOKE
7.Authorization
8.Data encryption
9.Authentication
10.Coding or scrambling
11.(a) Simple substitution method, (b) Polyalphabetic substitution method
12.DBA
13.Access rights (also called privileges)
14.Access rights (also called privileges)
15.The Bel-LaPadula model
16.Firewall
17.Statistical database security.

 

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required