Skip to Content
Database Systems: Concepts, Design and Applications
book

Database Systems: Concepts, Design and Applications

by S. K. Singh
August 2009
Intermediate to advanced
893 pages
26h 48m
English
Pearson India
Content preview from Database Systems: Concepts, Design and Applications

Chapter 14 Database Security

State True/False

1.True
2.True
3.True
4.True
5.True
6.False
7.True
8.True
9.False
10.True
11.True
12.True
13.True.

 

Tick (✓) the Appropriate Answer

1.(d)
2.(c)
3.(b)
4.(b)
5.(c)
6.(a)
7.(b)
8.(c)
9.(d)
10.(b)
11.(a)
12.(a)
13.(b)
14.(c)
15.(c)
16.(d).

 

Fill in the Blanks

1.Protection, threats
2.Database security
3.(a) sabotage of hardware, (b) sabotage of applications
4.Invalid, corrupted
5.Authorization
6.GRANT, REVOKE
7.Authorization
8.Data encryption
9.Authentication
10.Coding or scrambling
11.(a) Simple substitution method, (b) Polyalphabetic substitution method
12.DBA
13.Access rights (also called privileges)
14.Access rights (also called privileges)
15.The Bel-LaPadula model
16.Firewall
17.Statistical database security.

 

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Database Systems: Concepts, Design and Applications, 2nd Edition

Database Systems: Concepts, Design and Applications, 2nd Edition

Shio Kumar Singh
Database Systems

Database Systems

Elvis C. Foster, Shripad V. Godbole
Introduction to Database Systems

Introduction to Database Systems

ITL Education Solutions Limited

Publisher Resources

ISBN: 9788177585674