Fill in the Blanks
1. | The goal of database security is the ________ of data against ________. |
2. | ________ is the protection of the database against intentional and unintentional threats. |
3. | Loss of availability can arise due to (a) ________ and (b) ________. |
4. | Loss of data integrity causes ________ or ________ data, which may seriously affect the operation of an organisation. |
5. | ________ is a privilege or right to perform a particular action. |
6. | System privileges are granted to or revoked from users using the commands ________ and ________. |
7. | ________ the process of granting of right or privilege to the user(s) to have legitimate access to a system or objects (database table) of the system. |
8. | ________ is the technique of encoding data so that only ... |
Get Database Systems: Concepts, Design and Applications now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.