Fill in the Blanks

1.The goal of database security is the ________ of data against ________.
2.________ is the protection of the database against intentional and unintentional threats.
3.Loss of availability can arise due to (a) ________ and (b) ________.
4.Loss of data integrity causes ________ or ________ data, which may seriously affect the operation of an organisation.
5.________ is a privilege or right to perform a particular action.
6.System privileges are granted to or revoked from users using the commands ________ and ________.
7.________ the process of granting of right or privilege to the user(s) to have legitimate access to a system or objects (database table) of the system.
8.________ is the technique of encoding data so that only ...

Get Database Systems: Concepts, Design and Applications now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.