State True/False
1. | Database security encompasses hardware, software, network, people and data of the organisation. |
2. | Threats are any situation or event, whether intentional or accidental, that may adversely affect a system and consequently the organisation. |
3. | Authentication is a mechanism that determines whether a user is who he or she claims to be. |
4. | When a user is authenticated, he or she is verified as an authorized user of an application. |
5. | Authorization and authentication controls can be built into the software. |
6. | Privileges are granted to users at the discretion of other users. |
7. | A user automatically has all object privileges for the objects that are owned by him/her. |
8. | The REVOKE command is used to take away a privilege that was granted. ... |
Get Database Systems: Concepts, Design and Applications now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.