State True/False

1.Database security encompasses hardware, software, network, people and data of the organisation.
2.Threats are any situation or event, whether intentional or accidental, that may adversely affect a system and consequently the organisation.
3.Authentication is a mechanism that determines whether a user is who he or she claims to be.
4.When a user is authenticated, he or she is verified as an authorized user of an application.
5.Authorization and authentication controls can be built into the software.
6.Privileges are granted to users at the discretion of other users.
7.A user automatically has all object privileges for the objects that are owned by him/her.
8.The REVOKE command is used to take away a privilege that was granted. ...

Get Database Systems: Concepts, Design and Applications now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.