Question: 1 . According to Prof Nop the - - - - - Footprint of Databases is - - - - - - - - -

1. According to Prof Nop the ----- Footprint of Databases is ----------.
2. This is because of ----------- like installing a bunch of things that you dont need.
3. That increases your security footprint becuase it is more ------- and you can forget to ------ everything because you are focused mostly on what you use often.
4. Prof Nop says that people create databases with --------- administrative privileges.
5. According to Prof Nop, Just like any code, when you dont have something to -------- the data coming in, the result is having----- that is susceptible to-------- that can damage your application.
6. According to Dr. McIver, Just win baby" works in ------- but doesnt work in-------.
7. When you ignore the ------- and ------ portions of the CIA triad it ultimately impacts ---------.
8. Prof Nop says that a threat actor may not want to take down your system but -------- the data in your system leading to bad decision making.
9. We (cybersecurity professionals) always want all 3 parts of the CIA triad but the -------- side needs to pick 1 to prioritize.
10. It is Prof Nop's advice that when you think about availability, think about that -------- system that cant go down.
11.----------is the industry that Dr. McIver hesitant to do cybersecurity for
12. Prof Nop treats a -------- is like a production system, you dont want to mess with it while its being worked in.
13. Prof Nop says running the database in------ or ------- version is a way to ensure that security wont break a database.
14. Prof Nop says the DevSecOps is possible because you can run code through a ---------and run security checks to ensure that the syntax is correct, check for -----------, and check for unsecure configurations.
15. Cybersecurity pros need to be honest about cant vs won't when it comes to updating ------- or-------- systems.
16. Prof Nop says that you can build --------- around a sensitive database that cant be --------- for security purposes.
17. Prof Nop says that there is no such thing as a ------- lunch. In order to get something, you have to -----something.
18. Dr. McIver says that the --------- is responsible for protecting the database, but business makes the ----------- to protect it.
19. Prof Nop uses -----------to protect the database from other parts of a network and says that if you have sensitive information dont put it in the----------.
20. Prof Nop says that you can also create separation by having different --------, data in different---------, or implementing different ---------.
21. Dr. McIver didnt understand how important --------- were because he was focused on operations and hardware. Prof Nop says that working on databases are hard because the code is so----------.
22. Prof Nops final bit of advice is, utilize --------------System security actions on the ----------- Management System. In the IT world, they segregate the -----------, that can also be adopted in the management of databases. ---------your sensitive data. Database Management Systems now have features that allow for --------- Based Access-------, creation of------ in the database environment,---, or logging. Logging allows you to determine what happened to your database.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!