Question: All the questions are based in database theory, and dont need queries or tables, just a text answer Database questions: 4. Discuss the types of

All the questions are based in database theory, and dont need queries or tables, just a text answer

Database questions:

4. Discuss the types of privileges at the account level and those at the relation level. 5. What is meant by granting a privilege? What is meant by revoking a privilege? 6. Discuss the system of propagation of privileges and the restraints imposed by horizontal and vertical propagation limits. 7. List the types of privileges available in SQL. 8. What is the difference between discretionary and mandatory access control? 9. What are the typical security classifications? Discuss the simple security property and the *-property, and explain the justification behind these rules for enforcing multilevel security. 10. Describe the multilevel relational data model. Define the following terms: apparent key, polyinstantiation, filtering. 11. What are the relative merits of using DAC or MAC? 12. What is role-based access control? In what ways is it superior to DAC and MAC? 13. What are the two types of mutual exclusion in role-based access control? 14. What is meant by row-level access control? 15. What is label security? How does an administrator reinforce it? 16. What are the different types of SQL injection attacks? 17. What risks are associated with SQL injection attacks? 18. What preventive measures are possible against SQL injection attacks? 19. What is a statistical database? Discuss the problem of statistical database security. 20. How is privacy related to statistical database security? What measures can be taken to ensure some degree of privacy in statistical databases? 21. What is flow control as a security measure? What types of flow control exist? 22. What are covert channels? Give an example of a covert channel. 23. What is the goal of encryption?What process is involved in encrypting data and then recovering it at the other end? 24. Give an example of an encryption algorithm and explain how it works. 25. Repeat the previous question for the popular RSA algorithm. 26. What is a symmetric key algorithm for key-based security? 27. What is the public key infrastructure scheme? How does it provide security? 28. What are digital signatures? How do they work? 29. What type of information does a digital certificate include?

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!