Question: Match each activity/process/task used to implement the computerised counter measures to protect database security with the corresponding description. For example Journaling: process of keeping and

Match each activity/process/task used to implement the computerised counter measures to protect database security with the corresponding description.

For example Journaling: process of keeping and maintaining a log file (or journal) of all changes made to database to enable effective recovery in event of failure Recovery: process adopted in the event of database failure to restore the database to the latest consistent state using backup and journaling

Match each activity/process/task used to implement the computerised counter measures to protect

Collection of settings that limits the use of system resources and A. Profile the database B. View C. Integrity D.Authorisation E. Auditing F. Encryption G. Backup 4 Process of periodically taking a copy of the database and log file (and possibly programs) to offline storage media. + The encoding of the data by a special algorithm that renders the data unreadable by any program without the decryption key. ; The granting of a right or privilege, which enables a subject to legitimately have access to a system or a system's object. ; Prevents data from becoming invalid, and hence giving misleading or incorrect results. Monitoring and recording of selected users' suspected database actions Powerful, flexible and simple mechanism by hiding certain important attributes or rows from certain users

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!