Securing Databases: Principles and Practices

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/19

flashcard set

Earn XP

Description and Tags

Vocabulary flashcards covering key concepts and definitions related to database security.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

SQL Injection (SQLi)

An attacker inserts malicious SQL into input fields to access or manipulate data illegally.

2
New cards

Unauthorized Access

When users (or hackers) gain access without proper permissions—usually due to weak passwords or misconfigured settings.

3
New cards

Privilege Escalation

A lower-level user exploits a flaw to gain higher-level (admin) access.

4
New cards

Data Leakage or Exposure

Sensitive data is unintentionally exposed, often due to poor encryption or access controls.

5
New cards

Malware and Ransomware

Malicious software can corrupt, steal, or lock database content until a ransom is paid.

6
New cards

Insider Threats

Authorized users misuse access to steal or damage data—either intentionally or by mistake.

7
New cards

Denial of Service (DoS)

Attackers flood the system to overload the database server, making it unavailable.

8
New cards

Backup Theft or Tampering

If backups are not secured, attackers can steal or alter them.

9
New cards

Symmetric Encryption

Same key used for both encryption and decryption.

10
New cards

Asymmetric Encryption

Uses a pair of keys: public key for encryption and private key for decryption.

11
New cards

Hashing

One-way transformation of data, used for password storage and data integrity.

12
New cards

Transparent Data Encryption (TDE)

Encrypts data at rest in the database, allowing automatic decryption for authorized users.

13
New cards

End-to-End Encryption

Data is encrypted on the sender’s device and only decrypted by the receiver.

14
New cards

Full Backup

A backup that copies all data.

15
New cards

Incremental Backup

A backup that copies only changes made since the last backup.

16
New cards

Differential Backup

A backup that copies all changes since the last full backup.

17
New cards

Point-in-time recovery

Restore systems to a specific moment.

18
New cards

Monitoring and Auditing

Processes for tracking user activities and ensuring compliance.

19
New cards

Secure Backup Storage

Encrypting backups and restricting access to them.

20
New cards

Patch Management

The process of deploying updates to software to fix vulnerabilities.