1/16
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What are the 3 issues of DBMS Security?
Availability (to authorized users)
Confidentiality(data only seen by allowed)
Integrity (prevent data corruption)
2 Goals of Availability
Making access easy for authorized users
Making unauthorized access hard
What is DAC?
Discretionary Access Control- users set rules on who can access their data
What is MAC?
Mandatory Access Control- Access controlled by pre defined rules like in the military
DAC features in SQl are implemented with what and what is the idea behind DAC
views, they give users necessary information without revealing the origin of the data. Form of security by obscurity.
What is the syntax for create user , grant, and revoke?
Create user Mandy identified by 1233423
Grant select on table to public with grant option
Revoke all privileges on table from public.
How is MAC implemented.
Usually as a hierarchy of security classes
What are the two groups in the Bella-LaPadula Model and what does each group have?
Subject has clearance
Object has classification
What is Bella LaPadula 2 restrictions?
Simple Security property (S can only read Y if S(clearance)>= Y(classification)
Star property S can only write to Y if S(clearance)<= Y(classification)
What is required to keep confidentiality?
Quality Passwords
Data encryptions (dig signatures , encrypted keys)
What is the idea of integrity?
Being able to recover DBs after accidents or disasters
What are the 3 approaches to integrity in DBMS security?
Maintain offsite backups
log DBMS actions
use a non zero RAID level
list 2 oracle security features
user auth, DB auditing
What is SQL injection
When a user tries to add SQL into an incomplete query in hopes of getting the DBMS to reveal more info
How to prevent SQL injections, 3 ways
Check all user inputs
Trim excess characters
Only accept Raw input when needed.
How does DAC protect against DoS?
user storage limits and CPU limits
What are some ways SQL limits what a user can do under DAC?
user privileges, roles. views