Database Management Systems - Security and Integrity

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/29

flashcard set

Earn XP

Description and Tags

Flashcards covering key concepts related to database security, access control, encryption, and integrity constraints.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

30 Terms

1
New cards

Secrecy (in DB security)

Protecting data against unauthorized users; ensuring users cannot see things they are not supposed to.

2
New cards

Integrity (in DB security)

Protecting data against unauthorized modifications, even by authorized users.

3
New cards

Integrity Constraints

Ensure that changes made to the database by authorized users do not result in loss of data consistency.

4
New cards

Authentication

The process of verifying the identity of a user (Who are you? Prove it!).

5
New cards

Authorization

Determining what actions a user is allowed to perform within the database.

6
New cards

Database System Security Level

Enforces authorization rules, controlling which users can modify or query data.

7
New cards

Operating System Security Level

Protects against unauthorized access at the OS level, regardless of database security.

8
New cards

Network Security Level

Secures remote database access through hardware and software measures.

9
New cards

Physical Security Level

Physically securing sites with computer systems against intruders or terrorists.

10
New cards

Human Security Level

Careful authorization of users to prevent intruders from gaining access.

11
New cards

Privileges (in database security)

Permissions granted to users to perform specific actions on the database, either system-wide or on specific objects.

12
New cards

Roles (in database security)

Collections of system privileges that can be granted to users, simplifying privilege management.

13
New cards

Grant (in database security)

Giving privileges or roles to users.

14
New cards

Revoke (in database security)

Removing privileges or roles from users.

15
New cards

Security Policy

Specifies who is authorized to do what within the database system.

16
New cards

Security Mechanism

Allows us to enforce a chosen security policy.

17
New cards

Discretionary Access Control (DAC)

A security mechanism where users can grant access to their own objects to other users.

18
New cards

Mandatory Access Control (MAC)

A security mechanism based on system-wide policies that cannot be changed by individual users.

19
New cards

Audit Trail

A special file or database that automatically tracks all operations performed by users on regular data.

20
New cards

Encryption

Masks data for secure transmission or storage.

21
New cards

Symmetric Encryption

Encryption where the encryption key is the same as the decryption key.

22
New cards

Public-Key Encryption

Encryption where each user has a public encryption key and a private decryption key.

23
New cards

Data Encryption Standard (DES)

A symmetric-key algorithm for encrypting digital data.

24
New cards

RSA

A public-key cryptosystem that is widely used for secure data transmission.

25
New cards

Data Integrity

Ensuring that data adheres to a predefined set of rules, maintaining the validity of data.

26
New cards

Integrity Subsystem

A component of the DBMS that monitors transactions and detects integrity violations.

27
New cards

NULL Integrity

A rule defined on a single column that allows or disallows null values in that column.

28
New cards

UNIQUE Column Values

A constraint that allows the insert or update of a row only if it contains a unique value in that column.

29
New cards

Referential Integrity

A rule defined on a key in one table that guarantees that the values in that key match the values in a key in a related table.

30
New cards

PRIMARY KEY Constraint

Uniquely identifies rows of data stored in a table and does not allow nulls.