The response "sensitive value; response suppressed" is itself a disclosure. Suggest a manner in which a database management system could suppress responses that reveal sensitive information without disclosing that the responses to certain queries are sensitive
What will be an ideal response?
Random
data
suppression
can
be
applied
to
queries.
The
database
management
system
could
periodically
suppress
the
response
to
a
particular
query
that
was
not
sensitive.
Then,
when
a
user
received
information
that
a
response
had
been
suppressed,
the
user
would
not
know
if
it
was
because
of
random
suppression
or
sensitive
data.
This
approach
fails,
however,
if
the
user
submits
the
same
query
several
times
and
the
result
is
always
suppressed.
If
the
system
practices
random
suppression,
it
must
always
suppress
the
results
of
the
same
query
in
order
not
to
reveal
whether
the
suppression
is
because
the
result
is
sensitive
or
because
this
is
a
random
suppression.
Note
that
the
user
can
submit
the
query
in
several
forms
or
submit
partial
queries
that
can
be
combined
separately
to
obtain
the
desired
answer.
Thus,
the
tracking
of
what
query
responses
have
been
suppressed
is
not
as
simple
as
recording
syntactically
which
query
results
have
been
suppressed.
You might also like to view...
Iterator method __________ determines whether the Collection contains more elements.
a. hasNext. b. next. c. contains. d. containsNext.
Which of the following items are used to measure a blog's popularity?
a. Labels and blog comments b. Page views and blog spam c. Unique visitors and page views d. Blog comments and page views
Case-Based Critical Thinking Questions ?Case 5-1 In PowerPoint 2016, Ben wants to divide his presentation into sections as he is covering two very different topics. ? One reason Ben likes working with sections is that they can be ____, allowing him to work on one section of slides at a time.
A. expanded B. collapsed C. deleted D. saved
A VPN concentrator is used for which of the following purposes?
A. MAC filtering B. Content filtering C. Secure network access D. Connectivity troubleshooting