Why are the security measures taken by DBMSs unlikely to be sufficient to prevent attacks by themselves?

What will be an ideal response?


It should be noted that security measures taken by DBMSs are unlikely to be sufficient to prevent attacks by themselves. The three main reasons for this follow:
* Database applications and DBMSs all run on top of the OS; an application may become vulnerable to attack by exploiting vulnerabilities in the OS.
* Many widely used traditional DBMSs are designed to function in a controlled environment where the internal network is restricted to authorized users and any connected networks are assumed to be under an equivalent security regime. It is unlikely that these traditional databases will be resistant to attack from hostile third parties.
* Databases come with a rich set of scripts, stored procedures, and supporting software. The variety of this functionality increases the likelihood of security vulnerabilities.

Computer Science & Information Technology

You might also like to view...

Based on the logical data model developed i, create a physical database design for the EasyDrive School of Motoring case study (described in Appendix B.2) based on the DBMS that you have access

What will be an ideal response?

Computer Science & Information Technology

The WebKit gradient() function can have multiple color stops, but the location can be entered only as a ____ of the object's width.

A. part B. percentage C. piece D. portion

Computer Science & Information Technology

The basic input/output system (BIOS) is stored on a ________ chip

A) RAM B) CMOS C) ROM D) CPU

Computer Science & Information Technology

Bootrec is a Windows command that formats a disk with options for file system and quick format

Indicate whether the statement is true or false

Computer Science & Information Technology