Why are the security measures taken by DBMSs unlikely to be sufficient to prevent attacks by themselves?

What will be an ideal response?


It should be noted that security measures taken by DBMSs are unlikely to be sufficient to prevent attacks by themselves. The three main reasons for this follow:
* Database applications and DBMSs all run on top of the OS; an application may become vulnerable to attack by exploiting vulnerabilities in the OS.
* Many widely used traditional DBMSs are designed to function in a controlled environment where the internal network is restricted to authorized users and any connected networks are assumed to be under an equivalent security regime. It is unlikely that these traditional databases will be resistant to attack from hostile third parties.
* Databases come with a rich set of scripts, stored procedures, and supporting software. The variety of this functionality increases the likelihood of security vulnerabilities.

Computer Science & Information Technology

You might also like to view...

An 802.11 header contains two destination addresses. Explain the purpose of each.

What will be an ideal response?

Computer Science & Information Technology

A tag is a file property that Vista puts on every file automatically

Indicate whether the statement is true or false

Computer Science & Information Technology

You can use the Macro ________ to edit a macro

A) Wizard B) Analyzer C) Designer D) Documenter

Computer Science & Information Technology

APA writing style requires the word ________ as the heading for the list of references shown at the end of a research paper

Fill in the blank(s) with correct word

Computer Science & Information Technology