One purpose of a database system is the easy sharing of data. But this ease of sharing can also jeopardize security. Discuss at least three forms of access control designed to reduce this risk
Many types of access control are possible. A user view is a subset of a database that limits a user's view or access to the database. The database authorization table contains rules that limit what a user can do, i.e., read, insert, modify, delete. A user-defined procedure adds additional queries to user access to prevent others from accessing in a specific user's place. To protect the data in a database, many systems use data encryption to make it unreadable by intruders. A newer technique uses biometric devices to authenticate users.
You might also like to view...
Explain the three types of dismissals.
What will be an ideal response?
In the sentence Our commitment to our customers remains our top priority, the simple subject is ______
A) customers B) commitment C) priority
Nebraska Co. is reviewing a capital investment of $100,000. This project's projected cash flows over a five-year period are estimated at $35,000 each year. Required:(a) Calculate the payback period.(b) Calculate the break-even time. Assume a 12% hurdle rate and use the table below:Present ValuePeriods of 1 at 12%1…… 0.89292…… 0.79723…… 0.71184…… 0.63555…… 0.5674(c) Using the results in (a) and (b), make a recommendation for the project.
What will be an ideal response?
Based on the use of a mathematical construct known as the elliptic curve and offering equal security for a far smaller bit size, __________ has begun to challenge RSA.
A. DSS ? B. TCB ? C. RIPE-160 ? D. ECC