Discuss the types of threat that might occur within the general database environment, and indicate the measures that could be taken to safeguard against them.
What will be an ideal response?
The answer should cover the broad categories of theft and fraud, loss of confidentiality, loss of
privacy, loss of integrity and loss of availability. These threats may be either accidental or
intentional. Examples should be given together with the type of measure that could be in place.
For example, a programmer altering programs or data. Programmers should not normally have
access to live programs or data, and any access should be properly authorized with details that enable any audit to be made properly. Adequate audit controls should also uncover any odd
functioning of the system.
You might also like to view...
An ActiveX control is which of the following types of programs?
A) a driver B) an add-on C) a plug-in D) a startup
Given Graphics object graph, which statement can you use to change the pen color to red?
A. graph.setColor(Color.red); B. graph.setPen(Color.red); C. setForeground(red); D. graph.getRed();
If the file to which a hyperlink refers to is moved or renamed, or a webpage to which a hyperlink refers has a new address, which of the following do you need to do to the hyperlink to make it work correctly?
A) Delete the hyperlink altogether B) Call the webmaster to fix the link C) Modify the hyperlink to reflect the change D) Leave the hyperlink as is
A(n) ____________________ is the Visual Basic equivalent of a worksheet.
Fill in the blank(s) with the appropriate word(s).