Discuss the types of threat that might occur within the general database environment, and indicate the measures that could be taken to safeguard against them.

What will be an ideal response?


The answer should cover the broad categories of theft and fraud, loss of confidentiality, loss of
privacy, loss of integrity and loss of availability. These threats may be either accidental or
intentional. Examples should be given together with the type of measure that could be in place.
For example, a programmer altering programs or data. Programmers should not normally have
access to live programs or data, and any access should be properly authorized with details that enable any audit to be made properly. Adequate audit controls should also uncover any odd
functioning of the system.

Computer Science & Information Technology

You might also like to view...

An ActiveX control is which of the following types of programs?

A) a driver B) an add-on C) a plug-in D) a startup

Computer Science & Information Technology

Given Graphics object graph, which statement can you use to change the pen color to red?

A. graph.setColor(Color.red); B. graph.setPen(Color.red); C. setForeground(red); D. graph.getRed();

Computer Science & Information Technology

If the file to which a hyperlink refers to is moved or renamed, or a webpage to which a hyperlink refers has a new address, which of the following do you need to do to the hyperlink to make it work correctly?

A) Delete the hyperlink altogether B) Call the webmaster to fix the link C) Modify the hyperlink to reflect the change D) Leave the hyperlink as is

Computer Science & Information Technology

A(n) ____________________ is the Visual Basic equivalent of a worksheet.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology