Match the description to the method below for
protecting databases. Methods may match more than
one description.
iction
Method: Triggers
c Database Fundamentals DBA
Role of Views in Security
Drver Database Fundamentals
w of Database Security
Database Fundamentals SQL
y Concepts
so Security
"rivilege
Records may be restricted
Permissions are set via internal access controls
Activity may be monitored and acted upon
Integration with system security is possible
Logging is a common implementation
Froduction
Data is extracted from tables
Answers
Answer:
Confidentiality, integrity, and availability are the hallmarks of database security. Who should have the right to access data? What portion of all the data should a particular user be able to access? What operations should an authorized user be able to perform on the data? Can authorized users access valid data when necessary?
Authorization is permission given to a user, program, or process to access an object or set of objects.The type of data access granted to a user can be read-only, or read/write. Privileges specify the type of Data Manipulation Language (DML) operations which the user can perform upon data.
This chapter introduces these and other fundamental concepts of database security.
Answer:
— Activity may be monitored and acted upon
— Logging is a common implementation
Explanation: