Database Security Imp Questions
Database Security Imp Questions
14. 15. Principles of hardening C2 security & c2 auditing Access policy diagram Zero-day attacks Authentication, authorization and administration IDS types based on data collection Signature VS statistical analysis False positive and False negative Software vulnerability tools and its types -53 Account lock out Need for n/w access map Program IP interface in oracle n/w layer and its components Mention the security specification related to oracle10g in network connectivity-87 Mention the identification of users for authentication-95 Kerberos
16 Marks 1. 2. 3. 4. 5. Buffer Overflow-24(8) Perimeters security (IPS, IDS, Firewall)-42( Vulnerability management process-52(8) Tracking tools and applications, discuss about port scanners-66 and 81-84(16) Different authentication methods adapted with example(Related to DB2 or Oracle or anyone)-96(16) 6. Profile creation and password parameter assignment concern with account lock out and corrective measures to overcome the account lock out issues.-117-119(16)