Databases
Databases
RWAMAGANA DISTRICT
RQF LEVEL: V
MARKS:
DURATION: 3 HOURS
INSTRUCTIONS TO CANDIDATES:
/100
This Exam paper is composed of Three Sections (A, B, C). Follow the
instructions given below, and answer the indicated questions for a total of
100 marks
Section B: Among the five (5) questions, attempt any three (3) 30 marks
Section C: Among the two (2) questions, attempt any one (1) 15 marks
Page 2 of 21
A. Threat
damage, which can reflect an adverse effect on the database structure and,
Cryptograph
Answer: The science of encrypting and decrypting information is called
cryptography.
B. Data dictionary
Answer: This is a set of internal tables and views that support administer
marks)
Answer:
Database security covers and enforces security on all aspects and components
Database server
Qn3. Discuss the difference and similarities between security policies and
Answer:
models are useful tools for evaluating and comparing security policies.
security policy.
Page 3 of 21
decryption (2 marks)
Answer:
(2marks)
Answer:
and authorization
Answer:
authentic -- that it's being used by the right person.it is the process of verify
and validating the user credentials for accessing who you are to the system.
Page 4 of 21
(3 marks)
Answer:
Access Control system that defines permissions for who can access
which data
programs executing on behalf of the users are allowed to do. In this way
security.
Qn8. What is privilege abuse in the context of database security and identify
(4 marks)
Answer:
Users may abuse legitimate data access privileges for unauthorized purposes.
potential points of entry for malicious actors, both internal and external.
Page 5 of 21
and data.
Answer:
vague, poorly defined group of users who should have access to the system.
control? (3 marks)
Answer
groups can be used, the more specific the identification, the better.
authentic -- that it's being used by the right person. In its most common form
username. This verifies whether the identified individual is actually who they
claim to be. Passwords are common, but other methods like biometrics are
Page 6 of 21
the meat of authorization. This defines what the identified and authenticated
individual is allowed to do. Permissions like read, write, and execute control
(3 marks)
Answer:
business needs. Availability to the need for databases to be up and available for
Qn12. Make the elaboration about the structural features that make oracle
Answer:
Qn13. Differentiate the terms plain text and cipher text as the techniques
(3 marks)
Answer:
Plain Text:
before any security measures are applied. It can be anything from text
messages and emails to documents and files. Anyone with access to the plain
sensitive data.
Page 7 of 21
Cipher Text:
original data. Only someone with the correct decryption key can decipher the
cipher text and access the original information. t is securely transmitted and
Qn14. Describe the process of backup and recovery and why does it needed in
perhaps because of damage to a disk drive, you can restore it from the backup.
unavailable.
Recovery happens when the operating system or database server crashes, or the
database server does not shut down properly. The database server checks on
database startup whether the database was shut down cleanly at the end of the
previous session. If it was not, the server executes an automatic recovery process
database against data loss and reconstruct the database after data loss.
standard of the system. what are (5) the characteristics and tips for strong
marks)
Answer:
Page 8 of 21
A strong password is one that is more secure by virtue of being difficult for a
Note: do not use < or > in your password, as both can cause problems in Web
browsers
Change it if you have the slightest suspicion that the password has become
Internet café.
Never save it for a web form on a computer that you do not control or that is
Answer:
must be created and administered only if security policy requires that the use of
A user profile limits the database resources or password that the user cannot
exceed. You can assign a profile to a newly created user. If you skip this clause,
Qn17. What is firewalls and Explain the significance of using it for database
servers. (4 marks)
Answer:
A firewall is a security system that monitors and controls incoming and outgoing
servers, it acts as a vital first line of defense against unauthorized access and
malicious activity.
traffic, firewalls significantly reduce the potential attack surface for hackers.
access attempts.
They analyze each incoming and outgoing data packet based on rules
and policies configured by the administrator.
Page 10 of 21
B. make a short explanation and description about the element and types
Answer:
Access control is a set of policies and mechanisms that regulate who can
access specific resources and what actions they can perform within those
Essentially, it's the "who, what, where, when, and how" of accessing resources
The key to understanding access control security is to break it down. There are
identify someone as part of a vague, poorly defined group of users who should
signature, or even the key to the server closet provides some form of
identification.
of ensuring that the identity in use is authentic -- that it's being used by the
right person. In its most common form in IT security, authentication involves
Page 11 of 21
Administrative access control sets the access control policies and procedures
physical and technical access control, and what the consequences of noncompliance will be. Some
examples are: supervisory structure, staff and
room. Some examples are: fences, gates, doors, turnstiles, etc. using locks,
certain areas
system security
Answer:
Page 12 of 21
corruption and other types of damage, while allowing the information and
information that has been requested will possess the actual value only when
legitimate users can take access to those resources at the right time. But
cybercriminals seize those data so that the request to access those resources
attack.
2.Integrity: This refers to the techniques to ensure that all the data or
protected from unlawful user (hackers) modification. Data integrity has become
compromises the integrity and hence will violate one of the six elements. Data
integrity is verified through techniques like checksums, change in hash values,
the fact that confidential information and Page 12 of 60 other resources have to
Page 13 of 21
can be defined as the process of ensuring and confirming that the identity of
the user is genuine and legitimate. This process of authentication takes place
when the user tries to gain access to any data or information (commonly done
tools and techniques to gain such access with the use of social engineering,
transmitted among two or more users via digital signature or through the use
of encryption is accurate, and no one can deny the authentication of the digital
6. Utility: as the name suggests is used for any purpose or reason and is
accessed and then used by users. It is not entirely the type of element for
security, but if the utility of any resource becomes vague or useless, then it is
message or data sent over the internet so that it is not altered during the
Answer:
1. Password-based authentication
Page 14 of 21
yourself you need to create strong passwords that include a combination of all
possible options.
2. Multi-factor authentication
3. Certificate-based authentication
4. Biometric authentication
in a database.
and doors.
5. Token-based authentication
You can then use the token to access protected systems instead of entering your
credentials all over again. The digital token proves that you already have access
Qn21. Make the Elaboration of at least five database attack in database security
Page 15 of 21
Answer:
addresses are not secret and are continually scanned for vulnerabilities by
malicious persons and security researchers.
2. SQL injection
3. Weak Authentication
4. Privilege abuse
Users may abuse legitimate data access privileges for unauthorised purposes.
For example, a user in sales with privileges to view individual customer records
competitor.
5. Excessive privileges
If users hold privileges that exceed the requirements of their job function, these
their account. When people move roles, they may be given the new privileges
Logging and auditing are key to deterring and detecting misuse and enabling
7. Denial of service
Network level Denial of Service (DoS) attacks from the internet, can overwhelm
your system regardless of the capacity of its internet connection. Cloud based
Page 16 of 21
DoS protection services are the usual defence against this and many offer a
compromised.
While controls against specific database threats are important, they must form
Qn22. By using deep Explanation, make the elaboration about the types of
Answer:
1. Access Authorization:
to access specific data or perform certain operations within the database. This
2. Access Controls:
attribute-based access control (ABAC) to regulate who can access what data
and under what conditions.
Think of views as hidden passages within the castle, granting access to specific
information. These virtual tables provide users with only the data they need,
Page 17 of 21
4. RAID Technology
multiple fortified walls and guard towers surrounding your castle. It replicates
data across multiple disks, ensuring that even if one disk fails, your data
remains safe and accessible, minimizing downtime and data loss. Different
RAID levels offer varying levels of performance and redundancy, allowing you to
5. Data Integrity
Imagine ensuring the accuracy and consistency of castle records like maps and
inventories. Data integrity ensures the same for your database. Checksums,
validation rules, and data audits act as diligent scribes, verifying the accuracy
information.
6. Encryption of Data
your data into an unreadable code, like an unbreakable lock. This protects
malicious actors. Both data at rest (stored) and in transit can be encrypted for
maximum protection.
Qn23. Design the security triads of Goals for implementing security practices to
Page 18 of 21
Answer:
The security framework was designed based on the core facets of database
integrity and authenticity as well as availability of data. ... While on the other
hand, the system rejects and denied unauthorized users access to the system
and data.
The security triad, often referred to as the CIA triad, represents the three
Page 19 of 21
1. Confidentiality:
Goal: Ensure only authorized individuals can access and view sensitive
information.
Implementation:
Access controls like user authentication, role-based access control, and data
and at rest. Limiting data sharing and restricting access to sensitive areas.
2. Integrity:
unauthorized individuals.
Implementation:
3. Availability:
Implementation:
Page 20 of 21
operation under normal load. Security measures that balance protection with
regulations.
Qn24. By using of syntax for creating user, create user by assigning default
table space with its quota, profile, password expired and account status.
Answer:
PROFILE app_user
PASSWORD EXPIRE
ACCOUNT UNLOCK;
Explanation:
Page 21 of 21
100M: This specifies the quota limit for the user in the "users"
app_user: Replace this with the name of the existing profile you want to
can replace this with ACCOUNT LOCK if you want to initially lock the account.
END!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!