0% found this document useful (0 votes)
3 views1 page

Cybersecurity Questions Formatted

Uploaded by

dattaipsita8
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views1 page

Cybersecurity Questions Formatted

Uploaded by

dattaipsita8
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

10 Marks Questions on Cybersecurity

1. **Explain the process of a security risk assessment in database security, including its importance

and key steps.**

A security risk assessment in database security identifies, evaluates, and prioritizes potential

security threats to ensure the protection of critical data and assets. Its importance lies in helping

organizations understand vulnerabilities and implement effective measures to prevent data

breaches. The key steps are: ...

2. **Describe cryptography?s role in database security, covering its purposes, key techniques, and

examples of its application.**

Cryptography is essential for securing sensitive information in databases, serving five primary roles:

authentication, authorization, confidentiality, integrity, and non-repudiation. Key techniques include:

...

3. **Discuss the types of access control models available for database security and explain how

each model enforces security differently.**

The three main access control models for database security are Discretionary Access Control

(DAC), Mandatory Access Control (MAC), and Role-Based Access Control (RBAC). ...

4. **What are the risks and challenges associated with database outsourcing, and how can

organizations manage these to protect data privacy and security?**

Database outsourcing involves storing and managing data with an external provider, which

introduces risks such as data breaches, unauthorized access, compliance issues, and reduced

control over data handling. Key challenges include ensuring data confidentiality, regulatory

compliance (e.g., GDPR), and protecting against insider threats. ...

You might also like