Cybersecurity Questions Formatted
Cybersecurity Questions Formatted
1. **Explain the process of a security risk assessment in database security, including its importance
A security risk assessment in database security identifies, evaluates, and prioritizes potential
security threats to ensure the protection of critical data and assets. Its importance lies in helping
2. **Describe cryptography?s role in database security, covering its purposes, key techniques, and
Cryptography is essential for securing sensitive information in databases, serving five primary roles:
...
3. **Discuss the types of access control models available for database security and explain how
The three main access control models for database security are Discretionary Access Control
(DAC), Mandatory Access Control (MAC), and Role-Based Access Control (RBAC). ...
4. **What are the risks and challenges associated with database outsourcing, and how can
Database outsourcing involves storing and managing data with an external provider, which
introduces risks such as data breaches, unauthorized access, compliance issues, and reduced
control over data handling. Key challenges include ensuring data confidentiality, regulatory