Database Security Flashcards

1
Q

What are the two major security problems in Databases?

A

The two major problems are Integrity and secrecy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a query?

A

A command to interact with the database, the retrieves, modifies, adds, or deletes fields and records in the database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the advantages of a database?

A

Shared access
minimal redundancy, users don’t need to collect their own data
data consistency, change to data affects all users of that data
data integrity, values are protected against accidental or malicious change
Controlled Access, only authorized users can view or modify.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is auditabilty?

A

Ability to track all reads and writes. It is desirable to do this down to the element level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Access control

A

To limit the accessability of specific data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Dbms User Authentication?

A

A dbms might require a user to pass both a password and a time-of-day checks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is availability

A

The database is an existential tool and must be available and not busy serving others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a two phase update

A

Intent and commit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does a database maintain redundancy and internal consistency?

A

Additional information ranging from a few checkbits to shadow copies.,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Shadow fields

A

Provide redundacny and back up, entire attributes can be duplicated, requiring storage space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a recovery method for DBMS.

A

In the event of failure the databsase is reloaded from a backup and all changes are applied from the audit/transaction log.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does the database handle concurrency.

A

The DBMS locks a record until a write is completed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a monitor responsible for?

A

A monitor is responsible for structural integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a state constraint?

A

State constraints describe the condition of the entire database, at no time should these values violate these constraints.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a transition constraint?

A

They describe the state the database must be in before changes can be applied.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an indirect attack .

A

Attacker tries to infer a final result based on one or more intermdiate statistical results.

17
Q

What is a direct attack?

A

User tries to determine values of sensitive fields by seeking them directly.

18
Q

What is the intersecting median attack?

A

When attacker uses slightly more complicated process to determine individual values from medians.

19
Q

What is a Tracker attack?

A

Modifying query to get around data rules and get specific information, by doing set differences.

20
Q

What is a Linear system vulenerability?

A

Using math and a bunch of queries one can solve the all the queires to find the unknown common value.

21
Q

What is Random data perturbation?

A

adding random seed values to the data to offset.

22
Q

How does a user expliot unique object collisions between security Domains in MLS Database.

A

When a low level user receives an error message that says the row cannot be inserted because the unique key exists. The low level user verifies the key does not exist at a dominated level, they then know the existence of the key at a higher leve.

23
Q

How do you realize and prevent the aggregation problem?

A

Requires tracking the history of prior accesses as well as publicly available information.

24
Q

How do we extend the trust from the security kernel to the trusted security base to the application space?

A

Assurance and trust in what is enforcing the policy? TCB Subsets

25
Q

What is a TCB subset?

A

It is a TCB which relies on the TCB of the underlying system for its own policy enforcement.
A TCB subset M is a set of Software, Firmware, and hardware, that mediates the access of a set S of subjects to a set O of Objects on the basis of a stated access control policy P.