8. Database Security – 3marks Flashcards

1
Q

How does privacy differ to security?

A

Privacy involves the ability of individuals to control the terms under which their sensitive data (personal information) is acquired and used
In contrast;
Security is required building block for privacy, and includes
• Preventing storage of sensitive data
• Ensuring appropriate/authorized use of sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the forms of sensitive data?

A
  • Inherently sensitive
  • From a sensitive source
  • Declared sensitive
  • A sensitive attribute or sensitive record
  • Sensitivity in relation to previously disclosed data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why is there typically a trade-off between accessibility and security?

A

Ensuring data kept safe from corruption and access suitably controlled can mean reduced accessibility (and the inverse).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Threats to database security include the loss of:

A

( Acronym to remember: CIA )
Confidentiality
– Unauthorized disclosure of confidential information
Integrity
– Improper modification of information
Availability
– Legitimate user cannot access data objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Database control measures include:

A

(acronym to remember: AIFE)
Access control
– Handled by creating user accounts and passwords
Inference control
– Must ensure information about individuals cannot be accessed
Flow control
– Prevents information from flowing to unauthorized users
Encryption of Data
– Used to protect sensitive transmitted data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The 3 Access control measures include:

A
Discretionary Access Control 
– Used to grant privileges to users 
Mandatory Access Control 
– Classify data and users into various security classes 
– Implement security policy 
Role-based Access Control
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the most common threat to a database system? Describe it?

A

SQL injection, where:
Attacker injects a string input through the (often web) application which changes or manipulates SQL statement to attacker’s advantage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Threats to database security include:

A
  • SQL injection
  • Unauthorized privilege escalation – Privilege abuse
  • Denial of service
  • Weak authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The 3 main SQL injection methods include:

A

SQL manipulation
– Changes an SQL command in the application
– Example: adding conditions to the WHERE clause Typical
manipulation attack occurs during database login
Code injection
– Add additional SQL statements or commands that are then processed
Function call injection
– Database or operating system function call inserted into vulnerable SQL statement to manipulate data or make a privileged system call

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Risks Associated with SQL Injection are:

A
  • Database fingerprinting
  • Denial of service
  • Bypassing authentication
  • Identifying injectable parameters
  • Executing remote commands
  • Performing privilege escalation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Three Protection Techniques for SQL injection are:

A

Blind variables (using parameterized statements)
– Protects against injection attacks
– Improves performance
Filtering input (input validation)
– Remove escape characters from input strings
– Escape characters can be used to inject manipulation attacks
Function security
– Standard and custom functions should be restricted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly