• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/11

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

11 Cards in this Set

  • Front
  • Back

Security of Data is the only security that should be considered.

False. Data of other system components should also be considered (eg. Physical)


Threat

Any situation or event that can adversely affect a system and consequentially an organisation. Are either Tangible or Intangible.

Extent of Damage

Depends on counter-measures and contingency plans. (eg. When the last data backup was performed)

Threat to System: Comms Network

- Wire tapping


- Breaking of cables

Threat to System: DBMS and Apps

- Failure of Security implementations


- Theft of programs


- Program alteration



Common Countermeasures

- Authorization


- Access Control Lists


- Views


- Backup and Recovery



Countermeasure: Checkpoint

Allows recovery manager to begin recovery from a short period rather than recovering the entire day.

Countermeasure: Integrity

Prevent data from becoming invalid.

Countermeasure: Encryption

Encoding data to prevent plain-text display of data.

Countermeasure: RAID

Allows fault tolerance via Parity or error-correcting method of storing data. Increases performance via data striping.

Database Administrator (DBA)

Responsible for logical and physical database design and dealing with security, performance and availability of DB.