Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
11 Cards in this Set
- Front
- Back
Security of Data is the only security that should be considered. |
False. Data of other system components should also be considered (eg. Physical)
|
|
Threat |
Any situation or event that can adversely affect a system and consequentially an organisation. Are either Tangible or Intangible. |
|
Extent of Damage |
Depends on counter-measures and contingency plans. (eg. When the last data backup was performed)
|
|
Threat to System: Comms Network |
- Wire tapping - Breaking of cables |
|
Threat to System: DBMS and Apps |
- Failure of Security implementations - Theft of programs - Program alteration |
|
Common Countermeasures |
- Authorization - Access Control Lists - Views - Backup and Recovery |
|
Countermeasure: Checkpoint |
Allows recovery manager to begin recovery from a short period rather than recovering the entire day. |
|
Countermeasure: Integrity |
Prevent data from becoming invalid. |
|
Countermeasure: Encryption |
Encoding data to prevent plain-text display of data. |
|
Countermeasure: RAID |
Allows fault tolerance via Parity or error-correcting method of storing data. Increases performance via data striping. |
|
Database Administrator (DBA) |
Responsible for logical and physical database design and dealing with security, performance and availability of DB. |