Nt1330 Chapter 9

Good Essays
Submit the questions as a Word document attachment.
Chapter 9 Project Questions: 56, 59, & 60. Ensure you include a link to the websites and APA information.
Chapter 9 Review Questions: 1, 2, 4, 7 - 9, 11 - 19, 30, 31, 36, 38 - 45, 51, & 54.
Chapter 10B Review Questions: 8 - 11.
***Please note that your Final Project is due at the end of next week, Week 7.***

Chapter 9 Project Questions
56. I found an article detailing Oracle Solaris 11 and it’s security implementations. The basics of the article was it is designed to ensure different layers of security, including user access, system privileges and security resources.
It explains how the basics of Oracle security is outlined which is parallel to DBMS security that includes the user, the
…show more content…
The DBA’s responsibilities include physical design, installs, security, backups, and requirements of the database.
7. The trade-offs for concurrency controls are: a. If it’s too strict it can lead to locking the entire database. b. Other measures have low level of concurrency control.
8. Atomic transaction ensures that all the actions on the database are done or none of them are done at all. If none of them are done then the database remains unchanged. It’s important because if ensures that important actions are taken that would otherwise undermine a specific action. For example, overcharging a customer, when they deleted their purchase.
9. A concurrent transaction is when two transactions are being processed against a database at the same time. A simultaneous transaction seems like it is happening at once, but in reality the different transaction is performed on a different line item, and then immediately switched back to the first request. Only one CPU is required for a simultaneous transaction.
11.
12. Lock granularity is the size of the lock.
13. An exclusive lock, locks the item from any other access. No other transaction can read or change the data. A shared lock locks the item from change but not from
…show more content…
Access control lists, and permissions should be implied on a DBMS system to ensure the integrity of it.
42. User accounts and passwords should be protected. Permissions should be set where the lowest level of access is maintained. Ensure the use of groups is accurate.
43. Two elements of a database security plan are: procedures in the event of a security risk, and the design of the security plan.
44. The advantages of a DBMS security plan is it is dependent and designed around the DBMS system itself. The disadvantage of DBMS security plans is software updates may lag behind other notable security updates.
45. An SQL injection attack is when a user modifies an SQL statement by injecting their own code into a statement. This can be prevented by locking special characters in a text box, and not showing the error page to a user.
51. Having frequent checkpoints of a database allows quick restoration of a database, as long as they are done repeatedly in a limited time frame.
54. Data repository is important due to giving important information about the database, including permissions, user data, and a general bird-eyes view of what state the database is in. Without one large organizations have trouble making decisions on their overall

Related Documents