GTU MCA MATERIAL FOR DBMS II

RSS
  • Home
  • Quick Review
  • Assignment
  • Backup and Recovery
  • Differences
  • About Me

Saturday, April 9, 2011

Assignment - 4 Database Security


Assignment – 4     Database Security   Submission Date : 13-Apr-2011  


Q.1
Explain the Following Questions in detail.

1.    What is database security? Explain the goal of database security?
2.    Describe the Granting & Revoking privileges using SQL with syntax and example. Explain account level, table level and column level privileges.
3.    Explain concept of audit train in detail
4.    Explain the Mandatory Access Control with Bell-Lapadulla model.
5.    What is statistics database security?
6.    What do you mean by firewall? What are firewall techniques that are used in database Security?
7.    Explain data encryption with different schemes.
8.   Using Polyalphabetic substitution method and encryption key, “SECURITY”, encrypt the plaintext message “SELL ALL STOCKS”
Q.2
Differentiate the following :

1.    Security Vs integrity
2.    Discretionary Access Control Vs Mandatory Access Control
3.    Authorization Vs Authentication.
4.    Simple Property Vs Star Property
5.    Audit Trail Vs Transaction Log
6.    Simple Substitution Method Vs Polyalphabetic Substitution Method
Posted by Dr. Parag Shukla at 12:05:00 AM
Email This BlogThis! Share to X Share to Facebook

0 comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Total Pageviews

255132

Blog Archive

  • ►  2019 (1)
    • ►  March (1)
  • ►  2016 (7)
    • ►  August (6)
    • ►  July (1)
  • ▼  2011 (16)
    • ►  May (2)
    • ▼  April (6)
      • Basic of Join
      • Relational Algebra
      • Speed Up Vs Scale Up
      • Assignment - 5 Introduction to Other Databases
      • Mid Term Exam Feedback
      • Assignment - 4 Database Security
    • ►  March (5)
    • ►  February (3)
  • ►  2010 (9)
    • ►  May (4)
    • ►  March (5)
  • ►  2009 (1)
    • ►  December (1)

Followers

Blog List

Search

Parag Shukla. Powered by Blogger.

Popular Posts

  • Serial Schedule Vs Non-Serial Schedule
    Serial Schedule Non-Serial Schedule A serial schedule is a sequence of operat...
  • Dirty Read Vs Unrepeatable Read
    Dirty Read Unrepeatable Read A dirty read problem occurs when one transaction updates a ...
  • Log Based Recovery
    Log Based Recovery The most widely used structure for recording database modification is the log. The log is a sequence of log ...
  • Lost Update Vs Uncommitted Data
    Lost Update Uncommitted Data This problem is also known as “Multiple Update...
  • Shadow Paging
    Shadow Paging This technique does not require LOG in single user environment In mult...
  • Starvation Vs Deadlock
    Starvation Deadlock Starvation happens if same transaction is always choosen ...
  • Checkpoints
    Checkpoints When System failure occurs o We must consult log to determine those transaction that need to be redone and those tra...
  • Defferred Update method
    Deferred update Do not physically update the database on disk until after a transaction reaches its commit point; Then updates are r...
  • Assignment - 7 Query Processing & Optimization
    Assignment – 7         Query Processing & optimization    Submission Date 30-05-11   Q-1. Explain th...
  • Immediate Update Method
    Immediate update technique Database may be updated by some operations of a transaction before the transaction reaches its commit poi...
Copyright © 2010 GTU MCA MATERIAL FOR DBMS II