Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Match each activity/process/task used to implement the computerised counter meas

ID: 3607504 • Letter: M

Question

Match each activity/process/task used to implement the computerised counter measures to protect database security with the corresponding description.

For example
Journaling: process of keeping and maintaining a log file (or journal) of all changes made to database to enable effective recovery in event of failure
Recovery: process adopted in the event of database failure to restore the database to the latest consistent state using backup and journaling

Collection of settings that limits the use of system resources and A. Profile the database B. View C. Integrity D.Authorisation E. Auditing F. Encryption G. Backup 4 Process of periodically taking a copy of the database and log file (and possibly programs) to offline storage media. + The encoding of the data by a special algorithm that renders the data unreadable by any program without the decryption key. ; The granting of a right or privilege, which enables a subject to legitimately have access to a system or a system's object. ; Prevents data from becoming invalid, and hence giving misleading or incorrect results. Monitoring and recording of selected users' suspected database actions Powerful, flexible and simple mechanism by hiding certain important attributes or rows from certain users.

Explanation / Answer

Collection of settings that limits the use of system resources and the database. ---- A. Profile

Process of periodically taking a copy of the database and log file (and possibly programs) to offline storage media ----- G. Backup

The encoding of the data by a special algorithm that renders the data unreadable by any program without the decryption key. ----- F. Encryption

The granting of a right or privilege which enables a subject to legitimately have access to a system or a system's object.---- D. Authorisation

Prevents data from becoming invalid,and hence giving misleading or incorrect results. ---- C. Integrity

Monitoring and recording of selected users 's suspected database actions------ E. Auditing

Powerful,flexible and simple mechanism by hiding certain important attributes or rows from certain users ---- B.View