Match each activity/process/task used to implement the computerised counter meas
ID: 3607504 • Letter: M
Question
Match each activity/process/task used to implement the computerised counter measures to protect database security with the corresponding description.
For example
Journaling: process of keeping and maintaining a log file (or journal) of all changes made to database to enable effective recovery in event of failure
Recovery: process adopted in the event of database failure to restore the database to the latest consistent state using backup and journaling
Explanation / Answer
Collection of settings that limits the use of system resources and the database. ---- A. Profile
Process of periodically taking a copy of the database and log file (and possibly programs) to offline storage media ----- G. Backup
The encoding of the data by a special algorithm that renders the data unreadable by any program without the decryption key. ----- F. Encryption
The granting of a right or privilege which enables a subject to legitimately have access to a system or a system's object.---- D. Authorisation
Prevents data from becoming invalid,and hence giving misleading or incorrect results. ---- C. Integrity
Monitoring and recording of selected users 's suspected database actions------ E. Auditing
Powerful,flexible and simple mechanism by hiding certain important attributes or rows from certain users ---- B.View