What is the role of the dba with respect to security

Assignment Help Basic Computer Science
Reference no: EM131210861

1. Explain the intuition behind the two rules in the Bell-LaPadula model for mandatory access control.

2. Give an example of how covert channels can be used to defeat the Bell-LaPadula model.

3. Give an example of polyinstantiation.

4. Describe a scenario in which mandatory access controls prevent a breach of security that cannot be prevented through discretionary controls.

5. Describe a scenario in which discretionary access controls are required to enforce a security policy that cannot be enforced using only mandatory controls.

6. If a DBMS already supports discretionary and mandatory access controls, is there a need for encryption?

7. Explain the need for each of the following limits in a statistical database system:

(a) A maximum on the number of queries a user can pose.

(b) A minimum on the number of tuples involved in answering a query.

(c) A maximum on the intersection of two queries (i.e., on the number of tuples that both queries examine).

8. Explain the use of an audit trail, with special reference to a statistical database system.

9. What is the role of the DBA with respect to security?

10. What is public-key encryption? How does it differ from the encryption approach taken in the Data Encryption Standard (DES), and in what ways is it better than DES?

11. What are one-way functions, and what role do they play in public-key encryption?

12. Explain how a company offering services on the Internet could use public-key encryption to make its order-entry process secure. Describe how you would use DES encryption for the same purpose, and contrast the public-key and DES approaches

Reference no: EM131210861

Questions Cloud

In what ways is it different from an ordinary program : Define these terms: atomicity, consistency, isolation, durability, schedule, blind write, dirty read, unrepeatable read, serializable schedule, recoverable schedule, avoids-cascading-aborts schedule.
What is the effect on the equilibrium international price : What is the effect on the U.S. domestic demand and/or supply curve(s)?- What is the effect on the U.S. demand-forimports curve?
Define strategic leadership : Define strategic leadership and describe in detail how each level of the domain of strategic leadership support the overall concept. Give an example of strategic leadership you have seen yourself. Explain the circumstances and why you consider i..
Write a five pages essay on the biotransformation : Write a 3-5 page essay on the following: on Biotransformation. Cite references in APA format. Write a 3-5 page essay on the following: Pick a toxin and in detail explain how it is absorbed, distributed and excreted.
What is the role of the dba with respect to security : Explain how a company offering services on the Internet could use public-key encryption to make its order-entry process secure. Describe how you would use DES encryption for the same purpose, and contrast the public-key and DES approaches
How much sulfur and how much sulfuric acid can be produced : How much sulfur and how much sulfuric acid (in Kg) can be produced from the SO2 according to part (a) of this question. What would be the pH of the rain at 298K?
Check on average department salaries : What privileges should be granted to a user who needs to know only average department salaries for the Toy and CS departments?
Draw and refer to graphs of supply and demand curves : f the countries allow free trade in raisins, explain why $3.50 per kilogram cannot be the free-trade equilibrium world price for raisins.-draw and refer to graphs of supply and demand curves for the two national markets.
Identify several challenges in the organization : Identify several challenges in the organization that might result from diversity-related issues that might require managed change. Determine the levels in the organization that might be impacted by the managed change.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What are the unique features of wordnet

What are the unique features of WordNet that distinguish it from other types of standard thesauri? And

  Assuming you are the chief executive officer

Assuming you are the chief executive officer (CEO) of Apple, describe a situation in which you would use marginal analysis to make a business decision.

  Avalanche breakdown

Explain the Zener phenomenon. How does it differ from Avalanche breakdown?

  Protect the access to the password hashes

Usual authentication systems verify passwords with the help of their hashes stored in protected files. i. Explain why is the purpose of storing password hashes rather than the passwords themselves? ii. Explain why should we protect the access to the ..

  Expert system as used in artificial intelligence

What is the definition or meaning of Expert System as used in Artificial Intelligence?

  Key step in validating a proposed idea

Abstract Background: A key step in validating a proposed idea or I have to manually look through papers to find suitable datasets and their URLs, Which is strenuous and inefficient. To better encourage the data discovery process. And provide a bet..

  Computer or internet crime illustrating the computer

Research computer crime laws in your state. (If your state does not have computer crime laws specific to cyber-crimes, look at the laws in a neighboring state). Briefly describe the law(s) and the corresponding penalties/fines. Then, find a curr..

  Calculates the sum of all the gaps between successive array

calculates the sum of all the gaps between successive array elements. The array elements are double words, sequenced in nondecreasing order.

  How much did the firm pay in taxes

A firm's net profit margin when ignoring the effects of financing is 20% with an EBIT of $1.52 million and sales of $5.2 million. How much did the firm pay in taxes?

  Determine the maximum angle ? for the system

determine the maximum angle θ for the system to remain in equilibrium, regardless of the weight of cylinder D. Links AC and BC have negligible weight and are connected together at C by a pin.

  Explaining distributed music in physical cds and mp3 files

For some time, popular music has been distributed on physical CDs. It can now be distributed in MP3 files. Explain the nature of the similarity or difference.

  Explaining the threats of social engineering

Imagine that you are explaining the threats of Social Engineering to the Corporate Entity to a nontechnical audience.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd