Describe three methods of breaching data security


Assignment:

Questions

1. Name and briefly describe three methods of breaching data security. Which do you think is potentially the most serious? Explain.

2. How does the physical security of company premises affect data security?

3. What is data encryption and why is it important to data security?

4. In your own words, describe how Secure Socket Layer (SSL) technology works.

5. In your own words, describe how a proxy server firewall works.

6. Describe the two different problems that forward recovery and backward recovery are de- signed to handle. Do mirrored databases address one of these two problems or yet a third one? Explain.

7. In your own words, describe how forward recovery works.

8. In your own words, describe how backward recovery works.

9. What is the lost-update problem? What are locks and how are they used to prevent the lost-update problem?

10. A large bank has a headquarters location plus several branches in each city in a particular region of the country. As transactions are conducted at each branch, they are processed online against a relational database at headquarters. You have been hired as the bank's Director of Data Security. Design a comprehensive set of data security measures to protect the bank's data.

Solution Preview :

Prepared by a verified Expert
Database Management System: Describe three methods of breaching data security
Reference No:- TGS03197300

Now Priced at $70 (50% Discount)

Recommended (98%)

Rated (4.3/5)