Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Match each activity/process/task used to implement the computerised counter measures to protect database security with the corresponding description. For example Journaling: process of keeping and
Match each activity/process/task used to implement the computerised counter measures to protect database security with the corresponding description. For example Journaling: process of keeping and maintaining a log file (or journal) of al changes made to database to enable effective recovery in event of failure Recovery: process adopted in the event of database failure to restore the database to the latest consistent state using backup and journaling Collection of settings that limits the use of system resources and A Auditing the database. View Process of periodically taking a copy of the database and log file (and possibly programs) to offline storage media. C. D. Profile E. Encryption The encoding of the data by a special algorithm that renders the data unreadable by any program without the decryption key Backup Authorisation Integrity The granting of a right or privilege, which enables a subject to legitimately have access to a system or a system's object. Prevents data from becoming invalid, and hence giving misleading or incorrect results. Monitoring and recording of selected users' suspected database actions. Powerful, flexible and simple mechanism by hiding certain important attributes or rows from certain users
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started