- World's Largest Collection of Interview Questions
Start Your Own website Now
Sponsored Links

Interview Questions
Our Services

Get 9,000 Interview Questions & Answers in an eBook.

  • 9500+ Pages
  • 9000 Question & Answers
  • All Tech. Categories
  • 14 MB Content

    Get it now !!

    Send your Resume to 6000 Companies

    Question :
    Explain the purpose and scope of database security?

    Category Database Security Interview Questions
    Rating (0.8) By 151 users
    Added on 8/11/2011
    Views 423
    Rate it!

    The purpose of database is to protect unauthorized accessing of data and misuses by hackers and unauthorized personals. So here the database security comes into the picture.

    Database security denotes the system, processes, and procedures that protect a database from unintended activity.

    Security is usually enforced through access control, auditing, and encryption.

    * Access control ensures and restricts who can connect and what can be done to the database.
    * Auditing logs what action or change has been performed, when and by whom.
    * Encryption: Since security has become a major issue in recent years, many commercial database vendors provide built-in encryption mechanisms. Data is encoded natively into the tables and deciphered "on the fly" when a query comes in. Connections can also be secured and encrypted if required using DSA, MD5, SSL or legacy encryption standard.

    If you have the better answer, then send it to us. We will display your answer after the approval.
    Rules to Post Answers in

  • There should not be any Spelling Mistakes.
  • There should not be any Gramatical Errors.
  • Answers must not contain any bad words.
  • Answers should not be the repeat of same answer, already approved.
  • Answer should be complete in itself.
  • Name :*
    Email Id :*
    Answer :*
    Verification Code Code Image - Please contact webmaster if you have problems seeing this image code Not readable? Load New Code
    Process Verification  Enter the above shown code:*
    Inform me about updated answers to this question

    Related Questions
    View Answer
    Define rollback and roll forward.

    View Answer
    Explain the meaning of the expression ACID transaction.

    View Answer
    In general, how should the boundaries of a transaction be defined?

    View Answer
    What is lock granularity?

    View Answer
    Explain the difference between an explicit and an implicit lock.

    View Answer
    Explain the difference between a database administrator and a data administrator.
    View Answer
    Explain how a database could be recovered via reprocessing. Why is this generally not feasible?
    View Answer
    Why is it important to write to the log before changing the database values?

    View Answer
    Describe the advantages and disadvantages of DBMS-provided and application-provided security.

    View Answer
    Explain What is user Account in Oracle database?
    View Answer
    Explain What is Privilege Auditing?
    View Answer
    What is a database security profile?
    View Answer
    Explain What is Auditing? What are the different Levels of Auditing?
    View Answer
    Explain What is a trace file and how is it created?
    View Answer
    Explain What are Roles?
    View Answer
    Explain What is Statement Auditing?
    View Answer
    Explain What are the system resources that can be controlled through Profile?
    View Answer
    Explain What is an Auditing?
    View Answer
    Explain What is an Object Auditing?
    View Answer
    Explain What are the roles and user accounts created automatically with the database?
    View Answer

    Please Note: We keep on updating better answers to this site. In case you are looking for Jobs, Pls Click Here - Best Freshers & Experienced Jobs Website.

    View ALL Database Security Interview Questions

    User Options
    Sponsored Links

    Copyright ©2003-2015, All Rights Reserved.
    Privacy Policy | Terms and Conditions

    Download Yahoo Messenger | Placement Papers| FREE SMS | ASP .Net Tutorial | Web Hosting | Dedicated Servers | C Interview Questions & Answers

    Testing Articles | Testing Books | Testing Certifications | Testing FAQs | Testing Downloads | Testing Interview Questions | Testing Jobs | Testing Training Institutes

    Cache = 0.050781 Seconds