unit 3
1. define role-based access control
Role-Based Access Control (RBAC) is a system
where users are grouped into roles based on their
job responsibilities. Each role is given specific
access rights to resources. Users can only access
resources allowed by their roles, improving security
and access control management.
or
Role-Based Access Control (RBAC) is a system that
organizes users into roles based on their
responsibilities. Each role is assigned specific
permissions to access resources. Users inherit
permissions from their roles, so they only have
access to the resources necessary for their job
functions. RBAC streamlines access management,
improves security, and ensures users have
appropriate access rights within the organization.
2. what is mandatory access control
In Mandatory Access Control (MAC), access to
resources is controlled by a central authority based
on security labels or levels assigned to users and
resources. Users can only access resources if their
security level permits it, following strict predefined
rules for access control. MAC ensures strong
security enforcement and data confidentiality
within an organization.
or
Mandatory Access Control (MAC) is a strict security
method where a boss decides who can access
what. Each person and thing gets a security level.
You can only see stuff if your level is high enough.
It's like having keys that only open certain doors.
This helps keep important information safe, like in
government or banks.
3. write a short note on discretionary access
control
Discretionary Access Control (DAC) is a security
model where users have more control over access
permissions to resources. Here's a short note on
DAC:
In Discretionary Access Control (DAC), users have
some control over who can access their resources.
Unlike Mandatory Access Control (MAC), where a
central authority sets access rules, DAC allows
resource owners to determine access permissions.
Users can grant or revoke access to their files,
folders, or other resources based on their
discretion. This model is more flexible but can also
be less secure if access rights are not managed
carefully. DAC is commonly used in environments
where users need more autonomy over their data,
such as personal computers, small businesses, and
collaborative projects.
or
Discretionary Access Control (DAC) is like giving
keys to your friends for your room. You decide who
can come in and what they can do. It's more
flexible, but you need to be careful about who you
give keys to so that things stay safe.
4. write a short note on database security describe
the problems on data base security and security
mechanism
Database security is about keeping information in
databases safe. One big problem is when people
who shouldn't access the data get in and steal it.
Another problem is when data gets changed or
messed up by accident or on purpose. Weak
passwords and not checking who's using the data
can also cause problems.
To fix these issues, organizations use methods like
controlling who can access what (access control),
encrypting sensitive data to keep it secret, using
strong passwords and extra verification methods
(authentication), keeping an eye on who's using the
data (monitoring), and making copies of data in
case something goes wrong (backup and recovery).
These measures help protect the data and prevent
unauthorized access or damage.
[Link] is referential intergrity
Referential integrity is like ensuring that all puzzle
pieces fit together correctly in a jigsaw puzzle. In a
database, it means making sure that data in one
table that's supposed to relate to data in another
table actually does so. This prevents data from
getting mixed up or disconnected, keeping
everything organized and accurate.
or
Referential integrity is a fundamental principle in
database management that ensures relationships
between tables are upheld and consistent. It
involves maintaining the accuracy and validity of
data connections within a relational database.
Imagine a scenario where you have two tables:
"Customers" and "Orders." The "Orders" table has a
column called "CustomerID," which references the
"CustomerID" column in the "Customers" table.
Referential integrity ensures that every
"CustomerID" value in the "Orders" table
corresponds to an existing "CustomerID" in the
"Customers" table. If a "CustomerID" is deleted or
modified in the "Customers" table, the related data
in the "Orders" table remains intact or is updated
accordingly to maintain consistency. By enforcing
referential integrity through constraints like foreign
key relationships, databases can prevent data
anomalies, such as orphaned records or data
inconsistencies, ensuring data accuracy and
reliability.
6. write short not on statistical database security
Statistical database security means keeping safe
important statistical data stored in databases. This
involves using methods like encryption to protect
data, controlling who can access it, and removing
personal details to keep identities private. These
measures help keep sensitive information secure
and follow privacy rules.
or
Statistical database security is about making sure
that important statistical data stored in databases
stays safe and private. This includes using
techniques like encryption to protect data from
unauthorized access, controlling who can see or
use the data, and removing personal details to
keep people's identities anonymous. These
methods are important for keeping sensitive
information secure and following privacy
regulations.
[Link] the encryption technique for security
Encryption is like putting your data in a secret code
that only you and the person you want to share it
with can understand. It's done using a special key
to scramble the data, making it unreadable to
anyone who doesn't have the key to unlock it. This
keeps your information safe from unauthorized
access or theft.
or
Encryption is a crucial security measure used to
protect sensitive information from unauthorized
access or theft. It works by converting plain text
data into an unreadable format, known as cipher
text, using an encryption algorithm and a secret
key. This process makes the data unintelligible to
anyone who does not possess the correct
decryption key.
In the encryption process, the original data, called
plain text, undergoes transformation into cipher
text using the encryption algorithm and key. The
encrypted data can only be deciphered back into its
original form by using the corresponding decryption
key and algorithm.
There are different types of encryption techniques,
such as symmetric encryption, which uses the
same key for both encryption and decryption, and
asymmetric encryption, which uses a pair of keys –
a public key for encryption and a private key for
decryption. Encryption is widely used to protect
sensitive information during data transmission over
networks, secure communication channels, and
safeguard stored data on devices or servers. It is an
essential component of cybersecurity strategies to
ensure data confidentiality and integrity.