top of page

Post test 3 Vclass ( security of the database ) Bahasa & English.

Post test proteksi basis data;



1. Sebutkan bentuk-bentuk akses yang secara secara sengaja dapat merusak atau merugikan pemilik basisdata

>Pengambilan data dan pembacaan data oleh user yang tidak berwenang

>Pengubahan data oleh user yang tidak berwenang

>Penghapusan data oleh user yang tidak berwenang

2. Untuk melindungi basis data, jelas level-level pengamanan basis data yang harus dilakukan?

>Fisikal

>Manusia sebagai user

>Sistem Operasi

>Sistem Database

>Jaringan

3. Jelaskan bentuk-bentuk otoritas user terhadap data yang disimpan dalam table/relasi basis data

v Tingkatan CONNECT

>Membuat View dari table yang diijinkan

>Menggunakan ALTER, DROP , INDEX terhadap table

>Menampilkan / merubah record (SELECT, UPDATE, DELETE)

>Memberikan ijin pada user lain atas table yang diperbolehkan.

v Tingkatan RESOURCE

>Hak yang sama yang diberikan pada tingkatan CONNECT

>Merubah struktur tabel

>Membuat tabel baru, view baru

v Tingkatan DBA

>Semua hak yang dimiliki Tingkatan RESOURCE

>Melakukan DROP DATA BASE




Database protection Qna

1. Intentional access that can be ruin the database ?

>taking the data from unknown users.

>changing the data from unknown users.

>drop the data from unknown users.

>access the data by crackers which is illegal for private purpose.

2. What is the levels of security database?

Security Levels

To protect the database, we must take security measures at several levels:

Physical: The sites containing the computer systems must be secured against armed or surreptitious entry by intruders.

• Human: Users must be authorized carefully to reduce the chance of any such user giving access to an intruder in exchange for a bribe or other favors .

Operating System: No matter how secure the database system is, weakness in operating system security may serve as a means of unauthorized access to the database.

• Network: Since almost all database systems allow remote access through terminals or networks, software-level security within the network software is as important as physical security, both on the Internet and in networks private to an enterprise.

Database System: Some database-system users may be authorized to access only a limited portion of the database. Other users may be allowed to issue queries, but may be forbidden to modify the data. It is responsibility of the database system to ensure that these authorization restrictions are not violated.

Security at all these levels must be maintained if database security is to be ensured. A weakness at a low level of security (physical or human) allows circumvention of strict high level (database) security measures.

3. The users otority about data base inside of the relation or table?

>CONNECT:

Making view.

Using ALTER,DROP,INDEX I the table.

Changing the record using SELECT,UPDATE,DELETE.

Give permission to another user.

>RESOURCE:

Same rights that given by the Connect.

Changing structure of the table and make the new one.

>DBA

All the rights thing is same like Resource gave to the user.

Delete the database using ‘DROP’.

Source:

Power point by Gunadarma University's lecturer: Hasma Rasjid

picture: Pinterest

 
 
 

Comments


catch me on instagram: mxzyrd

bottom of page