Question

1. Describe the use of permissions and roles in securing a SQL database. 2. Describe the...

1. Describe the use of permissions and roles in securing a SQL database.

2. Describe the concept of database encryption.

3. How can encryption be used to provide security in the database?

4. What new encryption features are in SQL 2016?.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

1. Describe the use of permissions and roles in securing a SQL database.

- Most SQL databases have a number of users viewing and accessing data, which makes security a major concern for the administrator. Administrator will take full advantage of SQL server security roles, which grant and deny permissions to groups of users. It gives login security, database security, database objects.

2. Describe the concept of database encryption.

- The concept of database encryption is simply to protect our data. It is the process of converting data, from a database, in plain text format into a meaningless cipher text by means of a suitable algorithm.

3. How can encryption be used to provide security in the database?

- With the use of database encryption, an encryption algorithm do the transformation of data from a database from a readable state into a cipher text of unreadable characters. With a key generated by the algorithm, a user can decrypt the data and retrive the usable information as needed. Hence, encryption can be used very effectively to provide security in the database.

4. What new encryption features are in SQL 2016?

- Always Encrypted

- A self-signed certificate, that is our column master key (CMKD) on your machine.

- A Column Encryption Key (CEK)

- A Column Master Key Defination in the database, storing information about CMYD location.

Add a comment
Know the answer?
Add Answer to:
1. Describe the use of permissions and roles in securing a SQL database. 2. Describe the...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Define what a relational database is. Describe its importance to an organization and why securing it...

    Define what a relational database is. Describe its importance to an organization and why securing it is important. Provide a database schema in tabular format and provide the necessary SQL statements to build it. Your database should include a table with a minimum of three attributes (columns). Include the SQL statement to create the table and insert data into three rows of the table. This is an individual assignment.

  • Lab 3: Securing the Database Environment You have been hired as the DBA for Haphazard, Inc....

    Lab 3: Securing the Database Environment You have been hired as the DBA for Haphazard, Inc. You are asked to fulfill the following needs of the Database environment. You can choose any database, such as Oracle, MySql, Sqlserver, etc. 1. Users, roles, and privileges need to be added to the database. Identify the statements that would be used for creating the following users, roles, and privileges that match the following requirements: a. Create a user account NLitzinger identified by the...

  • An idea is to use the SQL injection attack to turn one SQL statement into two,...

    An idea is to use the SQL injection attack to turn one SQL statement into two, with the second one being the update or delete statement. In SQL, semicolon (;) is used to separate two SQL statements. Please describe how you can use the login page to get the server run two SQL statements. Try the attack to delete a record from the database, and describe your observation. The login page is based on the SEED labs run on Ubuntu...

  • Scenario: In your newly assigned Oracle DBA position, the security audit team wants you to be...

    Scenario: In your newly assigned Oracle DBA position, the security audit team wants you to be involved in a new project to make sure Users are created with Least Privileges, the database uses encryption for all data-at-rest, use separate table spaces for users and applications, user passwords expire on first login, quotas should be used for tablespaces as opposed to unlimited tablespaces, temporary tablespaces should be used to help speed performance, no default user passwords exist in the database, Roles...

  • Write an SQL statement to develop a new database called ACCOUNT with the following attributes: 1)...

    Write an SQL statement to develop a new database called ACCOUNT with the following attributes: 1) Account_Number, 2) Customer_ID, 3) Account_Type, 4) Balance and 5) Opening_date. Note that you need to determine data types for the attributes.

  • Complete the following tasks using your AP Database. Please submit 1 .doc file of your SQL...

    Complete the following tasks using your AP Database. Please submit 1 .doc file of your SQL statements and a screen shot of a result set showing the data you inserted, updated, or deleted. I want to change the data in the AP database according to the following requirements. 1. I need an additional payment term for Net due 120 days. 2. I need to delete the Vendor Jobtrak because it has never had an invoice. 3. The vendor Coffee Break...

  • Q6.) A system that claims to be a Relational Database Management System must support several different...

    Q6.) A system that claims to be a Relational Database Management System must support several different features. Which one of the following is NOT one of those requirements? 1) It provides mechanisms for users to set and enforce integrity rules. 2) It provides data access through a query language. 3) It has commands that allow the end user to decide which files and folders will be used to structure how data is stored on the disk. 4) It has tools...

  • Please write SQL Query for following questions using Northwind Database: 1. Create a procedure to add...

    Please write SQL Query for following questions using Northwind Database: 1. Create a procedure to add a new record to Territories table. Call it NewTerr. Add the following records using the procedure. TerritoryID        TerritoryDescription     Region 88888 Brooklyn 1 99999 Waco 4 77777 Long Beach 2 2. Create an Update Procedure that will change the Region from 1 to 3 for record with TerritoryID 88888. Call it Update88. 3. Create a Delete Procedure that will delete the one record from...

  • For this hands-on project, you will use the SQL Server named instance SQLSERVERHOA, and the HandsOnOne...

    For this hands-on project, you will use the SQL Server named instance SQLSERVERHOA, and the HandsOnOne database and tables you created in previous chapters. The objective of this activity is to practice generating keys and encrypting/decrypting data. Document each step by taking a screen shot of the Query Editor window after successfully executing each SQL query. 1.In SQL Server Management Studio, open a new Query Editor window, which you will use for completing all steps in this activity. 2.Create a...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT