What are the 4 pillars of security?
Name 3 forms of authentication
Briefly describe 4 different types of authorisation (access control)
What are the 5 security elements of the Java security manager?
What are the main technolgoies associated with secure transmission of data?
What is a cryptographic hash?
Describe what happens during a simple message digest and its weakness
weakness is if d and m are both modified during transit
Describe what a message authentication code is? (complex message digest)
What is symmetric key encryption? What are its issues?
issues:
What is public/private key encryption? How does it solve issues of symmetric key encryption?
use 2 related prime keys
What is a digital signature?
What is a digital certificate?
Certifying authority vouches for a 3rd party by issuing a digital certificate
What do we look at to see if systems are robust?
What is meant by physical protection of data?
What is an SQL view?
How do we control access to data to make databases more penetration resistant?
How do we make databases more resistant to penetration?
- validate all inputs
What is a failsafe transaction?
What are 3 possible strategies to prevent data loss during transaction interruption?
What are 4 issues with concurrent database access?
Describe different types of concurrency control (7)