0% found this document useful (0 votes)
7 views

CCF 3251 Database Security

com
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

CCF 3251 Database Security

com
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

MERU UNIVERSITY OF SCIENCE AND TECHNOLOGY

P.O. Box 972-60200 – Meru-Kenya.


Tel: +254 (0)799529958, +254 (0)799529959, +254 (0)712524293
Website: www.must.ac.ke Email: [email protected]
University Examinations 2021/2022

SECOND YEAR, SECOND SEMESTER EXAMINATION FOR THE DEGREE OF


BACHELOR OF SCIENCE IN COMPUTER SECURITY AND FORENSICS
CCF 3251: DATABASE SECURITY

DATE: MAY 2022 TIME: 2 HOURS

INSTRUCTIONS: Answer Question ONE and ANY OTHER TWO Questions

QUESTION ONE
a) Define the following terms (6 Marks)
a. Data base security
b. System mechanism
c. System controls
b) Explain the importance of database security. (4 Marks)
c) Differentiate between (6 Marks)
a. Authorisation and authentication
b. Discretionary access control and mandatory access control
c. Account level and relation level privileges
d) State four roles of DBA (4 Marks)
e) Explain types of threats to data stored in a database and explain the controls
employed by database management systems to protect data from each of the threats
identified (6 Marks)
f) Write an SQL statement that gives user U1 the select privileges on branch table and
allows U1 to grant this privilege to others (4 Marks)

Meru University of Science & Technology is ISO 9001:2015 Certified


Foundation of Innovations Page 1
QUESTION TWO
a) SQL injection is a common attack that target database on web-based applications
a. Explain a typical SQL injection attack (6 Marks)
b. Explain two ways of preventing SQL injection attacks (4 Marks)
b) MUST has requested you to assist in designing its database security policy.
a. Explain the benefits of designing and implementing Database Security Policy
(4 Marks)
b. Discuss the Database Security policy Design Process ( 6 Marks)

QUESTION THREE
a. In relation to bell-lapadula model, explain its properties (4 Marks)
b. Write an SQL statement to demonstrate the following access control commands
a. Revoke (3 Marks)
b. Grant (3 Marks)
c. Explain the benefits of strong and comprehensive access control (4 Marks)
d. Discuss the different security and authorization mechanisms in database management
system (6 Marks)

QUESTION FOUR
a. Define the following vulnerabilities in a database and the mitigation strategy
(6 Marks)
a. Privilege abuse
b. The SQL injection
c. Misconfigured database
b. Explain risk management and its importances in an organisation (4 Marks)
c. Discuss the steps in data risk management process (6 Marks)
QUESTION FIVE (20 MARKS)
a. Describe four powerful capabilities of super user accounts recommended for database
administrators ( 6 Marks)
b. Explain the RAID mechanism and how it improves reliability and time performance
(6 Marks)

Meru University of Science & Technology is ISO 9001:2015 Certified


Foundation of Innovations Page 2
c. Bell and La Padula Model (BLP) and Biba model are commonly security models used
to achieve different security services. Discuss the BLP and BIBA security models and
for each state the security service it achieves. (8 Marks)

Meru University of Science & Technology is ISO 9001:2015 Certified


Foundation of Innovations Page 3

You might also like