CT Merged
CT Merged
2 CO2 3 - - - - - - - - - - -
PART - A
(10 x 1 = 10 Marks)
Instructions: Answer all
Q. Mark PI
Questions BL CO PO
No s Code
1. _______ is a set of processes and procedure that transform 1 L1 1 1 1.6.1
data into information and knowledge.
A Knowledge system
B Information system
C Database system
D Computer system
2. A(n) _________ is a collection of programs that allows the 1 L1 1 1 1.6.1
user to operate the computer hardware.
A information system
B database
C DBA
D operating system
3. The main component of the operating system security 1 L1 1 1 1.6.1
environment is____________
A services
B file transfer
C memory
D file sharing
4. A ___________ is a place where database security must be 1 L1 1 1 1.6.1
protected and applied.
A security gap
B security access point
C security threat
D security vulnerability
5. _______is used for tactical management tasks and 1 L1 1 1 1.6.1
contains collection of business models
A Transaction Processing System (TPS)
B Decision Support System (DSS)
C Expert System (ES)
D Client / Server
6. 764 File Permission means? 1 L1 1 1 1.6.1
A Everyone can read, write and execute.
B Everyone can read, group can execute only and the
owner can read and write.
C Everyone can read, write and execute.
D Everyone can read, group including owner can
write, owner can execute.
7. _______is used by network devices to provide a centralized 1 L1 1 1 1.6.1
authentication mechanism
A SSL
B RADIUS
C SRP
D PKI
8. _______ is a process that decides whether users are 1 L1 1 1 1.6.1
permitted to perform the functions they request.
A Identification
B Authentication
C Authorization
D Verification
9. ___________ is a weakness that can be exploited by 1 L1 1 1 1.6.1
attackers.
A System with Virus
B System without firewall
C System with vulnerabilities
D System with strong password
10. __________ allows you to sign on once to a server (host 1 L1 1 1 1.6.1
machine) and then not have to sign on again if you go to
another server where you have an account.
A Password history
B Password reuse
C Logon retries
D Single sign-on
PART – B
(3 x 5 = 15 Marks)
Instructions: Answer any 3 Questions
11. Sketch out the Information Security Architecture. 5 L3 1 1 1.6.1
12. List the few DBMS functionalities and the major 5 L3 1 1 1.6.1
responsibilities of a database administrator.
DBMS functionalities:
✓ Allow developer and administrators to Organize
data
✓ Allow user to Store and retrieve data efficiently
✓ Allow user to Manipulate data (update and
delete)
✓ Enforce referential integrity and consistency
✓ Enforce and implement data security policies
and procedures
✓ Back up, recover, and restore data
Major responsibilities of a database administrator.
✓ Software Installation and Maintenance
✓ Data Extraction, Transformation, and Loading
✓ Specialised Data Handling
✓ Database Backup and Recovery
✓ Security
✓ Authentication
✓ Capacity Planning
✓ Performance Monitoring
✓ Database Tuning
✓ 10. Troubleshooting
13. Describe the categories of database security threats. 5 L3 1 1 1.6.1
✓ Threat is defined as “ An indication of
impending(i.e. will happen soon) danger or
harm”
✓ Vulnerabilities can escalate into threats
✓ DBA , IS Administrator should aware of
vulnerabilities and threats
✓ Four types of threats contribute to security risks
as shown in below figure
✓
2 CO2 3 - - - - - - - - - - -
PART - A
(10 x 1 = 10 Marks)
Instructions: Answer all
Q. PI
Questions Marks BL CO PO
No Code
1. Which of the following system supports non-structured 1 L1 1 1 1.6.1
problems and provide recommendations or answer to solve
these problems?
A Decision Support System
B Transaction Processing System
C Expert System
D Database Management system
2. The concept behind a(n) ________ application is based on 1 L1 1 1 1.6.1
the business model of a customer ordering a service or
product and the representative of a business granting that
request.
A information system
B C.I.A. triangle
C DBMS
D client/server
3. In CIA triangle, A stands for_______ 1 L1 1 1 1.6.1
A Atomicity
B Accessibility
C Authority
D Availability
4. A ________ is a security violation or attack that can 1 L1 1 1 1.6.1
happen any time because of a security vulnerability.
A Security risk
B Security privilege
C Security policy
D Security threat
5. Business application, in house programs, purchased 1 L1 1 1 1.6.1
software, operating systems, databases are example of
________
A Physical Asset
B Logical Asset
C Intangible Asset
D Human Asset
6. ________code that compromises the integrity and state of 1 L1 1 1 1.6.1
the system
A Worm
B Spoofing Code
C Virus
D Trojan Horse
7. LDAP stands for ____________. 1 L1 1 1 1.6.1
A Lightweight Direct Access Protocol
B Lightweight Directory Access Protocol
C Lightweight Directory Access Permission
D Limited Directory Access Protocol
8. Authentication information is transmitted over the network 1 L1 1 1 1.6.1
in an encrypted form using_______.
A SRP
B RADIUS
C SSL
D PKI
9. How many types of permissions a file has in UNIX? 1 L1 1 1 1.6.1
A 1
B 2
C 3
D 4
10. _________ tells the system how many days a password can 1 L1 1 1 1.6.1
be in effect before it must be changed
A Password aging
B Password Limit
C Password Validity
D Password reuse
PART – B
(3 x 5 = 15 Marks)
Instructions: Answer any 3 Questions
11. Enumerate the various components of Information 5 L3 1 1 1.6.1
systems.
2 CO2 3 - - - - - - - - - - -
PART - A
(10 x 1 = 10 Marks)
Instructions: Answer all
Q. Mark PI
Questions BL CO PO
No s Code
1. Data is processed or transformed by a collection of 1 L1 1 1 1.6.1
components working together to produce and generate
accurate information. These components are known as
a(n)_____________.
A information system
B database
C DBA
D operating system
2. NSTISSC stand for _____________ 1 L1 1 1 1.6.1
A National Service Telecommunications & Information
Systems Security Committee
B National Security Telecommunications &
Information Systems Security Committee
C National Security Telecommunications & Information
Systems Security Company
D National Security Telecommunications & Integration
Systems Security Committee
3. _____ means the protection of data from modification by 1 L1 1 1 1.6.1
unknown users.
A Confidentiality
B Integrity
C Authentication
D Non-repudiation
4. The model designed for guiding the policies of Information 1 L1 1 1 1.6.1
security within a company, firm or organization is referred
as______._
A Confidentiality
B Non-repudiation
C CIA Triangle
D Authenticity
5. From the following, which is not common file permission? 1 L1 1 1 1.6.1
A Write
B Execute
C Stop
D Read
6. Software that defines a database, stores the data, supports a 1 L1 1 1 1.6.1
query language, produces reports and creates data entry
screens is a___
A Data Dictionary
B Database Management System
C Decision Support System
D Relational Database
7. ___________ enforce and implement data security policies 1 L1 1 1 1.6.1
and procedures on data base levels.
A Database designer
B Database analyst
C Database Administrator
D Database manager
8. Which layer authenticates information that is transmitted 1 L1 1 1 1.6.1
over the network in an encrypted form?
A Socket base layer
B Secure socket layer
C Security application layer
D Security software
9. Which of the following method is efficient for reading but 1 L1 1 1 1.6.1
not suited for frequently changing information?
A Public Key Infrastructures (PKI)
B Secure Remote Password (SRP)
C Lightweight Directory Access Protocol
(LDAP)
D NT LAN Manager (NTLM)
10. __________is a small electronic device that users keep 1 L1 1 1 1.6.1
with them to be used for authentication of a computer or
network
A Kerberos
B Digital Card
C Digital Token
D Digital Certificate
PART – B
(3 x 5 = 15 Marks)
Instructions: Answer any 3 Questions
11. Annotate CIA triangle. 5 L2 1 1 1.6.1
2 CO2 3 - - - - - - - - - - -
PART - A
(10 x 1 = 10 Marks)
Instructions: Answer all
Q. PI
Questions Marks BL CO PO
No Code
1. ______is a gateway of the database access. 1 L1 1 1 1.6.1
A Server
B Operating System
C Network
D Internet
2. ________is a collection of security polices and 1 L1 1 1 1.6.1
procedures, data constraints, security methods , security
tools blended together to implement all necessary
measures to secure the integrity, accessibility and
confidentiality of every component of the database
environment.
A Operating System
B Firewall
C Database security
D Gateway
3. In CIA triangle, I stands for_______ 1 L1 1 1 1.6.1
A Information
B Integrity
C Issues
D Identification
4. Operating system, database and data are the example 1 L1 1 1 1.6.1
of____.
A Physical assets
B Logical assets
C Intangible assets
D Human assets
5. Database security is the_______to which all the data is 1 L1 1 1 1.6.1
fully protected from tampering and unauthorized acts.
A Degree
B Reliability
C Durability
D Percentile
6. _________device displays a unique number to the token 1 L1 1 1 1.6.1
holder, which is used as a PIN ( Personal Identification
Number) as the password.
A Digital Token
B Digital Card
C Digital Certificate
D Kerberos
7. The __________method is the process of verifying the 1 L1 1 1 1.6.1
identity of the user by means of a digital mechanism or
software.
A Digital Certificate .
B Digital Token
C Digital Card
D Digital authentication
8. In UNIX, a file can be recognized as an ordinary file or 1 L1 1 1 1.6.1
directory by ____ symbol.
A #
B $
C -
D *
9. Two parties to exchange information over an open 1 L1 1 1 1.6.1
network by assigning a unique key is called______.
A Token
B Ticket
C Keys
D Password
10. Malicious code that looks like a legitimate code is known 1 L1 1 1 1.6.1
as _______
A Passcode
B Spoofing code
C Virus code
D Trojan code
PART – B
(3 x 5 = 15 Marks)
Instructions: Answer any 3 Questions
11. Explain about database and database environment. 5 L3 1 1 1.6.1
✓ A collection of meaningful Integrated
Information System
✓ It is both Physical and Logical
✓ Representing the logical information in a
physical device
✓ Mainly used for storing and retrieving
the data for processing
✓ Using CLIENT / SERVER Architecture
✓ Request and Reply protocols are used to
communicate client and server
2 CO4 1 - 3 1 1 1 - - - - - -
PART - A
(15 x 1 = 15 Marks)
Instructions: Answer all
Q. PI
Questions Marks BL CO PO
No Code
When we update any tuple in the relation, which
1. 1 1 3 4,5 1.3.1
Authorization on a relation allows a user to?
A Select authorization
B Update authorization
C Grant authorization
D Define authorization
2. Which statement is used to revoke an authorization, 1 1 3 4,5 1.3.1
A Revoke
B Modify
C grant
D alter
3. Who are the oracle default users? 1 1 3 4,5 1.3.1
A SYS and SYSTEM
B SYSTEM and SCOTT
C SYS, SYSTEM and SCOTT
D SYS and SCOTT
4. Identify the other two names used by ORACLE to refer VPD? 1 1 4 3 1.3.1
A Column level security and Row level security
B Column level security and Fine grained access
C Row level security and Fine grained access
D Fine grained access and information security
________algorithm uses same cryptographic keys for both
5. 1 1 4 3 1.3.1
encryption and decryption of cipher text
A Asymmetric key encryption
B Private key encryption
C Public key encryption
D Symmetric key encryption
Oracle _______ views enable you to see everything created
6. 1 1 4 3 1.3.1
and stored in the database.
A Storage
B Data dictionary
C Service
D Users
__________ is the indication that a password has a limited
7. 1 1 3 4,5 1.3.1
time left before it expires.
A Password complexity
B Password storage
C Password usage
D Password aging
8. Command that comes under DCL is/are - 1 1 3 4,5 1.3.1
A grant
B revoke
C Both A & B
D None of the above
9. Which command can be used to obtain the table’s records? 1 1 3 4,5 1.3.1
A retrieve
B select
C create
D alter
Give the command to change the default password TIGER
10. 1 1 3 4,5 1.3.1
to LION for the user SCOTT
A alter user identified by lion;
B alter user scott identified by lion;
C alter user scott by lion;
D alter user identified by lion;
What does the following code snippet do?
11 1 1 3 4,5 1.3.1
Delete from students where age=15; Rollback;
A Performs an undo operation on the delete operation
B Delete the rows from the table where age=15
C Deletes the entire table
D None of the above
12 Virtual private database is a function of 1 1 4 3 1.3.1
A Oracle
B Java
C SQL
D DB2
Virtual private database provides authorization at the level
13 1 1 4 3 1.3.1
of
A Rows
B Tuples
C Relations
D All of the above
14 To add or remove server role membership use 1 1 3 4,5 1.3.1
A Alter role
B Alter any login
C Alter server role
D None of the mentioned
Farmer goes to ATM center to withdraw an amount of
15 1 1 4 3 1.3.1
Rs.300/- . Which type of user farmer is?
A Application programmer
B Unsophisticated User
C Sophisticated User
D Specialized User
PART – B
(3 x 5 = 15 Marks)
Instructions: Answer any 3 Questions
16. Describe the various privileges available in the security
data model.
Privilege is a method to permit or deny access
to data or to perform database Operations (Data
Manipulation).
⮚ System Privileges – Privileges granted only
by DBA or users who have been granted
the administration option.
⮚ Object Privileges – Privileges granted to an
ORACLE user by the scheme owner of a
database object or a user who has been granted 5 2 3 4 1.6.1
the GRANT option.
System Privileges
ADMIN, ALTER ANY CACHE GROUP, ALTER
ANY TABLE, CREATE ANY PROCEDURE,
CREATE ANY TABLE
Object privileges:
DELETE, EXECUTE, INSERT, SELECT, UPDATE
17.
Summariz
data
method
which
only
informat
authoriz
can
encoded
a way
reae that
i
Note: Write single line description about each privilege.
5 1 4 3 1.6.1
10 1 3 4 2.2.4
To create a shared database link, use the keyword
SHARED in the CREATE DATABASE LINK
statement:
Syntax:
CREATE SHARED DATABASE LINK dblink_name
[CONNECT TO username IDENTIFIED BY
password]|[CONNECT TO CURRENT_USER]
AUTHENTICATED BY schema_name IDENTIFIED
BY password
[USING 'service_name'];
Example:
CREATE SHARED DATABASE LINK link2sales
CONNECT TO scott IDENTIFIED BY tiger
AUTHENTICATED BY linkuser IDENTIFIED BY
ostrich
USING 'sales';
What is DB link good for?
1. Sharing of data between two databases.
2. For import/export style purposes.
3. You can get direct access to the database of a
different application.
4. For Security and Confidentiality.
II. Linked Server
The linked server is basically the way you defined a
‘connection’ between two servers. i.e. Connecting a
Database-A from Server 1 with Database-B from
Server 2 and doing queries from both databases.
2 CO4 3 3 - - - - - - - - - -
PART - A
(15 x 1 = 15 Marks)
Instructions: Answer all
Q. Mark PI
Questions BL CO PO
No s Code
1. Which of the following is not a privilege in SQL Server? 1 L1 3 1 1.6.1
a) Diskadmin
b) Bulkadmin
c) Serveradmin
d) Clientadmin
2. This password parameter specifies the number of days before a 1 L1 3 1 1.6.1
user can reuse a password.
a) PASSWORD_REUSE_TIME
b) PASSWORD_REUSE_MAX
c) PASSWORD_REUSE_DAYS
d) PASSWORD_REUSE_MIN
3. When creating a DB link, which cannot be the authentication 1 L1 3 1 1.6.1
method?
a) CURRENT USER
b) FIXED USER
c) CONNECT USER
d) DYNAMIC USER
4. Which of the following is not an account status? 1 L1 3 1 1.6.1
a) OPEN
b) CLOSE
c) EXPIRED
d) LOCKED
5. Which statement creates the same role as an external role? 1 L1 3 1 1.6.1
a) CREATE ROLE dw_manager IDENTIFIED BY
warehouse;
b) CREATE ROLE warehouse_user IDENTIFIED
GLOBALLY;
c) CREATE ROLE warehouse_user IDENTIFIED
EXTERNALLY;
PART – B
(3 x 5 = 15 Marks)
Instructions: Answer any 3 Questions
16. Brief about the creation and dropping a role in ORACLE. 5 L3 3 1 1.6.1
o The following statement creates the
role dw_manager:
19. Briefly about the Column level Security with SQL Server. 5 L3 4 1 1.6.1
Column level Security with SQL Server
GO
GO
PART – C
(2 x 10 = 20 Marks)
Instructions: Answer all the Questions
20. a) Explain the architecture of security data model based on 10 L3 3 1 1.6.1
Application roles.
10 L3
3 1 1.6.1
• Characteristics
OR
• Characteristics
✓ Resource parameters
✓ Password parameters
✓ Assign a profile
23. OR
b) Define a Database Link. Discuss the different
ways of creating the Database Links. Explain the
different methods of creating a Database Link.
o It is a connection from one DB to another DB
2 CO4 1 - 3 1 1 1 - - - - - -
PART - A
Instructions: Answer all (15 x 1 = 15 Marks)
Q. PI
Questions Marks BL CO PO
No Code
1. External name for___________authenticated user. 1 1 3 4,5 1.3.1
A Global
B Drop
C Expire
D Private
User which interact with the system using database query
2. 1 1 4 3 1.3.1
language is called as
A Application Programmer
B Sophisticated User
C Specialized User
D Naive User
_________ is the indication of how long a password can be
3. 1 1 3 4,5 1.3.1
used before it expires.
A Password Complexity
B Password storage
C Password Usage
D Password Aging
4. Command that comes under DCL is/are - 1 1 3 4,5 1.3.1
A grant
B revoke
C Both A & B
D None of the above
5. ……….. is level 3 access mode in static mode? 1 1 4 3 1.3.1
A update
B use
C grant
D delete
6. Which command used to give privileges to oracle user? 1 1 3 4,5 1.3.1
A grant
B revoke
C expire
D identify
7. Virtual private database is a function of 1 1 4 3 1.3.1
A Java
B Oracle
C SQL
D DB2
8. What is general syntax to create user in oracle? 1 1 3 4,5 1.3.1
A create user <username> identified by
B create user <user> identified by <password>;
C create user <usdrname> identified by <password>;
D create user <username> <password>;
Row and Column access can be implemented by using the
9. 1 1 4 3 1.3.1
database object.
A Edit
B View
C Delete
D Drag
Which user plays a super role that allows assigned user to
10. 1 1 3 4,5 1.3.1
perform any task within SQL SERVER?
A SYSADMIN
B ADMIN
C SYSSERVER
D SQLSERVER
Which among the following is not included in virtual
11 1 1 4 3 1.3.1
private database?
A Setup Test Environment
B Create an Application Context
C Create Security Policies
D Documentation in administration
12 ………command is used to drop a user who owns objects? 1 1 3 4,5 1.3.1
A CASCADE
B DROP
C GRANT
D DELETE
What does the following code snippet do?
13 1 1 3 4,5 1.3.1
Delete from students where age=15; Rollback;
A Performs an undo operation on the delete operation
B Delete the rows from the table where age=15
C Deletes the entire table
D None of the above
14 Schema definition is written by 1 1 4 3 1.3.1
A Database administrator
B Application programmer
C Sophisticated user
D Naïve user
Business layer level …… layer contains a program that
15 1 1 3 4,5 1.3.1
implements business rules in web application architecture?
A Application layer
B Web application
C Business logic layer
D Service oriented
PART – B
(3 x 5 = 15 Marks)
Instructions: Answer any 3 Questions
16. Explain the process of granting and revoking privileges
in oracle/sql server.
We can GRANT and REVOKE privileges on various
database objects (Table, View) in SQL Server.
Data Control Language is used to control privileges in
Databases. In Data Control Language we have two
commands.
GRANT:- GRANT command is used to provide access
or privileges on the database.
REVOKE:- REVOKE command removes user access
rights or privileges to the database objects. 5 3 3 4,5 1.6.1
You can grant users various privileges to tables. These
permissions can be any combination of SELECT,
INSERT, UPDATE, DELETE, REFERENCES,
ALTER, or ALL.
Example:
GRANT SELECT, INSERT, UPDATE, DELETE ON
employees TO student;
GRANT ALL ON employees TO student;
17.
Summariz
data
method
which
only
informat
authoriz
can
encoded
a way
reae that
i
REVOKE DELETE ON employees FROM student;
19.
Summariz
data
method
which
only
informat
authoriz
can
encoded
a way
reae that
write:
i
DROP ROLE testing;
Explain in detail data encryption.
Data encryption is a method of protecting data by
encoding it in such a way that it can only be decrypted
or accessed by an individual who holds the correct
encryption key. When a person or entity accesses
encrypted data without permission, it appears
scrambled or unreadable.
How does data encryption work?
The data that needs to be encrypted is termed plaintext
or clear text. The plaintext needs to be passed via some
encryption algorithms, which are mathematical
calculations to be done on raw information. There are
multiple encryption algorithms, each of which differs
by application and security index.
5 1 4 3 1.6.1
OR
23. Define the security model. Describe several database
application security model types with a clear diagram.
❖ Security models are useful tools for evaluating
and comparing security policies.
❖ Security models allow us to test security
policies for completeness and consistency.
They describe what mechanism are necessary
to implement security policy.
❖ To eliminate threats, it is necessary to define
proper security policy. Security policies are
governing principles adopted by organizations.
❖ They capture the security requirements of an
organization, specify what security properties
the system must provide and describe steps an
organization must take to achieve security.
Security models are described in terms of the
following elements:
❖ Subjects: Entities that request access to
objects. 10 1 4 4 6.1.1
❖ Objects: Entities for which access request is
being made by subjects.
❖ Access Modes: Type of operation performed
by subject on object (read, write, create etc.).
❖ Policies: Enterprise wide accepted security
rules.
❖ Authorizations: Specification of access modes
for each subject on each object.
❖ Administrative Rights: Who has rights in
system administration and what responsibilities
administrators have.
❖ Axioms: Basic working assumptions.
Access Matrix Model
It represents two main entities
1. Objects
2. Subjects
Columns represent objects and rows represent subjects.
Object can be a tables, views, procedures, database
objects.
Subjects can be a users, roles, privileges, modules.
Authorization cells- Access details on the objects
granted to the subject, access, operation, or commands
2 CO4 3 3 - - - - - - - - - -
PART - A
(15 x 1 = 15 Marks)
Instructions: Answer all
Q. Mark PI
Questions BL CO PO
No s Code
1. ------ software program residing on a computer that is used for 1 L1 3 1 1.6.1
data processing and for interfacing to the business logic and
database server.
a) TEMPORARY TABLESPACE
b) DEFAULT TABLESPACE
c) QUOTA
d) PROFILE
4. ---------------- clause of CREATE USER statement informs 1 L1 3 1 1.6.1
oracle of how much space a user is allowed for a specified
tablespace.
a) TEMPORARY TABLESPACE
b) DEFAULT TABLESPACE
c) QUOTA
d) PROFILE
5. Which of the following does not specify the authentication 1 L1 3 1 1.6.1
type?
a) EXTERNAL - CREATE USER user1 IDENTIFIED
EXTERNALLY;
b) INTERNAL - CREATE
USER user1 IDENTIFIED INTERNALLY;
c) GLOBAL - CREATE USER user2 IDENTIFIED
GLOBALLY;
d) PASSWORD - CREATE USER user3 IDENTIFIED
BY user3;
6. When a user logs on to the DB through the machine where 1 L1 3 1 1.6.1
the DB is located, called as _________
a) Local user
b) Internal user
c) External user
d) Remote user
7. Which of the following is not the level of permission in 1 L1 3 1 1.6.1
SQL server?
a) System or Server level
b) Database level
c) Table (Object) level
d) Row level
8. The access mode abrogate occupies the level 1 L1 1 1 1.6.1
a) 1
b) 2
c) 3
d) 4
9. Which component is not found in Client/Server 1 L1 1 1 1.6.1
architecture?
a) User interface
b) Business Logic
c) Object Access
d) Data Access
10. Which of the software program residing on a computer that 1 L1 1 1 1.6.1
Is used for data processing?
a) Web server layer
b) Database server layer
c) Business logic layer
d) Application server layer
11. This model is flexible in implementing application 1 L1 1 1 1.6.1
security.
a) Application Role based
b) Application Function Based
c) Application Role and Function Based
d) Application Table Based
12. In this model Maintenance of application security does not 1 L1 1 1 1.6.1
require specific DB privileges
a) CTL_INS_USERS
b) CTL_INS_DTIM
c) CTL_REC_USERS
d) CTL_UPD_USERS
PART – B
(3 x 5 = 15 Marks)
Instructions: Answer any 3 Questions
16. List out the best practices for Administrators and Managers. 5 L3 3 1 1.6.1
▪ Follow you company ‘s procedures and
policies to create , remove or modify database users.
• User
• IDENTIFIED clause
• BY Password
• EXTERNALLY clause
• AS 'certificate_DN'
• GLOBALLY Clause
• QUOTA Clause
• ACCOUNT Clause
18. Briefly explain about the Access matrix model and 5 L3 4 1 1.6.1
Access Modes model.
✓ Access Matrix Model
▪ A conceptual model that specifies the
right that each subject
▪ possesses for each object
▪ Subjects in rows and objects in columns
Access Modes Model
✓ This model based on the Take-Grant models
✓ It uses both subject and object
✓ Object is the main security entity
✓ Access mode indicates that the subject can
perform any task or not
✓ There are two modes
▪ Static Modes
▪ Dynamic Modes
PART – C
(2 x 10 = 20 Marks)
Instructions: Answer all the Questions
20. a) Explain the architecture of security data model based on 10 L3 3 1 1.6.1
database roles.
OR
L3
21 b) Elaborate on the different Application types. 10 3 1 1.6.1
• Mainframe applications
• Client / Server Applications
• Web Applications
• Data warehouse applications
• System Privileges
• Object privileges
• SQL Grant
• SQL revoke
• Server privileges
• Database privileges
• Dropping a role
OR
23.. b) Give the importance of password policies. 10 L3 4 2 1.6.1
Explain in detail about the design and
implementation of password policies.
• Guidelines
• NTLM
• Kerberos
SRM Institute of Science and Technology
Faculty of Engineering and Technology SET - A
School of Computing
DEPARTMENT OF COMPUTING TECHNOLOGIES
SRM Nagar, Kattankulathur – 603203, Chengalpattu District, Tamilnadu
Academic Year: 2023 - 2024 (ODD)
2 CO5 2 2 2 - - - - - - - - -
PART - A
(15 x 1 = 15 Marks)
Instructions: Answer all
Q. PI
Questions Marks BL CO PO
No Code
1. Auditing is the responsibility of -------------------------- 1 1 4 4,5 1.3.1
a) Developers
b) DBA
c) Business Managers
d) All of the Above
A document that contains all activities that are being audited
2. ordered in a chronological manner
1 1 4 4,5 1.3.1
a) Auditing
b) Audit objectives
c) Audit log
d) None of the Above
A chronological record of database activities , such as shutdown,
3. start-up, logons, and data structure changes of database objects
1 1 4 4,5 1.3.1
a) Data audit
b) Database auditing
c) Audit report
d) Audit procedure
4. Identify the Components of Auditing Environment 1 1 4 3 1.3.1
a) Objectives & Procedures
b) People & Audited Entries
c) None of the Above
d) All of the Above
The first auditing model is called -------------------because it is
5. easy to understand and develop
1 1 4 3 1.3.1
a) User Friendly
b) Simple
c) Flexibility
d) Effective
The National Security Administration has given a C2 security
6. rating to
1 1 4 3 1.3.1
a) Microsoft SQL Server 2000
b) MY SQL
c) ORACLE 10G
d) MONGO DB
The _______________ triggers will be fired before the INSERT,
7. UPDATE, or DELETE operation
1 1 4 4,5 1.3.1
a) Delete
b) Update
c) Insert
d) All of the Above
8. What is the syntax of DROP TRIGGER statement? 1 1 4 4,5 1.3.1
a) DELETE TRIGGER trigger_name;
b) REMOVE TRIGGER trigger_name;
c) DROP TRIGGER trigger_name;
d) None of the Above
9. PPDM means 1 1 5 4,5 1.3.1
a) Privacy preserving data mining
b) Privacy producing data mining
c) Privacy preserving data modeling
d) Privacy producing data modeling
10. In which method noise is added to data 1 1 5 4,5 1.3.1
a) The randomization method
b) The k-anonymity model and l-diversity
c) Distributed privacy preservation
d) Downgrading Application Effectiveness
The values across different records are swapped in order to
11 perform the privacy-preservation in
1 1 5 4,5 1.3.1
a) Data mapping
b) Data swapping
c) Data swapping and mapping
d) Data ordering
12 K-anonymity techniques uses 1 1 5 3 1.3.1
a) Generalization
b) Suppression
c) Generalization and suppression
d) Randomization
The individual records are spread out across multiple entities,
13 each of which have the same set of attributes are in
1 1 5 3 1.3.1
a) Vertically partitioned
b) Horizontally partitioned
c) Diagonally partitioned
d) Randomly partitioned
In association rule hiding if the entry for a given transaction is
14 modified to a different value then it is called as
1 1 5 4,5 1.3.1
a) Blocking
b) Aborting
c) Distortion
d) Hiding
15 Which one is not suitable fork-anonymity techniques uses in 1 1 5 3 1.3.1
a) Generalization
b) Suppression
c) Generalization and suppression
d) Randomization
PART – B
(3 x 5 = 15 Marks)
Instructions: Answer any 3 Questions
Mar PI
Q. No Questions ks
BL CO PO
Code
16. Describe the need of auditing database? In what are 5 2 4 2 1.6.1
the ways it can be audited?
17.
Summariz
data
method
which
only
informat
authoriz
can
encoded
a way
reae that
database.
i
Explain triggers in oracle? How do you create a 5 2 4 3 1.6.1
trigger using oracle?
Trigger Syntax
CREATE [ OR REPLACE ] TRIGGER
<trigger_name>
[BEFORE | AFTER | INSTEAD OF ]
[INSERT | UPDATE | DELETE......]
ON<name of underlying object>
[FOR EACH ROW]
[WHEN<condition for trigger to get execute> ]
DECLARE <Declaration part>
BEGIN <Execution part>
EXCEPTION <Exception handling part>
END;
1.Healthcare:
Example:
Let's consider a large e-commerce database that
contains information about millions of products,
including their attributes like product ID, name,
category, price, manufacturer, and customer reviews.
This dataset is used for various data mining tasks such
as market basket analysis, recommendation systems,
and customer segmentation.
2. Partition Creation:
Data mining experts create separate datasets or tables
for each category. For instance:
Electronics:
Product ID
Name
Category
Price
Manufacturer
Customer Reviews
Clothing:
Product ID
Name
Category
Price
Manufacturer
Customer Reviews
Home and Garden:
Product ID
Name
Category
Price
Manufacturer
Customer Reviews
Toys:
Product ID
Name
Category
Price
Manufacturer
Customer Reviews
3. Data Mining Analysis:
With the dataset divided into partitions, data mining
tasks can be performed more efficiently. For example,
when running a recommendation system for
electronics, the system only needs to access the
"Electronics" partition, reducing the computational load
and improving query performance. Similarly,
marketing campaigns or customer segmentation can be
applied to each partition independently.
PART – C
(2 x 10 = 20 Marks)
20. Explain in detail about how the database activities
10 2 4 2 6.2.1
are audited using oracle?
✓ ORACLE provides the mechanism for auditing
everything:
▪ From tracking who is creating and
modifying the structure
▪ Who is granting privileges to whom
✓ The activities are divided into two types based
on the type of SQL command statement used :
▪ Activities defined by DDL (Data
Definition Language)
▪ Activities defined by DCL (Data Control
Language)
Auditing DDL Activities
✓ ORACLE uses a SQL-based audit command
✓ The following figure presents the audit syntax
diagram ( ORACLE 10g)
OR
21. Compare and Contrast the difference between 10 2 4 2 2.2.4
oracle server and SQL server 2000 in auditing
database?
Oracle Server and SQL Server 2000 are two popular
relational database management systems (RDBMS),
and both offer auditing capabilities to track and monitor
database activities for security and compliance
purposes. However, there are significant differences
between the two in terms of how they handle database
auditing.
Auditing Model:
Oracle:
Oracle:
Oracle:
2 CO4 1 - 3 1 1 1 - - - - - -
PART - A
(15 x 1 = 15 Marks)
Instructions: Answer all
Q. PI
Questions Marks BL CO PO
No Code
---------------- tool is used for purpose of data auditing for
1. SQL Server only? 1 1 3 4,5 1.3.1
A Apex SQL
B SQL Ninja
C SQL Audit
D Idera
----------- command used to turn off the audit?
2. 1 1 3 4,5 1.3.1
A REVOKE AUDIT
B NO AUDIT
C COMMIT Audit
D DBA_AUDIT_STATEMENT
------------ catalog view is used for SQL Server Extended
3. Events? 1 1 3 4,5 1.3.1
A sys.server_sessions
B sys.server_event_sess
C sys.server_event_session_actions
D All of the mentioned
Auditing activities conducted by the staff members of the
4. organization. 1 1 4 3 1.3.1
A Internal Auditing
B External auditing
C Security audit
D Financial audit
----------- tool provides the user interface for auditing
5. events in SQLServer 2000? 1 1 4 3 1.3.1
A SQL profiler
B SQL Ninja
C SQL Audit
D SQL Idera
__________ , the attacker has a collection of independent
data samples from the same distribution from which the
6. 1 1 4 3 1.3.1
original data was drawn
A Incognito
B l-diversity
C l-closeness
D k-anonymity
In this case, the participants Alice and Bob are curious and
attempt to learn from the information received by them
8. during the protocol, but do not deviate from the protocol 1 1 3 4,5 1.3.1
themselves.
A Malicious
B Semi-Honest Adversaries
C Distributed denial of service
D Man in the middle Attack
In _________ the entry is not modified but is left
incomplete. Thus, unknown entry values are used to
9. 1 1 3 4,5 1.3.1
prevent discovery of association rules.
A Additive perturbation
B Multiplicative perturbation
C Blocking
D Distortion
The ___________ System was one of the earliest practical
10. applications of privacy preserving transformations. 1 1 3 4,5 1.3.1
A Datafly
B Homeland Security Applications
C Video Surveillance
D Watch list Problem
11 What is the k-anonymity method? 1 1 3 4,5 1.3.1
A A method for privacy de-identification.
B A method for measuring privacy.
C A method for privacy preservation.
D None of the above.
12 SQL Profiler tool used. 1 1 4 3 1.3.1
A User interface for auditing
B Modification of attributes
C Change of table name
D Deleting table
Which one of the following team retested every database
13 1 1 4 3 1.3.1
application function and try to find bugs?
A Quality assurance
B Quality control
C Quality testing
D Quality manager
An audit that is conducted by a staff member of the
14 1 1 3 4,5 1.3.1
company being audited.
A External audit
B Company audit
C Internal audit
D Policy audit
In randomization technique, large volume of data analysis
15 1 2 4 3 1.3.1
can be done using
A PCA technique
B CPA technique
C APP technique
D DAA technique
PART – B
(3 x 5 = 15 Marks)
Instructions: Answer any 3 Questions
16. Describe the purpose of the SQL Profiler Tools
period of time
19. What are the two kinds of attacks are possible with
some prior knowledge?
PART – C
(2 x 10 = 20 Marks)
20. Describe the distributed algorithm for k-anonymity?
corresponding individual.
follows:
k respondents.
tables.
OR
21. Explain in detail about advanced auditing model?
l-diversity method:
✓ The k-anonymity is an attractive technique
because of the simplicity of the definition and
the numerous algorithms available to perform
the anonymization.
✓ The k-anonymity is an attractive technique
because of the simplicity of the definition and
the numerous algorithms available to perform
the anonymization.
✓ Nevertheless the technique is susceptible to
many kinds of attacks especially when 10 3 4 4 6.1.1
background knowledge is available to the
attacker
✓ Some kinds of such attacks are as follows:
▪ Homogeneity Attack:
✓ In this attack, all the values for a
sensitive attribute within a group
of k records are the same.
Therefore, even though the data
is k-anonymized, the value of the
sensitive attribute for that group
of k records can be predicted
exactly.
▪ Background Knowledge Attack:
✓ In this attack, the adversary can
use an association between one
or more quasi-identifier
attributes with the sensitive
attribute in order to narrow down
possible values of the sensitive
field further
✓ While k-anonymity is effective in preventing
identification of a record, it may not always be
effective in preventing inference of the sensitive
values of the attributes of that record.
✓ Therefore, the technique of l-diversity was
proposed which not only maintains the
minimum group size of k, but also focuses on
maintaining the diversity of the sensitive
attributes.
✓ Therefore, the l-diversity model for privacy is
defined as follows:
▪ Let a q∗-block be a set of tuples such
that its non-sensitive values generalize
to q∗.
▪ A q∗-block is l-diverse
✓ if it contains l “well
represented” values for the
sensitive attribute S.
✓ A table is l-diverse, if every q∗-
block in it is l-diverse.
✓ when there are multiple sensitive
attributes, then the l-diversity
problem becomes especially
challenging because of the curse
of dimensionality.
t-closeness model:
• The t-closeness model is a further enhancement
on the concept of l-diversity.
• One characteristic of the l-diversity model is
that it treats all values of a given attribute in a
similar way irrespective of its distribution in the
data.
• A t-closeness model was proposed which uses
the property that the distance between the
distribution of the sensitive attribute within an
anonymized group should not be different from
the global distribution by more than a threshold
t.
OR
23. Explain different applications of privacy-preserving
data mining methods?
10 3 4 5 1.7.1
✓ Medical Databases: The Scrub and
Datafly Systems
✓ Bioterrorism Applications
✓ Homeland Security Applications
✓ Genomic Privacy
Medical Databases: The Scrub and Datafly Systems
Scrub :
✓ The scrub system was designed for de-
identification of clinical notes and letters which
typically occurs in the form of textual data.
✓ Clinical notes and letters are typically in the
form of text which contain references to
patients, family members, addresses, phone
numbers or providers.
✓ Traditional techniques simply use a global
search and replace procedure in order to provide
privacy.
✓ However clinical notes often contain cryptic
references in the form of abbreviations which
may only be understood either by other
providers or members of the same institution.
✓ Therefore traditional methods can identify no
more than 30-60% of the identifying
information in the data
✓ The Scrub System uses local knowledge sources
which compete with one another based on the
certainty of their findings.
✓ Such a system is able to remove more than 99%
of the identifying information from the data.
Datafly Systems:
✓ The Datafly System was one of the earliest
practical applications of privacy-preserving
transformations.
✓ This system was designed to prevent
identification of the subjects of medical records
which may be stored in multidimensional
format.
✓ The multi-dimensional information may include
directly identifying information such as the
social security number, or indirectly identifying
information such as age, sex or zip-code.
✓ The system was designed in response to the
concern that the process of removing only
directly identifying attributes such as social
security numbers was not sufficient to guarantee
privacy.
Bioterrorism Applications
✓ Often a biological agent such as anthrax
produces symptoms which are similar to other
common respiratory diseases such as the cough,
cold and the flu.
✓ In the absence of prior knowledge of such an
attack, health care providers may diagnose a
patient affected by an anthrax attack of have
symptoms from one of the more common
respiratory diseases.
✓ In order to identify such attacks it is necessary
to track incidences of these common diseases as
well.
✓ Therefore, the corresponding data would need
to be reported to public health agencies.
However, the common respiratory diseases are
not reportable diseases by law.
Homeland Security Applications
✓ A number of applications for homeland
security are inherently intrusive because
of the very nature of surveillance.
✓ Some examples of such applications are
as follows:
✓ Credential Validation
Problem:
✓ Trying to match the
subject of the credential
to the person presenting
the credential.
✓ For example, the theft of
social security numbers
presents a serious threat
to homeland security.
✓ Identity Theft:
✓ A related technology is to
use a more active
approach to avoid
identity theft.
✓ The identity angel system
, crawls through
cyberspace, and
determines people who
are at risk from identity
theft.
✓ This information can be
used to notify appropriate
parties.
Genomic Privacy
• Recent years have seen tremendous advances in
the science of DNA sequencing and forensic
analysis with the use of DNA.
• As result, the databases of collected DNA are
growing very fast in the both the medical and
law enforcement communities.
• DNA data is considered extremely sensitive,
since it contains almost uniquely identifying
information about an individual.
• As in the case of multi-dimensional data, simple
removal of directly identifying data such as
social security number is not sufficient to
prevent re-identification.
• It has been shown that a software called
CleanGene can determine the identifiability of
DNA entries independent of any other
demographic or other identifiable information.
• The software relies on publicly available
medical data and knowledge of particular
diseases in order to assign identifications to
DNA entries.
• Another method for compromising the privacy
of genomic data is that of trail re-identification,
in which the uniqueness of patient visit patterns
is exploited in order to make identifications.
SRM Institute of Science and Technology
Faculty of Engineering and Technology SET - C
School of Computing
DEPARTMENT OF COMPUTING TECHNOLOGIES
SRM Nagar, Kattankulathur – 603203, Chengalpattu District, Tamilnadu
Academic Year: 2023 - 2024 (ODD)
2 CO5 2 2 2 - - - - - - - - -
PART - A
(15 x 1 = 15 Marks)
Instructions: Answer all
Q. PI
Questions Marks BL CO PO
No Code
1. Administration activities encompasses of 1 1 4 4,5 1.3.1
a) SQL statements issued against application tables.
b) Commands issued by the database administrators
c) Commands issued by the operators for maintenance
d) None of the Above
2. AFTER LOGON and BEFORE LOGON commands included in 1 1 4 4,5 1.3.1
a) DDL statements
b) DCL statements
c) Database events
d) SQL statements audit trail
Which one of the following tells Oracle to record audit data
3. every time the audited statement is issued
1 1 4 4,5 1.3.1
a) By Session
b) By Access
c) Whenever Successful
d) Whenever Not Successful
Selecting the _________ option can allow unaudited activity
4. which could violate your security policies
1 1 4 3 1.3.1
a) Fail
b) Shut down
c) Continue
d) Break
Grant ________ permission on the stored procedures to database
5. roles for implementing call level security
1 1 4 3 1.3.1
a) Execute
b) Exec
c) Read
d) Write
6. Trigger is special type of __________ procedure 1 1 4 3 1.3.1
a) Stored
b) Function
c) View
d) Table
Selecting the _________ option can allow unaudited activity
7. which could violate your security policies
1 1 4 4,5 1.3.1
a) Fail
b) Shut down
c) Continue
d) Break
8. Triggers can be enabled or disabled with the ________statement 1 1 4 4,5 1.3.1
a) Alter Table Statement
b) Drop Table Statement
c) Delete Table Statement
d) Create Table Statement
In which of the Privacy preserving data mining method noise is
9. added to data
1 1 5 4,5 1.3.1
a) The randomization method
b) The k-anonymity model and l-diversity
c) Distributed privacy preservation
d) Downgrading Application Effectiveness
10. In which method noise is added to data 1 1 5 4,5 1.3.1
a) The randomization method
b) The k-anonymity model and l-diversity
c) Distributed privacy preservation
d) Downgrading Application Effectiveness
In which model we reduce the granularity of data representation with
11 the use of techniques such as generalization and suppression
1 1 5 4,5 1.3.1
a) The randomization method
b) The k-anonymity model and l-diversity
c) Distributed privacy preservation
d) Downgrading Application Effectiveness
The values across different records are swapped in order to
12 perform the privacy-preservation in
1 1 5 3 1.3.1
a) Data mapping
b) Data swapping
c) Data swapping and mapping
d) Data ordering
13 The t-closeness Model is the enhancement of 1 1 5 3 1.3.1
a) l-diversity model
b) k-anonymity
c) All of the Above
d) None of the Above
14 Which one is not suitable for k-anonymity techniques uses in 1 1 5 4,5 1.3.1
a) Generalization
b) Suppression
c) Generalization And Suppression
d) Randomization
15 Which one is not suitable fork-anonymity techniques uses in 1 1 5 3 1.3.1
a) Generalization
b) Suppression
c) Generalization and suppression
d) Randomization
PART – B
(3 x 5 = 15 Marks)
Instructions: Answer any 3 Questions
Mar PI
Q. No Questions ks
BL CO PO
Code
16. Summarize the advantages and Disadvantages of 5 2 4 2 1.6.1
Auditing?
Advantages of Auditing
PART – C
(2 x 10 = 20 Marks)
20. Explain the Auditing objectives and Classification in 10 2 4 2 6.1.1
detail?
Audit Classifications
Every industry and business sector uses
different classifications of audits.
Definition of each classification can differ from
business to business.
Will discuss most generic definition of audit
classifications.
Internal Audit
An internal audit is an audit that is conducted by
a staff member of the company being audited
The purpose and intention of an internal audit is
to :
Verify that all auditing objectives are
met by conducting a well-planned and
scheduled audit
Investigate a situation that was promoted
by an internal event or incident. This
audit is random , not planned or
scheduled.
External Audit
An external audit is conducted by a party
outside the company that is being audited.
The purpose and intention of an External audit
is to :
Investigate the financial or operational
state of the company . This audit is
initiated at will by the government or
promoted by suspicious activities or
accusations.
The person conducting this audit is
usually employed and appointed by the
government.
Verify that all objectives are met. This
audit is typically planned and scheduled.
Ensure objectivity and accuracy.
This audit is typically performed to certify that the
company is complying with standards and regulations
Automatic Audit
An automatic audit is promoted and
performed automatically.
Automatic audits are mainly for systems
and DB systems.
Some systems that employ this type of
audit to generate reports and logs.
Manual Audit
Completely performed by humans
The team uses various methods to
collect audit data, including interviews,
document reviews and observation.
The auditors may even perform the
operational task of the audited entity.
Hybrid Audit
Combination of Automatic and Manual Audits
OR
21. Explain in detail about how the database activities 10 2 4 2 6.1.1
are audited using SQL Server 2000?
SQL Server 2000 is an older version of Microsoft's
relational database management system. While it's no
longer officially supported, understanding how
database activities can be audited in this version can
provide some historical context for auditing in more
recent SQL Server versions.
SQL Profiler:
SQL Server 2000 includes SQL Profiler, a tool that
allows you to capture and analyze SQL Server events,
including SQL statements executed, login attempts,
errors, and more. To set up auditing using SQL
Profiler, follow these steps:
Triggers:
SQL Server 2000 supports database triggers, which are
programmable actions that automatically execute when
specific events occur in the database. You can use
triggers to audit changes to data or specific actions
performed on database objects. Common triggers
include:
B. l-diversity model
2 CO4 1 - 3 1 1 1 - - - - - -
PART - A
(15 x 1 = 15 Marks)
Instructions: Answer all
Q. PI
Questions Marks BL CO PO
No Code
Expected to provide the resources needed and select staff
1. 1 1 3 4,5 1.3.1
members to accompany the auditors
A auditor
B client
C Internal auditor
D auditee
The values across different records are swapped in order to
2. 1 1 3 4,5 1.3.1
perform the privacy-preservation is _____________ .
A Data Encryption
B Data Swapping
C Data Hiding
D Data masking
The document that contains all activities that are being
3. 1 1 3 4,5 1.3.1
audited ------- ordered in a chronological manner.
A Audit log
B Audit Profile
C Audit File
D Audit Document
Selecting the _________ option can allow unaudited
4. 1 1 4 3 1.3.1
activity which could violate your security policies.
A Fail
B Shut Down
C Continue
D Break
5. An audit which is compulsory by the law is __________. 1 1 4 3 1.3.1
A Government Audit
B Internal Audit
C Cost Audit
D Statutory Audit
__________ , the attacker has a collection of independent
6. 1 1 4 3 1.3.1
data samples from the same distribution from which the
original data was drawn
A Known Sample Attack
B Packet sniffer
C Distributed denial of service
D Man in the middle Attack
Kind of partitioning is used for the data sets across multiple
7. 1 1 3 4,5 1.3.1
entities which same set of attributes?
A Horizontal
B Vertical
C Hash
D Key
A method based on chance alone by which study
8. participants are assigned to a treatment group is 1 1 3 4,5 1.3.1
__________________ .
A k-anonymity
B l-diversity
C t-closeness
D Randomization
The _________ model was designed to handle some
9. 1 1 3 4,5 1.3.1
weaknesses in the k-anonymity model
A k-anonymity
B l-diversity
C incognito
D Data Swapping
The Oracle _______ Log is another method of
10. 1 1 3 4,5 1.3.1
auditing database activities.
A ALERT
B REVOKE
C COMMIT
D CHECK
Bioterrorism-application, the data analyzed for privacy-
11 1 1 3 4,5 1.3.1
preserving data mining purposes is
A medical data
B Statistical data
C Spatio temporal data
D Timestamped data
The Method for compromising the privacy of genomic
12 1 1 4 3 1.3.1
data
A trail re-identification
B Prediction
C Masking
D Decoding
Which one of the following team retested every database
13 1 1 4 3 1.3.1
application function and try to find bugs?
A Quality assurance
B Quality control
C Quality testing
D Quality manager
In _________ the entry is not modified, but is left
14 incomplete. Thus, unknown entry values are used to 1 1 3 4,5 1.3.1
prevent discovery of association rules.
A Additive perturbation
B Multiplicative perturbation
C Blocking
D Distortion
---------------- function returns Boolean value in
15 1 2 4 3 1.3.1
PKG_APP_AUDIT?
A AUDIT_CHECK
B AUDIT_REVOKE
C AUDIT_COMMIT
D AUDIT_ALERT
PART – B
(3 x 5 = 15 Marks)
Instructions: Answer any 3 Questions
Describe the following terms in few lines
Auditing
Audit log
Audit objectives
Audit trail
External auditing
PART – C
(2 x 10 = 20 Marks)
20. Explain auditing project case study for payroll.
Case : Taking Care of Payroll
Acme Payroll Systems is a small payroll
services company that has been in business for
two years and has had only one major customer
Suddenly, it lands a contract with another large
corporation
If the company hired you as Database
consultant to design and implement a virtual
private database for the existing payroll
application.
The main objective of the virtual private
database feature is allow each client to
administer his own payroll data without
violating the privacy of other clients.
10 1 3 5 6.1.1
The given figure represents the payroll application
model for case
OR
21. Explain auditing process? Differences in QA , Auditing
and Performance Monitoring processes? Illustrates the
auditing process flow with the neat diagram?
10 1 3 4 2.2.4
Database applications widely used by major
corporate companies, mostly large financial and
online trading companies.
The Quality Assurance (QA) team retested
every database application function and try to
find bugs.
This type of auditing resembles QA or even
performance monitoring
The purpose of QA process in software
engineering to make sure that the system is bug
free and that the system is functioning
according to its specification.
The auditing process ensures that the system is
working and complies with the policies,
standards, regulations or laws set forth by
organization, industry or government.
Another way to distinguish between QA and
Auditing Process is by examining the timing of
each
QA – during development phase, before the
implementation of the system.
Auditing Process – After the system is
implemented and in production.
Auditing is also not the same as performance
monitoring
Auditing objectives are totally different
Performance Monitoring is to observe the
degradation in performance
Auditing validates compliance to policy not
performance