MERU UNIVERSITY OF SCIENCE AND TECHNOLOGY
P.O. Box 972-60200 – Meru-Kenya.
Tel: +254(0) 799 529 958, +254(0) 799 529 959, + 254 (0) 712 524 293,
Website: info@must.ac.ke Email: info@must.ac.ke
University Examinations 2017/2018
SECOND YEAR SECOND SEMESTER EXAMINATION FOR THE DEGREE OF
BACHELOR OF COMPUTER SECURITY AND FORENSICS
CCF 3251: DATABASE SECURITY
DATE: SEPTEMBER 2018 TIME: 2 HOURS
INSTRUCTIONS: Answer question one and any other two questions
QUESTION ONE (30 MARKS)
a) Briefly describe the following concepts as applied in database security (6 marks)
i. Subject
ii. Object
iii. Access right (privileges)
b) Differentiate between account level and relation level privileges that may be
configured on a database to protect its confidentiality (4 marks)
c) While giving examples give key differences discretionary access control and
mandatory access control (4 marks)
d) Data is a valuable resource that must be strictly protected as with any corporate
resource. Describe two threats to data stored in a database and give one mechanisms
employed by database management systems to protect data from each of the threats
identified (4 marks)
e) Write an SQL statement that gives user U1 the select privileges on branch table and
allows U1 to grant this privilege to others (4 marks)
Meru University of Science & Technology is ISO 9001:2015 Certified
Foundation of Innovations Page 1
f) Differentiate between
i. Read and insert authorization (4 marks)
ii. Update and delete authorization (4 marks)
QUESTION TWO (20MARKS)
a) SQL injection is a common attack that target database on web-based applications
i. Briefly describe a typical SQL injection attack (6 marks)
ii. Give two ways of preventing SQL injection attacks (4 marks)
b) Access control ensures that all direct accesses to object are authorized and protects
against accidental and malicious threats by regulating the read, write and execution of
data and programs.
i. Briefly describe two access control components of database security
(4 marks)
ii. Compare authorization in application layer vs. Database layer (6 marks)
QUESTION THREE (20 MARKS)
a) Data stored in a database or in transit to or from a database has several
levels/dimension of protection. Briefly describe the control measures that can be
applied on the following levels of database security (6 marks)
i. Physical level
ii. Operating system
iii. Database
b) In relation to bell-lapudula model, describe the following properties (4 marks)
c) Write an SQL statement to demonstrate the following access control commands
i. Revoke (5 marks)
ii. Grant (5 marks)
QUESTION FOUR (20 MARKS)
a) While describing the following vulnerabilities discuss the effect on a database and at
least one mitigation strategy (8 marks)
i. Privilege abuse
ii. The SQL injection
Meru University of Science & Technology is ISO 9001:2015 Certified
Foundation of Innovations Page 2
iii. Misconfigured database
iv. Programmers
b) Briefly describe how man in the middle attacks/impersonation can be prevented in a
database (4 marks)
c) Differentiate between application level and database level audit trail (4 marks)
d) In relation to mandatory access control, give the four possible security labels in their
order of dorminace from the highest to the lowest (4 marks)
QUESTION FIVE (20 MARKS)
a) In relation to access control, illustrate the four main levels of granularity of object
protection (8 marks)
b) Describe four powerful capabilities of super user accounts recommended for database
administrators (4 marks)
c) Describe the RAID mechanism and how it improves reliability and time performance
(4 marks)
d) Differentiate between software RAID and hardware RAID (4 marks)
Meru University of Science & Technology is ISO 9001:2015 Certified
Foundation of Innovations Page 3