Database Security
Database Security
IV SEMESTER
Regulation – 2019
Prepared by
PART – A
BT
Q.No Questions Level Competence
1. Express the term hardening of database BTL2 Understanding
2. Analyze the use of hardening is required. BTL4 Analyzing
3. Define hardening in SQL server BTL1 Remembering
4. List the types of data auditing tool. BTL1 Remembering
5. Discuss about patching in Oracle database BTL2 Understanding
6. Interpret why do database hardening BTL2 Understanding
7. Differentiate between hardening in SQL server and Oracle database BTL4 Analyzing
8. Give the detail How do I know if my database is patched? BTL2 Understanding
4. BTL1 Remembering
i) Explain the Hardening a MySQL environment. (6)
5. ii)Describe Anatomy of buffer overflow vulnerabilities. (7) BTL2 Understanding
(i)Illustrate login names, which may exist as part of installations of other Sybase
7. servers. (6) BTL3 Applying
(ii)Explain the issues found by the SQL server. (7)
8. Describe How to Contact Oracle with Security Vulnerabilities. (13) BTL2 Understanding
(i) Formulate Memory layout for an operating system process. (5)
9. (ii)Outline about the Oracle in detail. (8) BTL6 Creating
13. Explain the basic key concept of database security. BTL4 Analyzing
(13)
Discuss A good starting point for MySQL hardening. (13)
14. BTL2 Understanding
PART C
1. How to create a database in SQL Server? (15) BTL4 Analyzing
4. Generalize your view about 9 Best Practices for Systems Hardening. BTL6 Creating
(15)
UNIT II – DATABASE SECURITY AND
DEFENSE STRATEGY
Defense–in–depth, The security software landscape-Perimeter security- firewalls- intrusion detection- and
intrusion prevention- Securing the core- Application security-Public key infrastructure (PKI)- Vulnerability
management and Patch management
PART – A
BT
Q.No Questions Competence
Level
1 Show the characteristics of defense in depth concept. BTL3 Applying
2 Explain practical aspects of DiD defense-in-depth BTL5 Evaluating
3 Analyze an defense in depth is important?. BTL4 Analyzing
4 Examine the security landscape. BTL3 Applying
5 Define cybercrime BTL1 Remembering
6 State Cyber Security a threat. BTL1 Remembering
7 Discuss the three elements of cybersecurity BTL2 Understanding
8 Illustrate the 3 types of firewalls BTL3 Applying
9 Classify the 3 key layers of the defense in depth security strategy BTL4 Analyzing
Give definition for cyber security landscape
10 BTL2 Understanding
3 Describe in detail about the security software landscape . (13) BTL1 Remembering
i) Generalize on the Vulnerability assessment and patch management (7)
4 BTL6 Creating
ii) How do Security management perform in the database?. (6)
i) Examine on Perimeter security, firewalls. (7)
5
ii)Identify and explain Intrusion detection systems Intrusion prevention BTL1 Remembering
systems . (6)
1. BTL4 Analyzing
Analyze the Firewall Authentication Types
2. Evaluate the components of Public key infrastuctures..
BTL5 Evaluating
Summarize the various Classification of Intrusion Detection System BTL5 Evaluating
3.
Generalize about steps involved in patch management in details
4. BTL6 Creating
PART – B
1 i)Discuss the criteria don’t expose your database to the public Internet.(6) BTL2 Understanding
ii)Explain in detail about the Three-tier application architecture using a DMZ.(7)
PART C
i. Explain the following in detail Tool tracking system.
(8)
1. BTL4 Analyzing
ii. Analyze the main features of network access map.
(7)
Write an types network security attacks in detail. .(15)
2. BTL5 Evaluating
(i) Explain in detail notes on type of hackers. (8)
3. BTL5 Evaluating
(ii) Discuss in detail notes on port scanning attack. (7)
Write a detail notes on C IF S i n d e t a i l . (15)
4. BTL6 Creating
UNIT IV – AUTHENTICATION AND PASSWORD
SECURITY
Choose an appropriate authentication option-Understand who gets system administration privileges- Choose strong
passwords- Implement account lockout after failed login attempts- Create and enforce password profiles-Use passwords
for all database components-and Understand and secure authentication back doors.
PART – A
BT
Q.No Questions Competence
Level
1. How to you choose a strong password? BTL2 Understanding
2. Illustrate the the 3 types of authentication. BTL3 Applying
3. What is the most commonly used form of authentication?? BTL1 Remembering
4. Analyze system administration BTL4 Analyzing
5. Define backdoor security. BTL1 Remembering
6. Discuss the duties and responsibilities of system administrator BTL1 Remembering
7. How many good character for creating of the password? BTL2 Understanding
8. Define the best practice for account lockout duration. BTL1 Remembering
9. Differentiate types of authentication. BTL2 Understanding
10. Show the some examples of strong passwords BTL3 Applying
11. Compare the authentication method BTL5 Evaluating
12. What the 4 types of administrators? BTL1 Remembering
13. Write the advantages of system administrator BTL6 Creating
14. Discriminate How do you choose a strong password? BTL5 Evaluating
(6)
i) Explain in detail about the Implement account lockout after failed login
8 attempts (7)
BTL5 Evaluating
ii)Explain in detail denial-of-service attack. (6)
9 Analyze the Create and enforce password profiles . (13) BTL4 Analyzing
Describe in detail about Use passwords for all database components
0 BTL1 Remembering
(13)
i) Explain the Hijacking the Oracle listener. (7)
11 BTL4 Analyzing
ii) What is listener password? How to set the listener password? (6)
i) Describe the detail notes of secure authentication back doors. (6)
12 ii) Discuss the Conceptual steps in Kerberos distributed authentication. (7) BTL1 Remembering
i) List the denial rule in database firewall to shut down connections based on
13 failed logins.. (3) BTL3 Applying
ii) Illustrate in detail about . (10)
i) Discuss the Report showing failed login information.. (6)
14 BTL2 Understanding
ii) Discuss the Using SQLdict to run a dictionary attack on the sa account in
SQL Server. (7)
PART C
(i) Write about the purpose of administration privileges. (8)
(ii) What are the remedies for the misuse of password profiles (7)
1 BTL4 Analyzing
10. State the importance of encrypted password is used in Oracle's command BTL6 Evaluating
11. Why layering your application is important? BTL2 Understanding
12. List the solution for injection attacks BTL1 Remembering
13. How SQL injection attacks work? BTL6 Evaluating
14. Mention any two features of obfuscation? BTL3 Applying
15. List the example of application integration BTL3 Applying
16. Explain integrating packaged applications? BTL4 Analyzing
18. What is the difference between application user model and the database BTL1 Remembering
user model
19. List the example of obfuscation. BTL3 Applying
20. Summarize the strongly typed languages suffer from buffer overflow. BTL5 Creating
PART-B
1 Explain the The application includes the schema. (13) BTL5 Creating
2 Discuss the Knowing and controlling how database logins are used (13) BTL2 Understanding
3 Illustrate some a firewall between applications and the database in detail. BTL3 Applying
(13)
4 Describe about the Obfuscate application code (13) BTL2 Understanding
i) What are the Source code and psuedo-code (3)
5 ii) Explain Precompilation and obfuscation. (10)
BTL1 Remembering
6 Explain in detail Secure the database from SQL injection attacks. (13) BTL3 Applying
Demonstrate the working of SQL injection attacks(13)
7 BTL6 Analyzing
Generalize the some good SQL injection guidelines for application developers
8 BTL4 Creating
(13)
9 Explain in detail about Injecting long strings into procedures with buffer overflow BTL1 Remembering
vulnerabilities (13)
10 Discuss the Oracle security alerts for Oracle Applications. (13) BTL2 Understanding
11 Summarize Patch and monitor with suitable example (13) BTL6 Analyzing
12 Analyze Work toward alignment between the application user model and BTL4 Analyzing
the database user model.
13 Compare and contrast the Oracle security alerts for Oracle Applications and Oracle BTL4 Creating
ports for Oracle Applications servers. (13)
14 Explain in detail about The key elements in protecting yourself against SQL BTL1 Remembering
injection attack. (13)
PART C
Discuss the various SQL injection attacks. (15) BTL6 Creating
1.
2. Describe user management system database design (15) BTL5 Evaluating
3. Discuss the Don’t consider eliminating the application server layer. (15) BTL4 Creating
4. Evaluate user roles and permissions database design. (15) BTL6 Evaluating