Tuesday

ADVANCED DATABASE SECURITY

 ADVANCED DATABASE SECURITY

(MTCSPE3001A)

Assignment Questions

UNIT I: Database Basics & SQL

Bloom Level 3 – Apply

1. Apply the concept of data abstraction by giving real-life examples of each level.

2. Write a SQL query to display names and salaries of employees earning more than ₹50,000.

3. Draw an ER diagram for a library management system.

4. Demonstrate the process of converting an ER model into a relational schema.

5. Formulate a SQL query to fetch customer details who have placed orders in the last 30 days.

Bloom Level 4 – Analyze

6. Analyze the differences between a schema and an instance with suitable examples.

7. Differentiate between logical and physical data independence with examples.

8. Compare ER model and Relational model in terms of data representation and usage.

9. Given a SQL query, identify and explain its components (SELECT, FROM, WHERE).

10. Analyze a poorly structured SQL query and suggest improvements.

Bloom Level 5 – Evaluate

11. Evaluate the effectiveness of SQL in querying large databases.

12. Critically assess the limitations of the ER model in representing complex relationships.

13. Justify the use of relational databases over file systems with examples.

14. Assess how data abstraction improves database performance and usability.

15. Evaluate SQL’s role in enforcing data integrity.

UNIT II: Introduction to Database Security

Bloom Level 3 – Apply

1. Apply access control concepts to a hospital database system.

2. Demonstrate how cryptographic techniques secure data in transit and at rest.

3. Illustrate the structure of a statistical database and its use in government data.

4. Apply SQL GRANT and REVOKE commands to manage access.

5. Create an access control list (ACL) for a university student portal.

Bloom Level 4 – Analyze

6. Analyze various types of security threats databases face.

7. Compare discretionary access control and mandatory access control with examples.

8. Analyze how cryptographic data protection differs from access control.

9. Examine how SQL handles security features like roles and permissions.

10. Compare the advantages and limitations of statistical databases.

Bloom Level 5 – Evaluate

11. Evaluate the role of databases in supporting organizational security policies.

12. Judge the effectiveness of cryptographic data protection in preventing data breaches.

13. Evaluate the importance of SQL security features in multi-user systems.

14. Critically examine the trade-offs between performance and security in database systems.

15. Justify the need for security mechanisms even in isolated database systems.

UNIT III: Security Methods and Techniques

Bloom Level 3 – Apply

1. Demonstrate how to use SQL views to limit data exposure.

2. Apply data masking to protect sensitive information in a database.

3. Write SQL triggers to track unauthorized modifications.

4. Illustrate row-level security using example SQL commands.

5. Use escaping techniques to prevent SQL injection in user input.

Bloom Level 4 – Analyze

6. Analyze the role of triggers in enhancing security.

7. Compare column-level and row-level access control with examples.

8. Examine the effectiveness of change tracking for detecting unauthorized access.

9. Distinguish between symmetric and asymmetric encryption in databases.

10. Analyze how views can support security while ensuring data usability.

Bloom Level 5 – Evaluate

11. Evaluate different access control models in the context of database security.

12. Assess the use of data masking in protecting personally identifiable information (PII).

13. Judge the impact of encryption on database performance and security.

14. Justify the need for query escaping in web applications.

15. Evaluate change tracking tools as part of a database audit mechanism.

UNIT IV: Data Integrity & Backup

Bloom Level 3 – Apply

1. Apply referential integrity rules to a banking database.

2. Demonstrate how to perform a full database backup using SQL tools.

3. Illustrate how domain integrity constraints ensure data validity.

4. Use SQL commands to enforce table-level constraints.

5. Show how to configure monitoring tools to track user activity.

Bloom Level 4 – Analyze

6. Analyze how different types of integrity constraints ensure data consistency.

7. Compare integrity constraints and triggers in terms of their roles.

8. Examine how backup strategies differ for small and large databases.

9. Analyze the importance of transaction logs in backup and recovery.

10. Distinguish between logical and physical database backups.

Bloom Level 5 – Evaluate

11. Evaluate the effectiveness of built-in database integrity features.

12. Judge the role of regular backups in disaster recovery planning.

13. Assess the reliability of database monitoring tools in detecting suspicious activity.

14. Critically evaluate whether constraints limit or enhance database performance.

15. Justify the use of foreign keys in maintaining relational integrity.

UNIT V: Security Analysis Tools

Bloom Level 3 – Apply

1. Apply penetration testing methods on a test database.

2. Demonstrate how a SQL injection attack works with a basic example.

3. Use a database security scanner to identify vulnerabilities.

4. Illustrate how to write a simple script to detect weak passwords in a database.

5. Apply input validation techniques to prevent SQL injection.

Bloom Level 4 – Analyze

6. Analyze the causes and consequences of SQL injection attacks.

7. Compare manual vs automated database security analysis.

8. Examine the working of a popular open-source database security scanner.

9. Distinguish between false positives and true threats in vulnerability reports.

10. Analyze how security misconfigurations contribute to database breaches.

Bloom Level 5 – Evaluate

11. Evaluate different tools used for database security analysis.

12. Judge the adequacy of SQL injection prevention techniques.

13. Critically assess the benefits and limitations of writing custom security tools.

14. Evaluate how regular audits can improve database security posture.

15. Justify the need for continuous monitoring even after initial hardening.

Share this

Artikel Terkait

0 Comment to "ADVANCED DATABASE SECURITY"

Post a Comment

Note: Only a member of this blog may post a comment.