Which of the following does not address Database Management Systems (DBMS) Security?
Click on the arrows to vote for the correct answer
A. B. C. D.C.
Padded cells complement Intrusion Detection Systems (IDSs) and are not related to DBMS security.
Padded cells are simulated environments to which IDSs seamlessly transfer detected attackers and are designed to convince an attacker that the attack is going according to the plan.
Cell suppression is a technique used against inference attacks by not revealing information in the case where a statistical query produces a very small result set.
Perturbation also addresses inference attacks but involves making minor modifications to the results to a query.
Partitioning involves splitting a database into two or more physical or logical parts; especially relevant for multilevel secure databases.
Source: LaROSA, Jeanette (domain leader), Application and System Development Security CISSP Open Study Guide, version 3.0, January 2002.
The answer to the question is A. Perturbation does not address Database Management Systems (DBMS) Security.
Explanation:
Perturbation: It is a technique that involves adding random noise to the data to mask sensitive information. Perturbation is commonly used in data mining and statistical analysis to protect the privacy of individuals whose data is being analyzed. However, perturbation is not a technique used to address DBMS security.
Cell Suppression: It is a technique used to prevent the disclosure of sensitive data in tables. It involves removing or suppressing cells containing sensitive data from the output while maintaining the integrity of the remaining data. This technique is used to address DBMS security.
Padded Cells: This technique is used to add dummy data to a database to protect sensitive data from being inferred. It involves adding fake data to the database to make it difficult for attackers to determine which data is real and which is not. Padded cells are used to address DBMS security.
Partitioning: It is a technique that involves dividing a large table into smaller, more manageable tables. Partitioning is used to improve performance, manageability, and availability of data. However, partitioning is also used to address DBMS security by separating sensitive data from less sensitive data, making it easier to apply different security policies to different partitions.
In conclusion, Perturbation does not address Database Management Systems (DBMS) Security, while cell suppression, padded cells, and partitioning are techniques that can be used to address DBMS security.