Database Information Security: Hiding Information Techniques

Hiding Information Techniques

Prev Question Next Question

Question

Which of the following is used in database information security to hide information?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

B.

Polyinstantiation enables a relation to contain multiple tuples with the same primary keys with each instance distinguished by a security level.

When this information is inserted into a database, lower-level subjects need to be restricted from this information.

Instead of just restricting access, another set of data is created to fool the lower-level subjects into thinking that the information actually means something else.

Source: HARRIS, Shon, All-In-One CISSP Certification Exam Guide, McGraw-Hill/Osborne, 2002, chapter 11: Application and System Development (page 727).

The correct answer is B. Polyinstantiation.

Polyinstantiation is a technique used in database information security to hide information. It is a security feature that helps protect sensitive information by creating multiple instances of an object with varying levels of classification or access permissions. This allows different users to see different versions of the same object, depending on their security clearance.

For example, in a military database, the same object (a document, for instance) may have different levels of classification (top secret, secret, confidential, unclassified). A user with top-secret clearance would be able to see the entire document, while a user with a lower level of clearance would only see a version of the document with the classified information removed.

Polyinstantiation helps prevent unauthorized access to sensitive information by ensuring that users only see the information they are authorized to access. It is an important technique for maintaining the security and integrity of databases containing sensitive information.

Inheritance, Polymorphism, and Delegation are all concepts in object-oriented programming and are not directly related to database information security. Inheritance refers to the ability of one class to inherit properties and methods from another class. Polymorphism refers to the ability of objects of different classes to be used interchangeably. Delegation refers to the ability of an object to delegate tasks to other objects.