Syllabus
Schedule
Reading
Discussion
Project
Test
Resource
Tip

Summary of
Chapter 5
Database Application Security Models

1. An application user is simply a record created for a user within the application schema.The record is used for authentication to the application .

2. An application user (a record ) usually does not have database privileges or roles assigned to the user.

3. The application owner is a database user (schema owner ) who owns the application tables and objects.

4. The database user is a type of user account for accessing the database that has roles and /or privileges assingned to it.

5. The proxy user is a database user that has specific roles and privileges assigned to it.The proxy user works on behalf of an application user.

6. The access matrix model uses a matrix to represent two main entities that can be used for any security implementation.

7. The access matrix model has columns that represent objects and rows that represent subjects.

8. An object in the access model can be a table ,view ,procedure ,or any other database object.

9. A subject in the access matrix model can be a usere ,role,privilege,or a module.

10. The intersection of a row and column of the access matrix is an authorization cell representing the access details of the object to the subject.

11.The access modes model uses both the subject and object as the main security entities and indicates what functions the subject is allowed to perform on the objects.

12.Client/server architecture is composed of three main compenents that are typically found in a client/server application: user interface component ,business logic component, and data base access component.

13. A web application can be referred to as a web-based application. A web application is an application that uses the Web (HTTP protocol) to conncet and communicate to the server.

14. The Web browser is the front end of the web application. It uses HTML pages embedded with other Webservices ,utilizing Active X ,Java applets or beans ,or VB scripts.

15. A Web application typically consists of five layers : Web browser, Web server, application server, business logic, and database server.

16. Data warehouses are used by decision support application to support executive management in their decision-making processes.

17. The following list contains the five application security models,listed from most commonly used to least commonly used:

-Database roles

-Application roles

-Application functions

-Roles and functions in the application

-Application tables

18.Data encryption should be used to hide sensitive data.