Syllabus
Schedule
Reading
Discussion
Project
Test
Resource
Tip

Review Questions for
Chapter 5 Database Application Security Models

  1. Explain the difference between a database user and an application user.
  2. Provide an example of appropriate use of a proxy user.
  3. Explain the difference between database roles and application roles.
  4. Provide an example in oracle of how to implement the dynamic modes of an access modes security model.
  5. What are the different between a client/server and web-based application?
  6. Are there any security related difference between client/server and web-based application
  7. Give an example why data encryption is needed and when you would use encryption.
  8. Provide an example of when you would use the access matrix model.
  9. Which layer of OSL model implements security in a web application
  10. Name three data elements other than those mentioned in the chapter that required data encryption.