- Explain the difference between a database user and an application user.
- Provide an example of appropriate use of a proxy user.
- Explain the difference between database roles and application roles.
- Provide an example in oracle of how to implement the dynamic modes of an access modes security model.
- What are the different between a client/server and web-based application?
- Are there any security related difference between client/server and web-based application
- Give an example why data encryption is needed and when you would use encryption.
- Provide an example of when you would use the access matrix model.
- Which layer of OSL model implements security in a web application
- Name three data elements other than those mentioned in the chapter that required data encryption.
|