Drag the words into the correct boxes
1. According to Prof Nop the Footprint of Databases is .
2. This is because of like installing a bunch of things that you don’t need.
3. That increases your security footprint becuase it is more and you can forget to everything because you are focused mostly on what you use often.
4. Prof Nop says that people create databases with administrative privileges.
5. According to Prof Nop, Just like any code, when you don’t have something to the data coming in, the result is having that is susceptible to that can damage your application.
6. According to Dr. McIver, “Just win baby" works in but doesn’t work in .
7. When you ignore the and portions of the CIA triad it ultimately impacts .
8. Prof Nop says that a threat actor may not want to take down your system but the data in your system leading to bad decision making.
9. We (cybersecurity professionals) always want all 3 parts of the CIA triad but the side needs to pick 1 to prioritize.
10. It is Prof Nop's advice that when you think about availability, think about that system that can’t go down.
11. is the industry that Dr. McIver hesitant to do cybersecurity for
12. Prof Nop treats a is like a production system, you don’t want to mess with it while its being worked in.
13. Prof Nop says running the database in or version is a way to ensure that security won’t break a database.
14. Prof Nop says the DevSecOps is possible because you can run code through a and run security checks to ensure that the syntax is correct, check for , and check for unsecure configurations.
15. Cybersecurity pros need to be honest about “can’t” vs “won't’” when it comes to updating or systems.
16. Prof Nop says that you can build around a sensitive database that can’t be for security purposes.
17. Prof Nop says that there is no such thing as a lunch. In order to get something, you have to something.
18. Dr. McIver says that the is responsible for protecting the database, but business makes the to protect it.
19. Prof Nop uses to protect the database from other parts of a network and says that if you have sensitive information don’t put it in the .
20. Prof Nop says that you can also create separation by having different, data in different , or implementing different .
21. Dr. McIver didn’t understand how important were because he was focused on operations and hardware. Prof Nop says that working on databases are hard because the code is so .
22. Prof Nop’s final bit of advice is, utilize System security actions on the Management System. In the IT world, they segregate the , that can also be adopted in the management of databases. your sensitive data. Database Management Systems now have features that allow for Based Access , creation of in the database environment, , or logging. Logging allows you to determine what happened to your database.
2. This is because of
3. That increases your security footprint becuase it is more
4. Prof Nop says that people create databases with
5. According to Prof Nop, Just like any code, when you don’t have something to
6. According to Dr. McIver, “Just win baby" works in
7. When you ignore the
8. Prof Nop says that a threat actor may not want to take down your system but
9. We (cybersecurity professionals) always want all 3 parts of the CIA triad but the
10. It is Prof Nop's advice that when you think about availability, think about that
11.
12. Prof Nop treats a
13. Prof Nop says running the database in
14. Prof Nop says the DevSecOps is possible because you can run code through a
15. Cybersecurity pros need to be honest about “can’t” vs “won't’” when it comes to updating
16. Prof Nop says that you can build
17. Prof Nop says that there is no such thing as a
18. Dr. McIver says that the
19. Prof Nop uses
20. Prof Nop says that you can also create separation by having different
21. Dr. McIver didn’t understand how important
22. Prof Nop’s final bit of advice is, utilize
Comments
Post a Comment