Which of the following does not address Database Management Systems (DBMS) Security?
A.
Perturbation
B.
Cell suppression
C.
Padded cells
D.
Partitioning
Explanation:
A padded cell system is used in Intrusion Detection Systems (IDSs) and is similar to a honeypot. When an IDS
detects an intruder, that intruder is automatically transferred to a padded cell. The padded cell has the look and
layout of the actual network, but within the padded cell the intruder can neither perform malicious activities nor
access any confidential data.
Incorrect Answers:
A: Noise and perturbation is a database security technique of inserting fake information in the database to
misdirect an attacker or cause confusion on the part of the attacker that the actual attack will not be fruitful.
B: Cell suppression is a database security technique used to hide specific cells in a database that contain
information that could be used in inference attacks.
D: Partitioning is a database security technique that involves dividing the database into different parts, which
makes it much harder for an unauthorized individual to find connecting pieces of data that can be brought
together and other information that can be deduced or uncovered.Harris, Shon, All In One CISSP Exam Guide, 6th Edition, McGraw-Hill, New York, 2013, p. 1185
Stewart, James, Ed Tittel and Mike Chapple, CISSP: Certified Information Systems security Professional Study
Guide, 5th Edition, Wiley Publishing, Indianapolis, 2011, p. 58