How to ensure database security?

1 Answer

Answer :

Use bcrypt or PBKDF2. Always salt + hash, never just use hash, especially weak hash like SHA1 or MD5 which is completely broken as of 2020.

Related questions

Description : Single Ladies... How do you ensure your security when home alone?

Last Answer : Why only single ladies? My hubby is strong, but he can’t stop a bullet either. I don’t keep a gun in my house…I have children. But no, I’m not at all “scared” when my husband works late.

Description : How do I ensure I get my security deposit back for my apartment?

Last Answer : try the sf tenants' union

Description : to ensure security passwords should be -General Knowledge

Last Answer : To ensure security, passwords should be a combination of letters and numbers.

Description : Which security provision is used to ensure data integrity and authentication? -Technology

Last Answer : A digital signature helps the user to ensure data integrity and authentication.

Description : How cloud computing service ensure the business security?

Last Answer : The role of cloud based security solutions is to ensure that customer's information is safe at all time. A cloud service filters information and restricts unwarranted access. It offers back up for the client's information and offers data recovery in case of any data loss.

Description : Considering areas of concern, external network requirements, internal network requirements is the evaluation of a) Assess the security provisions for cloud applications b) Ensure cloud networks and ... Manage people, roles and identities d) Understand the security requirements of the exit process

Last Answer : Ensure cloud networks and connections are secure

Description : A Solution to overcome the challenge to support a large number of application service consumers from around the world, cloud infrastructure providers (i.e., IaaS providers) have established data ... ) Global exchange of cloud resources b) Resource provisioning c) Cloud security d) Resource sharing

Last Answer : Global exchange of cloud resources

Description : One aspect that has to be dealt with by the integrity subsystem is to ensure that only valid values can be assigned to each data items. This is referred to as A) Data Security B) Domain access C) Data Control

Last Answer : C) Data Control

Description : During E‐commerce transaction we should ensure‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Integrity b. Security c. Confidentiality d. All the above

Last Answer : d. All the above

Description : DES and public key algorithm are combined (i) to speed up encrypted message transmission (ii)to ensure higher security by using different key for each transmission (iii) as a combination is always better than individual system (iv ... e-Commerce a. i and ii b. ii and iii c. iii and iv d. i and iv  

Last Answer : a. i and ii

Description : A hardened firewall host on an Intranet is a. a software which runs in any of the computers in the intranet b. a software which runs on a special reserved computer on the intranet c. a stripped down computer connected to the intranet d. a mainframe connected to the intranet to ensure security

Last Answer : b. a software which runs on a special reserved computer on the intranet 

Description : __________ security consultants uses database security monitoring & scanning tools to maintain security to different data residing in the database / servers / cloud. a) Database b) Network c) System d) Hardware

Last Answer : d) Hardware

Description : In IT, means that the data available in the database is both accurate and consistent. (1) Data Security (2) Data Availability (3) Data Binding (4) Data Integrity

Last Answer : Data Integrity