Designs for Data Integrity, validations, security and controls

Slides:



Advertisements
Similar presentations
Access 2007 ® Use Databases How can Microsoft Access 2007 help you structure your database?
Advertisements

MSc IT UFCE8K-15-M Data Management Prakash Chatterjee Room 2Q18
Microsoft Office 2013 ®® Access Tutorial 2 Building a Database and Defining Table Relationships.
Maintenance Modifying the data –Add records –Delete records –Update records Modifying the design –Add fields into tables –Remove fields from a table –Change.
Database Integrity, Security and Recovery Database integrity Database integrity Database security Database security Database recovery Database recovery.
Database Management: Getting Data Together Chapter 14.
COMPREHENSIVE Access Tutorial 2 Building a Database and Defining Table Relationships.
Chapter 8 Security Transparencies © Pearson Education Limited 1995, 2005.
Database Design Concepts INFO1408 Term 2 week 1 Data validation and Referential integrity.
FIRST COURSE Access Tutorial 2 Building a Database and Defining Table Relationships.
Software Development Unit 2 Databases What is a database? A collection of data organised in a manner that allows access, retrieval and use of that data.
Database Applications – Microsoft Access Lesson 2 Modifying a Table and Creating a Form 45 slides in presentation Accessibility check 9/14.
Microsoft Access 2000 Creating Tables and Relationships.
Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall 1 1. Chapter 2: Relational Databases and Multi-Table Queries Exploring Microsoft Office.
Building The Database Chapter 2
Database Integrity and Security HAP 709 – Healthcare Databases George Mason University Janusz Wojtusiak, PhD Fall, 2010.
With Microsoft Office 2007 Intermediate© 2008 Pearson Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Office 2007 Intermediate.
© 2008 The McGraw-Hill Companies, Inc. All rights reserved. ACCESS 2007 M I C R O S O F T ® THE PROFESSIONAL APPROACH S E R I E S Lesson 4 – Creating New.
With Microsoft Access 2007 Volume 1© 2008 Pearson Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Access 2007 Volume 1 Chapter.
Primary & Foreign Keys. PK & FK 1.Primary key is required 2.The PK must be unique 3.If the primary key from one table is related to a field in another.
The University of Akron Dept of Business Technology Computer Information Systems DBMS Functions 2440: 180 Database Concepts Instructor: Enoch E. Damson.
An Investigation of Oracle and SQL Server with respect to Integrity, and SQL Language standards Presented by: Paul Tarwireyi Supervisor: John Ebden Date:
DAY 20: ACCESS CHAPTER 5 Tazin Afrin October 29,
Lecture 7 Integrity & Veracity UFCE8K-15-M: Data Management.
Microsoft Access 2013 Design and Create Tables to Store Data Chapter 2.
Office Management Tools II Ms Saima Gul.  When you create your tables, you should assign each table a primary key—one or more fields whose contents are.
Access Project 3 Notes. Introduction Maintaining the Database  Modifying the data to keep it up-to-date Restructure the Database  To change the database.
Using Microsoft Access 56:150 Information System Design.
Enhancing Forms with OLE Fields, Hyperlinks, and Subforms – Project 5.
Exploring Microsoft Access Chapter 6 Many-to-Many Relationships: A More Complex System.
Access 2007 ® Use Databases How can Microsoft Access 2007 help you structure your database?
INFORMATION TECHNOLOGY DATABASE MANAGEMENT. Adding a new field 1Right click the table name and select design view 2Type the field information at the end.
Microsoft Access 2010 Chapter 3 Maintaining a Database.
Microsoft Office 2013: In Practice Chapter 2 Using Design View, Data Validation, and Relationships Copyright © 2014 by The McGraw-Hill Companies, Inc.
Constraints Lesson 8. Skills Matrix Constraints Domain Integrity: A domain refers to a column in a table. Domain integrity includes data types, rules,
Constraints Advanced Database Systems Dr. AlaaEddin Almabhouh.
VOCAB REVIEW. A field that can be computed from other fields Calculated field Click for the answer Next Question.
DAY 20: ACCESS CHAPTERS 5, 6, 7 Larry Reaves October 28,
To play, start slide show and click on circle Access 1 Access 2 Access 3 Access 4 Access Access
AOIT Database Design Unit 3, Lesson 9 Data Integrity Copyright © 2009–2011 National Academy Foundation. All rights reserved.
Database Constraints ICT 011. Database Constraints Database constraints are restrictions on the contents of the database or on database operations Database.
Microsoft Access 2016 Design and Create Tables to Store Data
Getting started with Accurately Storing Data
Access Tutorial 2 Building a Database and Defining Table Relationships
New Perspectives on Microsoft Access 2016
Microsoft Office Access 2010 Lab 1
Creating a database table
Microsoft Office Access 2010 Lab 3
Microsoft Office Access 2010 Lab 2
and Defining Table Relationships
Chapter 5: The Art of Ensuring Integrity
Objectives Create an action query to create a table
CIS 155 Table Relationship
CSIS 115 Database Design and Applications for Business
Microsoft Access 2013 Design and Create Tables to Store Data
Instructor Materials Chapter 5: The Art of Ensuring Integrity
Exploring Microsoft Office Access 2007
Design and Create Tables to Store Data Chapter 2
Instructor Materials Chapter 5: The Art of Ensuring Integrity
Access Tutorial 2 Building a Database and Defining Table Relationships
Access Tutorial 2 Building a Database and Defining Table Relationships
logical design for relational database
Implementation of security elements in database
The ultimate in data organization
Implementation of physical data model
Microsoft Access Validation Rules, Table Relationships And
Instructor Materials Chapter 5: Ensuring Integrity
Relational data model. Codd's Rule E.F Codd was a Computer Scientist who invented Relational model for Database management. Based on relational model,
Presentation transcript:

Designs for Data Integrity, validations, security and controls DATABASE DESIGN & DEVELOPMENT Designs for Data Integrity, validations, security and controls Zatil Ridh'wah Hj Darot

Data integrity Refers to the accuracy and consistency of data. For example, a user could accidentally try to enter a phone number into a date field. If the system enforces data integrity, it will prevent the user from making these ________________. Maintaining data integrity means making sure the data remains intact and _____________ throughout its entire life cycle. This includes the capture of the data, storage, updates, transfers, backups, etc. Every time data is processed there’s a risk that it could get ____________ (whether accidentally or maliciously).

4 Types of Data Integrity: Entity integrity Referential integrity Domain integrity User-defined integrity

Entity integrity Defines each row to be unique within its table. No two rows can be the same. To achieve this, a primary key can be defined. The primary key field contains a unique identifier – no two rows can contain the same unique identifier.

Referential integrity concerned with relationships. When two or more tables have a relationship, we have to ensure that the __________value matches the primary key value at all times. We don’t want to have a situation where a foreign key value has no matching primary key value in the primary table. This would result in an orphaned record. So referential integrity will prevent users from: Adding records to a related table if there is ____________ record in the primary table. Changing values in a primary table that result in orphaned records in a related table. Deleting records from a primary table if there are matching related records.

Domain integrity Concerns the validity of entries for a given column. Selecting the appropriate _________for a column is the first step in maintaining domain integrity. Other steps could include, setting up appropriate constraints and rules to define the data format and/or restricting the range of possible values. User-defined integrity Allows the user to apply business rules to the database that aren’t covered by any of the other three data integrity types.

data validation Data validation can be implemented during the design process of a database by setting data __________ for the user input to avoid errors. There are several different ways to validate data through Microsoft Access, some of which include: 1. Validation Rule Property: This property allows the database designer to set a validation rule, so that data inputted into the database must follow a certain rule. Example: Student titles such as Freshman, Sophomore, Junior, and Senior must be entered as ‘FR’, ‘SF’, ‘JR’, or ‘SR’. The database designer can also implement a validation rule text that displays a message stating the above rule if entered incorrectly.

2. Data Types: You can restrict data types that are entered into an Access database by setting a certain required data type. Example: If a data type is set to be ‘numeric’, then all other types, such as a character(s) will be denied with an error. By setting an input mask in a field in Microsoft Access, it controls the way data can be entered. Example: Input masks can specify that social security numbers be entered in the form of ‘AAA"-"AA"-"AAAA’. By using this setting the user’s input automatically formats to the specified form. 3. Required Property: Using the required property is an easy way to avoid null values in unwanted areas. If the required property is set for a certain field but the user attempts to leave it ___________, they will be prompted with an error message, requiring data to be entered before going any further.

Data security & data control Frequently data contains proprietary information Personally identifiable data Employee HR Data Financial Data The security and confidentiality of this data is of __________ importance.

There are four key issues in the security of databases just as with all security systems: Availability Authenticity Integrity Confidentiality

availability Data needs to be available at all necessary times Data needs to be available to only the appropriate users Need to be able to track who has ________ to and who has accessed what data

authenticity Need to ensure that the data has been edited by an ___________ source Need to confirm that users accessing the system are who they say they are Need to verify that all report requests are from authorized users Need to verify that any outbound data is going to the expected receiver

integrity Need to verify that any external data has the __________and other metadata Need to verify that all input data is accurate and verifiable Need to ensure that data is following the correct work flow rules for your institution/corporation Need to be able to report on all data changes and who authored them to ensure compliance with corporate rules and ____________.

confidentiality Need to ensure that confidential data is only available to correct people Need to ensure that entire database is security from external and internal system breaches Need to provide for reporting on who has accessed what data and what they have done with it Mission critical and ___________ data must be highly security at the potential risk of lost business and litigation

tutorials Discuss and provide an overview of the security measures provided by Microsoft Office Access DBMS. Go to: https://www.khanacademy.org/partnercontent/nova/cybersecurity/cyber/e/cybersecurity-101- quiz and complete the Cyber Security 101 quiz.

references Conolly, T. and Begg, C. (2014) Database Systems: A Practical Approach to Design, Implementation and Management. 6th Ed. Global Edition. Pearson.