Monday, 08 June 2015Dr. Mohamed Osman1 What is Database Administration A high level function (technical Function) that is responsible for ► physical DB.

Slides:



Advertisements
Similar presentations
MSc IT UFCE8K-15-M Data Management Prakash Chatterjee Room 2Q18
Advertisements

Chapter 23 Database Security and Authorization Copyright © 2004 Pearson Education, Inc.
Database Administration, Integrity and Performance.
Database Management System MIS 520 – Database Theory Fall 2001 (Day) Lecture 13.
Security and Integrity
Database Management System
10/25/2001Database Management -- R. Larson Data Administration and Database Administration University of California, Berkeley School of Information Management.
1 7 Concepts of Database Management, 4 th Edition, Pratt & Adamski Chapter 7 DBMS Functions.
Database Integrity, Security and Recovery Database integrity Database integrity Database security Database security Database recovery Database recovery.
Database Management: Getting Data Together Chapter 14.
DBMS Functions Data, Storage, Retrieval, and Update
Physical design. Stage 6 - Physical Design Retrieve the target physical environment Create physical data design Create function component implementation.
Chapter 8 Security Transparencies © Pearson Education Limited 1995, 2005.
A Guide to MySQL 7. 2 Objectives Understand, define, and drop views Recognize the benefits of using views Use a view to update data Grant and revoke users’
Chapter 4 Relational Databases Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 4-1.
Database Features Lecture 2. Desirable features in an information system Integrity Referential integrity Data independence Controlled redundancy Security.
A Guide to SQL, Seventh Edition. Objectives Understand, create, and drop views Recognize the benefits of using views Grant and revoke user’s database.
Functions of a Database Management System. Functions of a DBMS C.J. Date n Indexing n Views n Security n Integrity n Concurrency n Backup/Recovery n Design.
Chapter 4 Relational Databases Copyright © 2012 Pearson Education 4-1.
Security Architecture Dr. Gabriel. Security Database security: –degree to which data is fully protected from tampering or unauthorized acts –Full understanding.
10/5/1999Database Management -- R. Larson Data Administration and Database Administration University of California, Berkeley School of Information Management.
Data and Database Administration
© 2013 Pearson Education, Inc. Publishing as Prentice Hall 1 CHAPTER 11: DATA AND DATABASE ADMINISTRATION Modern Database Management 11 th Edition Jeffrey.
Database Integrity and Security HAP 709 – Healthcare Databases George Mason University Janusz Wojtusiak, PhD Fall, 2010.
This presentation prepared for MIS 421 / MBA 575 at Western Washington University. Material in this presentation drawn from Richard T. Watson, Data Management:
The University of Akron Dept of Business Technology Computer Information Systems DBMS Functions 2440: 180 Database Concepts Instructor: Enoch E. Damson.
Concepts of Database Management, Fifth Edition
An Investigation of Oracle and SQL Server with respect to Integrity, and SQL Language standards Presented by: Paul Tarwireyi Supervisor: John Ebden Date:
Concepts of Database Management, Fifth Edition Chapter 4: The Relational Model 3: Advanced Topics.
Database Technical Session By: Prof. Adarsh Patel.
STORING ORGANIZATIONAL INFORMATION— DATABASES CIS 429—Chapter 7.
Security Architecture
Introduction to Database Systems
1 Welcome: To the second learning sequence “ Data Base (DB) and Data Base Management System (DBMS) “ Recap : In the previous learning sequence, we discussed.
SEC835 Practical aspects of security implementation Part 1.
Lecture 7 Integrity & Veracity UFCE8K-15-M: Data Management.
Discovering Computers Fundamentals Fifth Edition Chapter 9 Database Management.
D ATABASE A DMINISTRATION L ECTURE N O 3 Muhammad Abrar.
Relational Database. Database Management System (DBMS)
Databases Shortfalls of file management systems Structure of a database Database administration Database Management system Hierarchical Databases Network.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Database Security Outline.. Introduction Security requirement Reliability and Integrity Sensitive data Inference Multilevel databases Multilevel security.
Prepared By Prepared By : VINAY ALEXANDER ( विनय अलेक्सजेंड़र ) PGT(CS),KV JHAGRAKHAND.
Database structure and space Management. Database Structure An ORACLE database has both a physical and logical structure. By separating physical and logical.
Copyright © 2007 Ramez Elmasri and Shamkant B. Navathe Chapter 6 Data Integrity and Security.
File and Database Design Class 22. File and database design: 1. Choosing the storage format for each attribute from the logical data model. 2. Grouping.
Programming Logic and Design Fourth Edition, Comprehensive Chapter 16 Using Relational Databases.
MBA 664 Database Management Dave Salisbury ( )
TM 13-1 Copyright © 1999 Addison Wesley Longman, Inc. Data and Database Administration.
Physical Database Design Purpose- translate the logical description of data into the technical specifications for storing and retrieving data Goal - create.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Chapter 11 Database Security: An Introduction Copyright © 2004 Pearson Education, Inc.
Chapter 5 : Integrity And Security  Domain Constraints  Referential Integrity  Security  Triggers  Authorization  Authorization in SQL  Views 
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Chapter 9 Designing Databases 9.1.
L o g o Modern DBMSs security problems Nguyen Chi Thanh Nguyen Thanh Toan Group:
Chapter 9 Database Security and Authorization Copyright © 2004 Pearson Education, Inc.
DATABASE CONTROLS Chapter 14. Access Controls Discretionary Access Controls Discretionary Access Controls Types of Restrictions : 1. Name-dependent restrictions.
Introduction to Databases Dr. Osama AL Rababah. Objectives In this capture you will learn: Some common uses of database systems. The characteristics of.
Introduction to Core Database Concepts Getting started with Databases and Structure Query Language (SQL)
Database Security. Introduction to Database Security Issues (1) Threats to databases Loss of integrity Loss of availability Loss of confidentiality To.
LECTURE TWO Introduction to Databases: Data models Relational database concepts Introduction to DDL & DML.
Database Security Database System Implementation CSE 507 Some slides adapted from Navathe et. Al.
Copyright © 2016 Pearson Education, Inc. CHAPTER 12: DATA AND DATABASE ADMINISTRATION Modern Database Management 12 th Edition Jeff Hoffer, Ramesh Venkataraman,
TM 13-1 Copyright © 1999 Addison Wesley Longman, Inc. Data and Database Administration.
Getting started with Accurately Storing Data
Database System Implementation CSE 507
Database Security and Authorization
Functions of a Database Management System
DATABASE SECURITY For CSCL (BIM).
Instructor Materials Chapter 5: Ensuring Integrity
Presentation transcript:

Monday, 08 June 2015Dr. Mohamed Osman1 What is Database Administration A high level function (technical Function) that is responsible for ► physical DB design & ► dealing with technical issues such as  Database performance (integrity) Database performance (integrity)  Backup & recovery Backup & recovery  security security

Dr. Mohamed Osman Hegaz2 Database performance (integrity)

Monday, 08 June 2015Dr. Mohamed Osman3 Integrity Data integrity is to ensure that, as far as possible, the data in the database is accurate at all times Integrity here refers to the CORRECTNESS & CONSISTENCY of the data stored in the database

Monday, 08 June 2015Dr. Mohamed Osman4 Integrity of Data Sharing (1) One of the objectives of the Database approach is that different users are allowed (forced) to share the same data. This implies that DBMS must allow several users to access database at the same time. This in turn can result in the problem of loss of updates if adequate concurrency control measures are not implemented ► Only a problem if some users are updating the database ► no problem if ALL users are reading only

Monday, 08 June 2015Dr. Mohamed Osman5 Integrity of Data Sharing (2) Locking Mechanisms Locking mechanisms are the most common type of concurrency control mechanism. ► Locks may be applied at various levels – Database - used mainly during backup of entire Database. Table- rarely used but useful if nearly every record in table is to be updated e.g. giving each employee a 5% rise. Block or Page- lock on physical storage unit Record ► only the required record or row is locked ► most common type of lock & allows access to all other records. Field ► only required field is locked ► not common because of overheads required.

Monday, 08 June 2015Dr. Mohamed Osman6 Integrity - CONSISTENCY Implies that the data held in the tables of the database is consistent in terms of the Relational Data Model ► Entity integrity Entity integrity ► Referential Integrity Referential Integrity

Monday, 08 June 2015Dr. Mohamed Osman7 Entity integrity ► Each row in the table Represents a single instance of the entity type modelled by the table Has a UNIQUE and NON-NULL primary key value ► Each column in the table Represents the occurrences of a single attribute type Has entries of the appropriate data type

Monday, 08 June 2015Dr. Mohamed Osman8 Referential Integrity ► Concerned with relationships between tables in the database i.e. that the data in 1 table does not contradict the data in another e.g. every FOREIGN KEY value in a table must have a matching PRIMARY KEY value in the corresponding table

Monday, 08 June 2015Dr. Mohamed Osman9 Data Validation integrity ► Database Management System (DBMS) provides features to help ensure data validation integrity Usually implemented using Database Constraints ► Specified in data dictionary table definition (Usually specified on creation of table)

Monday, 08 June 2015Dr. Mohamed Osman10 Constraints ► Column Constraints e.g. Not Null Default ► Table Constraints e.g. Primary Key specifies that when a new row is inserted the value of this column must be NOT NULL & UNIQUE DBMS creates an INDEX on primary key columns Foreign Key specifies that when a new row is inserted the value of this column MUST match VALUE of the corresponding PRIMARY KEY in the master table

Monday, 08 June 2015Dr. Mohamed Osman11 Creating Tables ► each column has a column-type indicating the size of the column and the datatype of values that are acceptable e.g Create Table Customer ( CustomerNo Varchar2(5) NOT NULL, Name Varchar2(20) NOT NULL, Address Varchar2(60) NOT NULL, TelNo Varchar2(15) NOT NULL, Varchar2(30), Constraint Customer_pk Primary Key (CustomerNo))

Dr. Mohamed Osman Hegaz12 Recovery

Monday, 08 June 2015Dr. Mohamed Osman13 Recovery ► Database Recovery name given to the set of procedures used to restore the data in the database quickly & accurately to some previous known correct position after loss or damage ► Reasons for loss or damage: could be one of/combination of – ► human error ► hardware failure ► incorrect/invalid data ► software errors ► virus ► other disasters

Monday, 08 June 2015Dr. Mohamed Osman14 Recovery :Basic Recovery Facilities ► DBMS should provide 4 basic facilities for backup & recovery of data in database - 1. Backup facilities provide periodic backup copies of some or all of the database 2. Journal facilities to maintain an audit trail of transactions & DB change 3. Checkpoint facility DBMS temporarily suspends all processing & synchronises files/journals 4. Recovery Manager allows DBMS to restore the DB to a correct condition & restart processing transactions

Dr. Mohamed Osman Hegaz15 Database Security

Threats to databases - Loss of integrity - Loss of availability - Loss of confidentiality To protect databases against these types of threats four kinds of countermeasures can be implemented : ► access control. ► inference control (controlling the access to a statistical database)- statistical queries ► flow control (prevents information from flowing in such a way that it reaches unauthorized users) ► encryption.

Access control Examples GRANT CREATE TABLE TO A1; GRANT INSERT, DELETE ON EMPLOYEE, DEPARTMENT TO A2; GRANT SELECT ON EMPLOYEE, DEPARTMENT TO A3 WITH GRANT OPTION; REVOKE SELECT ON EMPLOYEE FROM A3;

Inference control (Statistical Database Security) ► Statistical databases are used mainly to produce statistics on various populations. ► The database may contain confidential data on individuals, which should be protected from user access. ► Users are permitted to retrieve statistical information on the populations, such as averages, sums, counts, maximums, minimums, and standard deviations. ► Statistical queries involve applying statistical functions to a population of tuples. ► It is DBMS’s responsibility to ensure confidentiality of information about individuals, while still providing useful statistical summaries of data about those individuals to users.

Flow Control ► Flow control regulates the distribution or flow of information among accessible objects. A flow between object X and object Y occurs when a program reads values from X and writes values into Y. ► Flow controls check that information contained in some objects does not flow explicitly or implicitly into less protected objects. ► A flow policy specifies the channels along which information is allowed to move. The simplest flow policy specifies just two classes of information: confidential (C) and nonconfidential (N), and allows all flows except those from class C to class N. ► A covert channel allows information to pass from a higher classification level to a lower classification level through improper means.

Encryption ► Encryption is a means of maintaining secure data in an insecure environment. ► Encryption consists of applying an encryption algorithm to data using some prespecified encryption key. the resulting data has to be decrypted using a decryption key to recover the original data. ► The Data Encryption Standard (DES) is a system developed by the U.S. government for use by the general public. It has been widely accepted as a cryptographic standard both in the United States and abroad. ► DES can provide end-to-end encryption on the channel between the sender A and receiver B ► Public key algorithms are based on mathematical functions rather than operations on bit patterns.