Database Integrity, Security and Recovery Database integrity Database integrity Database security Database security Database recovery Database recovery.

Slides:



Advertisements
Similar presentations
DB glossary (focus on typical SQL RDBMS, not XQuery or SPARQL)
Advertisements

MSc IT UFCE8K-15-M Data Management Prakash Chatterjee Room 2Q18
Database Management System MIS 520 – Database Theory Fall 2001 (Day) Lecture 13.
Auditing Computer-Based Information Systems
Monday, 08 June 2015Dr. Mohamed Osman1 What is Database Administration A high level function (technical Function) that is responsible for ► physical DB.
Systems Analysis and Design in a Changing World, 6th Edition
Maintenance Modifying the data –Add records –Delete records –Update records Modifying the design –Add fields into tables –Remove fields from a table –Change.
10/25/2001Database Management -- R. Larson Data Administration and Database Administration University of California, Berkeley School of Information Management.
1 7 Concepts of Database Management, 4 th Edition, Pratt & Adamski Chapter 7 DBMS Functions.
Copyright 2004 Prentice-Hall, Inc. Essentials of Systems Analysis and Design Second Edition Joseph S. Valacich Joey F. George Jeffrey A. Hoffer Chapter.
SLIDE 1IS Fall 2004 Database Administration: Security and Integrity University of California, Berkeley School of Information Management.
DBMS Functions Data, Storage, Retrieval, and Update
Modern Systems Analysis and Design Third Edition
Chapter 8 Security Transparencies © Pearson Education Limited 1995, 2005.
Concepts of Database Management Seventh Edition
Functions of a Database Management System. Functions of a DBMS C.J. Date n Indexing n Views n Security n Integrity n Concurrency n Backup/Recovery n Design.
 Mechanism for restoring a database quickly and accurately after loss or damage  RESPONSIBILITY OF ?????  Recovery facilities: Backup Facilities Backup.
Security Architecture Dr. Gabriel. Security Database security: –degree to which data is fully protected from tampering or unauthorized acts –Full understanding.
10/5/1999Database Management -- R. Larson Data Administration and Database Administration University of California, Berkeley School of Information Management.
Data and Database Administration
© 2013 Pearson Education, Inc. Publishing as Prentice Hall 1 CHAPTER 11: DATA AND DATABASE ADMINISTRATION Modern Database Management 11 th Edition Jeffrey.
Database Integrity and Security HAP 709 – Healthcare Databases George Mason University Janusz Wojtusiak, PhD Fall, 2010.
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 9.1.
This presentation prepared for MIS 421 / MBA 575 at Western Washington University. Material in this presentation drawn from Richard T. Watson, Data Management:
DBSQL 7-1 Copyright © Genetic Computer School 2009 Chapter 7 Transaction Management, Database Security and Recovery.
Concepts of Database Management Sixth Edition
The University of Akron Dept of Business Technology Computer Information Systems DBMS Functions 2440: 180 Database Concepts Instructor: Enoch E. Damson.
Concepts of Database Management, Fifth Edition
An Investigation of Oracle and SQL Server with respect to Integrity, and SQL Language standards Presented by: Paul Tarwireyi Supervisor: John Ebden Date:
Made by: Sambit Pulak XI-IB. Reliability refers to the operation of hardware, the design of software, the accuracy of data or the correspondence of data.
Security Architecture
Lecture 7 Integrity & Veracity UFCE8K-15-M: Data Management.
Lecture 12 Designing Databases 12.1 COSC4406: Software Engineering.
Copyright 2006 Prentice-Hall, Inc. Essentials of Systems Analysis and Design Third Edition Joseph S. Valacich Joey F. George Jeffrey A. Hoffer Chapter.
Security and Transaction Nhi Tran CS 157B - Dr. Lee Fall, 2003.
The protection of the DB against intentional or unintentional threats using computer-based or non- computer-based controls. Database Security – Part 2.
Copyright © Curt Hill Database Function What should every database do?
D ATABASE A DMINISTRATION L ECTURE N O 3 Muhammad Abrar.
Chapter 1 Introduction to Databases. 1-2 Chapter Outline   Common uses of database systems   Meaning of basic terms   Database Applications  
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Database Security Outline.. Introduction Security requirement Reliability and Integrity Sensitive data Inference Multilevel databases Multilevel security.
14.1/21 Part 5: protection and security Protection mechanisms control access to a system by limiting the types of file access permitted to users. In addition,
Fall 2001Database Systems1 Triggers Assertions –Assertions describe rules that should hold for a given database. –An assertion is checked anytime a table.
IT Auditing & Assurance, 2e, Hall & Singleton Chapter 3: Data Management Systems.
File and Database Design Class 22. File and database design: 1. Choosing the storage format for each attribute from the logical data model. 2. Grouping.
Programming Logic and Design Fourth Edition, Comprehensive Chapter 16 Using Relational Databases.
MBA 664 Database Management Dave Salisbury ( )
TM 13-1 Copyright © 1999 Addison Wesley Longman, Inc. Data and Database Administration.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Essentials of Systems Analysis and Design Fourth Edition Joseph S. Valacich Joey F.
Copyright 2001 Prentice-Hall, Inc. Essentials of Systems Analysis and Design Joseph S. Valacich Joey F. George Jeffrey A. Hoffer Chapter 9 Designing Databases.
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Chapter 9 Designing Databases 9.1.
Topics in Database Administration What is database administration? What is data administration? What are the tasks involved in establishing, creating,
Lecture 03 Constraints. Example Schema CONSTRAINTS.
Quiz Which of the following is not a mandatory characteristic of a relation? Rows are not ordered (Not required) Each row is a unique There is a.
Copyright 2002 Prentice-Hall, Inc. Modern Systems Analysis and Design Third Edition Jeffrey A. Hoffer Joey F. George Joseph S. Valacich Chapter 12 Designing.
Constraints Advanced Database Systems Dr. AlaaEddin Almabhouh.
SYSTEMS IMPLEMENTATION TECHNIQUES TRANSACTION PROCESSING DATABASE RECOVERY DATABASE SECURITY CONCURRENCY CONTROL.
Copyright © 2016 Pearson Education, Inc. CHAPTER 12: DATA AND DATABASE ADMINISTRATION Modern Database Management 12 th Edition Jeff Hoffer, Ramesh Venkataraman,
TM 13-1 Copyright © 1999 Addison Wesley Longman, Inc. Data and Database Administration.
Getting started with Accurately Storing Data
Functions of a Database Management System
Modern Systems Analysis and Design Third Edition
Managing the IT Function
Chapter 12 Designing Databases
Chapter 10 Transaction Management and Concurrency Control
Database Security &Threats
Database Backup and recovery
Designs for Data Integrity, validations, security and controls
Presentation transcript:

Database Integrity, Security and Recovery Database integrity Database integrity Database security Database security Database recovery Database recovery

Database Integrity Database integrity – refers to correct processing of a database such as applying the appropriate business rules when performing a database operations Database integrity – refers to correct processing of a database such as applying the appropriate business rules when performing a database operations Means that data stored in a database are accurate Means that data stored in a database are accurate

Several ways to ensure data integrity: Several ways to ensure data integrity: Domain integrity Domain integrity Entity integrity constraint Entity integrity constraint Referential integrity Referential integrity Business rules Business rules Database consistency Database consistency Database Integrity

Domain integrity Domain integrity Means entries in a field or column from the same domain Means entries in a field or column from the same domain Validation rules can be applied to trap errors Validation rules can be applied to trap errors Entity integrity constraint Entity integrity constraint Each row in a relation must be unique Each row in a relation must be unique Primary key shows the uniqueness of a rows, cannot be NULL (called entity integrity constraint) Primary key shows the uniqueness of a rows, cannot be NULL (called entity integrity constraint) Referential integrity Referential integrity Means that if a table has a foreign key, then a rows of the key must be exist in the referenced table Means that if a table has a foreign key, then a rows of the key must be exist in the referenced table Database Integrity

Business rules Business rules Relationship between entities define the business rules Relationship between entities define the business rules Database consistency Database consistency Must be consistent before and after a transaction Must be consistent before and after a transaction All database integrity constraints are satisfied All database integrity constraints are satisfied Database Integrity

All data must be protected from all types of threats All data must be protected from all types of threats Accidental threats – caused by accidents such as operator carelessness, power failure, disk crashes and fire. Accidental threats – caused by accidents such as operator carelessness, power failure, disk crashes and fire. Intentional – caused by human, to exploit weaknesses in the system for personal gain. Such as unauthorized access to database Intentional – caused by human, to exploit weaknesses in the system for personal gain. Such as unauthorized access to database Database Security

Security measures Security measures Views/subschemas Views/subschemas Authorization rules Authorization rules Authentication Authentication Encryption Encryption User-defined procedures User-defined procedures Database Security

Views/subschemas Views/subschemas Different user has a different views. Different user has a different views. Corresponds to a subset of the database presented to the user Corresponds to a subset of the database presented to the user Authorization rules Authorization rules To restrict access to data and operations To restrict access to data and operations Authentications Authentications Using a specific device to detect personal characteristic Using a specific device to detect personal characteristic Database Security

Encryption Encryption Used to protect highly confidential or sensitive data Used to protect highly confidential or sensitive data Coding or scrambling data to unintelligible form Coding or scrambling data to unintelligible form Data must be decrypt before the receiver read it Data must be decrypt before the receiver read it User-defined procedures User-defined procedures Users write their own procedures to protect data Users write their own procedures to protect data Database Security

Several approaches to recover from system failures Several approaches to recover from system failures Backup failure – makes a copies of the database Backup failure – makes a copies of the database Journalizing facilities – used to store the audit trails of transactions and database changes Journalizing facilities – used to store the audit trails of transactions and database changes Checkpoint facilities – will refuse to accept any new transaction Checkpoint facilities – will refuse to accept any new transaction Recovery manager – restore the database correctly after a failure has occured Recovery manager – restore the database correctly after a failure has occured Database Recovery

Types of database failure Types of database failure Aborted transaction – to correct the errors, the system must roll back by undoing the steps for the transaction Aborted transaction – to correct the errors, the system must roll back by undoing the steps for the transaction Incorrect data – updating a database correctly but with uncorrect data Incorrect data – updating a database correctly but with uncorrect data System failure – power failure, disk crashed System failure – power failure, disk crashed Database destruction – part of database may be destroyed Database destruction – part of database may be destroyed Database Recovery

END END