April 20022/CS/3XWHN 1 Database Design Where next? John Wordsworth Department of Computer Science The University of Reading Room.

Slides:



Advertisements
Similar presentations
Functions of Database Management Systems Data storage retrieval and update facilities A user-accessible catalogue or data dictionary Support for shared.
Advertisements

Managing Data Resources
Database Management: Getting Data Together Chapter 14.
CSE 190: Internet E-Commerce Lecture 10: Data Tier.
Chapter 12 USING TECHNOLOGY TO ENHANCE BUSINESS PROCESSES.
DBMS Functions Data, Storage, Retrieval, and Update
Chapter 12 USING TECHNOLOGY TO ENHANCE BUSINESS PROCESSES.
Chapter 8 Security Transparencies © Pearson Education Limited 1995, 2005.
Chapter 16 Security. 2 Chapter 16 - Objectives u The scope of database security. u Why database security is a serious concern for an organization. u The.
Database – Part 2 Dr. V.T. Raja Oregon State University.
Database Features Lecture 2. Desirable features in an information system Integrity Referential integrity Data independence Controlled redundancy Security.
Managing Data Resources. File Organization Terms and Concepts Bit: Smallest unit of data; binary digit (0,1) Byte: Group of bits that represents a single.
Dr. Kalpakis CMSC 461, Database Management Systems Introduction.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Secure Knowledge Management: and.
Information systems and databases Database information systems Read the textbook: Chapter 2: Information systems and databases FOR MORE INFO...
Data Warehousing Alex Ostrovsky CS157B Spring 2007.
Transactions and Recovery
Defining Data Warehouse Concepts and Terminology.
Business Intelligence: Data and Text Management Instructor: Bajuna Salehe Web:
10/5/1999Database Management -- R. Larson Data Administration and Database Administration University of California, Berkeley School of Information Management.
ACS1803 Lecture Outline 2 DATA MANAGEMENT CONCEPTS Text, Ch. 3 How do we store data (numeric and character records) in a computer so that we can optimize.
ISOM MIS3150 Data and Info Mgmt Database Security Arijit Sengupta.
April 20023CSG11 Electronic Commerce Design (1) John Wordsworth Department of Computer Science The University of Reading Room.
Intro to MIS – MGS351 Databases and Data Warehouses Chapter 3.
© D. Wong 2002 © D. Wong CS610 / CS710 Database Systems I Daisy Wong.
Database Systems – Data Warehousing
Database  A database is an organized collection of data for one or more purposes, usually in digital form. The data are typically organized to model.
Module Title? DBMS Introduction to Database Management System.
Invitation to Computer Science 5th Edition
Introduction to Databases A line manager asks, “If data unorganized is like matter unorganized and God created the heavens and earth in six days, how come.
1 Introduction to Database Systems. 2 Database and Database System / A database is a shared collection of logically related data designed to meet the.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Computer Science 101 Database Concepts. Database Collection of related data Models real world “universe” Reflects changes Specific purposes and audience.
PowerPoint Presentation for Dennis, Wixom, & Tegarden Systems Analysis and Design with UML, 4th Edition Copyright © 2009 John Wiley & Sons, Inc. All rights.
Data warehousing and online analytical processing- Ref Chap 4) By Asst Prof. Muhammad Amir Alam.
Database Design and Management CPTG /23/2015Chapter 12 of 38 Functions of a Database Store data Store data School: student records, class schedules,
C6 Databases. 2 Traditional file environment Data Redundancy and Inconsistency: –Data redundancy: The presence of duplicate data in multiple data files.
Lecture2: Database Environment Prepared by L. Nouf Almujally 1 Ref. Chapter2 Lecture2.
April 20023CSG11 Electronic Commerce HTML John Wordsworth Department of Computer Science The University of Reading Room 129, Ext.
Today and Tomorrow 12 th Edition Understanding Computers Chapter 14: Databases and Database Management Systems.
Database Design Methodology. Lesson 1: Introduction to Databases.
MANAGING DATA RESOURCES ~ pertemuan 7 ~ Oleh: Ir. Abdul Hayat, MTI.
CSCI 3140 Module 6 – Database Security Theodore Chiasson Dalhousie University.
PowerPoint Presentation for Dennis, Wixom, & Tegarden Systems Analysis and Design with UML, 3rd Edition Copyright © 2009 John Wiley & Sons, Inc. All rights.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
Security, Accounting, and Assurance Mahdi N. Bojnordi 2004
IT Auditing & Assurance, 2e, Hall & Singleton Chapter 3: Data Management Systems.
File and Database Design Class 22. File and database design: 1. Choosing the storage format for each attribute from the logical data model. 2. Grouping.
Managing Data Resources. File Organization Terms and Concepts Bit: Smallest unit of data; binary digit (0,1) Byte: Group of bits that represents a single.
Database and Information Management Chapter 9 – Computers: Understanding Technology, 3 rd edition.
Business Intelligence Transparencies 1. ©Pearson Education 2009 Objectives What business intelligence (BI) represents. The technologies associated with.
3/6: Data Management, pt. 2 Refresh your memory Relational Data Model
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
April 20023CSG1CRM 1 Electronic Commerce Customer relationship management John Wordsworth Department of Computer Science The University of Reading
PowerPoint Presentation for Dennis, Wixom, & Tegarden Systems Analysis and Design with UML, 5th Edition Copyright © 2015 John Wiley & Sons, Inc. All rights.
April 2002 Information Systems Design John Ogden & John Wordsworth 1 Database Design SQL (1) John Wordsworth Department of Computer Science The University.
April 20022/CS/3XAPP 1 Database Design Anatomy of an application John Wordsworth Department of Computer Science The University of Reading
April 20023CSG11 Electronic Commerce Transaction processing John Wordsworth Department of Computer Science The University of Reading
Data Warehouse – Your Key to Success. Data Warehouse A data warehouse is a  subject-oriented  Integrated  Time-variant  Non-volatile  Restructure.
SYSTEMS IMPLEMENTATION TECHNIQUES TRANSACTION PROCESSING DATABASE RECOVERY DATABASE SECURITY CONCURRENCY CONTROL.
Copyright © 2016 Pearson Education, Inc. CHAPTER 12: DATA AND DATABASE ADMINISTRATION Modern Database Management 12 th Edition Jeff Hoffer, Ramesh Venkataraman,
Managing Data Resources File Organization and databases for business information systems.
April 20022/CS/3X1 Database Design Design method John Wordsworth Department of Computer Science The University of Reading Room.
Intro to MIS – MGS351 Databases and Data Warehouses
Data and Applications Security Developments and Directions
Databases and Data Warehouses Chapter 3
Database Security &Threats
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Instructor: SAMIA ARSHAD
Presentation transcript:

April 20022/CS/3XWHN 1 Database Design Where next? John Wordsworth Department of Computer Science The University of Reading Room 129, Ext 6544

April 20022/CS/3XWHN 2 Lecture objectives To summarise what has happened so far. To review topics for further study.

April 20022/CS/3XWHN 3 What we have done History of data management Modelling data requirements with entity- relationship modelling Relational model of data, relational algebra, normalisation to BCNF, SQL for data manipulation Physical files and indexes

April 20022/CS/3XWHN 4 Security and integrity: risks Theft and fraud Loss of confidentiality (secrecy) about corporate data Loss of privacy in relation to personal data Loss of integrity (invalid or corrupt data) Loss of availability (it’s there but we can’t get at it to run the business)

April 20022/CS/3XWHN 5 Security and integrity: strategies Access authorization (access privileges) Access authentication (passwords etc.) Encryption firewalls (at gateway between networks) Backups, journals, checkpointing (instantaneous memory dump) Audit (Quality Assurance applied to all stages of data processing)

April 20022/CS/3XWHN 6 Transactions: key ideas The ACID test –Atomicity –Consistency –Isolation –Durability Serialisability Commitment and rollback Recoverability Locking

April 20022/CS/3XWHN 7 An e-commerce application Database Web server Browser Tier 3Tier 2Tier 1

April 20022/CS/3XWHN 8 Data warehousing Subject-oriented –decision-support rather than operational applications Integrated –disparate sources and data types brought together Time-variant –cumulative, frequently updated, time-stamped Non-volatile –refreshed at intervals by increment, summarised

April 20022/CS/3XWHN 9 Data mining The process of extracting valid, previously unknown, comprehensible and actionable information from large databases and using it to make critical business decisions e.g. –Identifying buying patterns of customers –Identifying loyal customers –Identifying successful medical therapies for different illnesses

April 20022/CS/3XWHN 10 Object-oriented databases Various object-oriented data models Support the storing and retrieval of objects: –object identifier –attributes –methods Object Definition Language Object Query Language

April 20022/CS/3XWHN 11 Object-relational databases Extensions to the relational model User-defined abstract data types (like classes) Multivalued attributes (set types) SQL3

April 20022/CS/3XWHN 12 Key points Transactions on databases need to have the ACID properties. Security controls are important in operational databases. Data warehousing and data mining are applications based on large databases of historical data. Data models other than the relational model are emerging.