UNit III DBMS
UNit III DBMS
Management System
Relational Data Base Management System: Concept of RDBMS, Its Characteristics And
Advantages, Codd’s 12 Rules, Database Security, Introduction To RDBMS.
Concept of RDBMS
5. Tuples in a relation do not have to follow a significant order as the relation is not order-sensitive.
6. Similarly, the attributes of a relation also do not have to follow certain ordering, it’s up to the developer to
decide the ordering of attributes.
Advantages of RDBMS
Advantages of RDBMS
1. Simple Model
A Relational Database system is the most simple model, as it does not require any complex structuring or
querying processes. It doesn’t involve tedious architectural processes like hierarchical database structuring
or definition. As the structure is simple, it is sufficient to be handled with simple SQL queries and does not
require complex queries to be designed.
2. Data Accuracy
In the relational database system, there can be multiple tables related to one another with the use of a
primary key and foreign key concepts. This makes the data to be non-repetitive. There is no chance for
duplication of data. Hence the accuracy of data in the relational database is more than any other database
system.
Advantages of RDBMS
4. Data Integrity
Data integrity is a crucial characteristic of the Relational Database system. Sturdy Data entries and
legitimacy validations ensure that all the Data in the database confines within suitable arrangements and
the data necessary for creating the relationships are present. This relational reliability amongst the tables in
the database helps in avoiding the records from being imperfect, isolated or unrelated.
Advantages of RDBMS
5. Flexibility
A Relational Database system by itself possesses qualities for leveling up, expanding for bigger lengths, as
it is endowed with a bendable structure to accommodate the constantly shifting requirements. This
facilitates the increasing incoming amount of data, as well as the update and deletes wherever required.
6. Normalization
The methodical style is maintained for making sure of a relational database structure is liberated of any
variances that can make a difference in the integrity and accuracy of the tables in the database. A
normalization process provides a set of regulations, characteristics, and purposes for the database structure
and evaluation of a relational database model.
Advantages of RDBMS
7. High Security:
As the data is divided amongst the tables of the relational database system, it is possible to
make a few tables to be tagged as confidential and others not. This segregation is easily
implemented with a relational database management system, unlike other databases.
Dr Edgar F. Codd, after his extensive research on the Relational Model of database
systems, came up with twelve rules of his own, which according to him, a database must
obey in order to be regarded as a true relational database.
These rules can be applied on any database system that manages stored data using only its
relational capabilities. This is a foundation rule, which acts as a base for all the other rules.
Codd's 12 Rules
Rule 1: Information Rule
The data stored in a database, may it be user data or metadata, must be a value of some table
cell. Everything in a database must be stored in a table format.
IMPORTANCE OF DATA
Bank/Demat Accounts
Credit card,
Salary,
Income tax data
University Admissions, marks/grades.
Land records,
Licenses
Medical Records
CIA
It protects data from unauthorized users from altering and deleting data.
It protects data from hacking by implementing Security mechanisms.
It allows users to access only that data what is required by enabling necessary access
permissions.
It implements encryption, decryption, firewalls, antivirus software , database backups,
physical and logical security on the database.
PROBLEMS IN DATABASE SECURITY
People
Natural disasters
Malicious code
Technological Disaster
PROBLEMS IN DATABASE SECURITY
1.People: People intentionally or unintentionally inflict damage, violation ,or destruction to all or
violation ,or destruction to all or any of the database environment components (people, applications,
networks, operating systems, database management systems, data files or data)
Example:Employees,Contractors,Consultants,Visitors,Hackers,Terrorists
2.Malicious Code: Software code that in most cases is intentionally written to damage or violate one
or more of the database environment components . Example: Viruses, Boot Sector viruses, Worms,
Trojan horses, Bugs.
3.Natural disaster: Calamities caused by nature, which can destroy any or all of the database
environment components. Example: Hurricanes, Tornados, Earthquakes, Flood, Fire
Technological disasters: Often caused by some sort of malfunction in equipment or hardware,
technological disasters can inflict damage to networks, operating systems, database management
systems, datafiles or data.
Example:Power failure,Media failure,Hardware failure,Network failure
DATABASE PROTECTION
REQUIREMENTS:
Protection from unauthorized access.
Protection from Inference.
Integrity of database.
User Authentication.
Management and Protection of Sensitive data.
DATABASE PROTECTION
REQUIREMENTS:
1. Protection from unauthorized access: It protects the data from being accessed by the
unauthorized users. The requirement which has been sent by user or applications to access
database or files should be verified by database management system. It should check
whether the user is authorized or not. However, the access control for database is quite
difficult than to control the files, since the control in database is to be applied to each and
every attribute and value of the database.
2. Protection from Inference. Inference refers to the protection of data from a type of
threat where in an unauthorized user tries to extract or retrieve the confidential information
from non-confidential data. Here, the hacker usually targets the statistical databases and
hence precautions should be taken to protect each entity right from statistical aggregated
information in order to prevent the statical database from such threats.
DATABASE PROTECTION
REQUIREMENTS:
3.Integrity of Database: It refers to the protection of database from unauthorized access.
The threats can be either in the form of errors, virus, failures in the system or modification
of contents present in data. However, protection for database is provided by database
management system, backup and recovery procedures and adhoc security procedures.
Backup and recovery procedures preserve the consistency of data using atomicity .That is,
the modifications performed on data are made permanent after the termination of
transaction, thus preserving its consistency. Whereas, the adhoc security procedure protects
the data from unauthorized modifications, insertions and deletions.
DATABASE PROTECTION
REQUIREMENTS:
4.User Authentication: It refers to the identification of the database users. This
requirement is used to enable on the authorized users to access the data.
5.Management and protection of Sensitive data: It protects the sensitive data from being
accessed by unauthorized users. Database consists of the type of data which can either be
sensitive, public or both. Thus, this requirement protects the contents of all types of data
from hackers.
Security Levels
Physical: The sites containing the computer systems must be secured against armed or
surreptitious entry by intruders.
Human: Users must be authorized carefully to reduce the chance of any such user giving
access to an intruder in exchange for a bribe or other favors .
Operating System: No matter how secure the database system is, weakness in operating
system security may serve as a means of unauthorized access to the database.
Network: Since almost all database systems allow remote access through terminals or
networks, software-level security within the network software is as important as physical
security, both on the Internet and in networks private to an enterprise.
Database System: Some database-system users may be authorized to access only a limited
portion of the database. Other users may be allowed to issue queries, but may be forbidden
to modify the data. It is responsibility of the database system to ensure that these
authorization restrictions are not violated.
Introduction to RDBMS
RDBMS stands for Relational Database Management System. RDBMS data is structured
in database tables, fields and records.
Each RDBMS table consists of database table rows. Each database table row consists of
one or more database table fields.
RDBMS store the data into collection of tables, which might be related by common fields
(database table columns).
RDBMS also provide relational operators to manipulate the data stored into the database
tables.
Most RDBMS use SQL as database query language. The most popular RDBMS are MS
SQL Server, DB2, Oracle and MySQL
Introduction to RDBMS
The goal of a relational database design is to generate a set of relation schema that allows
us to store information without unnecessary redundancy and also to retrieve information
easily.
A database system is an integrated collection of related files, along with details of
interpretation of the data contained therein. DBMS is a s/w system that allows access to
data contained in a database.
Introduction to RDBMS
Fill in the blanks