Security in Database Management System

แชร์
ฝัง
  • เผยแพร่เมื่อ 6 เม.ย. 2020
  • This video is about the security issues in database. A database is a collection of data and a set of rules that organize the data by specifying certain relationships among the data. The user describes a logical format for the data. The precise physical format of the file is of no concern to the user. A database administrator is a person who defines the rules that organize the data and also controls who should have access to what parts of the data. The user interacts with the database through a program called a database management system (DBMS), informally known as a front end. The name of each column is called an attribute. A relation is a set of columns. User interacts with database managers through commands to the DBMS that retrieve, modify, add or delete fields and records of the database. A command is called a query. Example: Select * from employee where firstname = ‘Williams’ The result of executing a query is a subschema. Components of Database. Record - contain one related group of data.
    Each record contains fields or elements The logical structure of a database is called a schema. A particular user may have access to only part of the database, called a sub-schema. Advantages of using Databases. Shared access - users use one common, centralized set of data. Minimal Redundancy - users do not have to collect and maintain their own set of data. Data consistency - change to a data value affects all users of the data value. Data integrity - data values are protected against accidental or malicious undesirable changes. Controlled access - only authorized users are allowed to view or to modify data values. Security Requirements of Database Systems. Physical Database Integrity - The data of a database are immune to physical problems such as power failures and someone can reconstruct the database if it is destroyed through a catastrophe. Logical Database Integrity - The structure of the database is preserved. With logical integrity of a database, a modification to the value of one field does not affect other fields. Element Integrity - The data contained in each element are accurate. Auditability - It is possible to track who or what has accessed (or modified) the elements in the database. User Authentication - Every user is positively identified, both for audit trail and for permission to access certain data. Availability - User can access the database in general and all the data for which they are authorized. Access Control - A user is allowed to access only authorized data and different users can be restricted to different modes of access (read / write).
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น •