Advance DBMS
Advance DBMS
There are several architectures for parallel databases, and they can be broadly categorized
into the following types:
Shared-Nothing Architecture:
In this architecture, each processor or node has its own dedicated memory and storage.
Data is partitioned across nodes, and each node independently processes its subset of
data. Communication between nodes is required for queries that involve multiple
partitions.
Shared-Disk Architecture:
Shared-Memory Architecture:
Hybrid Architectures:
Client-Server Architecture:
DAC is a security model that grants or restricts access to resources based on the
discretion of the resource owner or administrator.
Access permissions are assigned to individual users or groups at the discretion of the data
owner.
Access Permissions:
Users have discretion over who can access their resources and what level of access is
granted.
Access permissions typically include read, write, execute, and delete privileges, among
others.
DAC is often implemented through Access Control Lists (ACLs) associated with each
resource.
ACLs list the users or groups allowed access and the specific actions they are permitted to
perform.
The resource owner (or administrator) has the authority to modify access permissions for
their resources.
This allows for flexibility in managing access based on changing requirements or security
considerations.
Granular Control:
DAC provides granular control over access at the level of individual files, folders, or
other resources.
This fine-grained control allows for customization of access rights to meet the specific
needs of different users or groups.
4. DOD Security Levels:
The Department of Defense (DOD) uses a system of security levels to classify information
and protect it according to its sensitivity.
The DOD security levels are part of the Information Assurance Workforce Improvement
Program (8570.01-M) and are classified into three levels:
a) Unclassified:
This level includes information that does not require protection against unauthorized
disclosure.
Although it is not classified, unclassified information may still have certain handling and
dissemination restrictions.
b) Classified:
Classified information is further divided into three levels based on sensitivity: Confidential,
Secret, and Top Secret.
Individuals with the appropriate security clearance are granted access to classified
information based on the level of classification.
Secret: Information that could cause serious damage to national security if disclosed.
Top Secret: Information that could cause exceptionally grave damage to national security if
disclosed.
This is an additional level that involves highly classified information beyond Top Secret.
Access to SAP information is restricted to individuals with a specific need-to-know, and even
those with a Top Secret clearance may not automatically have access.
5. POSTGRES:
PostgreSQL is a powerful, open-source relational database management system (RDBMS)
known for its advanced features, extensibility, and compliance with SQL standards.