DBMS - Bba Unit 4
DBMS - Bba Unit 4
of India,
Affiliated to Maharishi Dayanand University
BACHELOR OF BUSINESS
ADMINISTRATION
COURSE FILE
DATABASE MANAGEMENT SYSTEM
BBA-405
Database security
Security Threats
A threat is any situation, event or person that will adversely affect the
database security and smooth functioning of the organization.
Types of threats
Data Tampering
Data Theft
Falsifying user’s Identities
Password related threats
Unauthorized access to data
Data security requirements
Data is most important part of an organization so we need to secure it from
varioustypes of threats. So the appropriate technologies are used to resolve
these security issues.
1. Confidentiality
Plaintext: original message or data that is fed into the algorithm as input.
Types of Encryption
Plaintext
Encryption algorithm
Public key and private key: Each user has two keys.
o Public Key: used to encrypt data, but cannot be used to decrypt data.
o Private key: Key known only to individual user, and used to
decryptdata.
Cipher text
Decryption Algorithm
Was developed by Ron Rivest Adi Shamir and Len Adleman in 1977.
It is based on the hardness of factoring a very large number (100’s of
digits)into its prime components.
Disadvantages of encryption
FIREWALL
Firewall can help the user in protecting the data and computer by blocking:
Packet filtering: These firewall works at the network layer of the OSI
model. It compares each packet with a set of criteria before forwarding
them. The firewall can drop the packet, forward it tom the network or
send itto the originator, depending on the outcome of the comparison of
the packet and the criteria.
Circuit level gateways: These firewall works at the session layer of the
OSI model. They monitor the TCP handshaking between packets to
determine whether a requested session is legal.
Application level gateways: These firewall works at the application
level of the OSI model. The packets cannot access services for which
there i9is no proxy. These can also use to log user activities and logins
Stateful multilayer inspection firewall: This firewall is a combination
of all the previous firewalls. They filter packets at the network layer,
determinewhether session packets are legal and evaluate the contents of
packets at the application layer.
Database Recovery
System crash
Disk failure
Logical errors
Natural and physical disaster
Recovery Techniques
CHECKPOINTS
DISTRIBUTED DATABASES
A distributed database is a single logical database that is spread physically
across computers in multiple locations that are connected by data
communication links. A distributed database is a collection of multiple
interconnected databases, which are spread physically across various
locations that communicate via a computer network.
Features
Databases in the collection are logically interrelated with each other.
Oftenthey represent a single logical database.
Data is physically stored across multiple sites. Data in each site
can bemanaged by a DBMS independent of the other sites.
The processors in the sites are connected via a network. They do not
haveany multiprocessor configuration.
A distributed database is not a loosely connected file system.
A distributed database incorporates transaction processing, but it is
notsynonymous with a transaction processing system.
Distributed Database Management System(DDBMS)
The software that manages the distributed database and provides an access
mechanism that makes this distribution transparent to the user is called
DDBMS.
Features
DDBMS Components
1. Computer Workstation
2. Network hardware and software
3. Communication media
4. Transaction processor
5. Data manager
Disadvantages of DDBMS:
Architectural complexity
Lack of standard
Data integrity problem
Security problems
Cost
Data design more complex
1. Homogeneous DDBMS: all use the same DDBMS software and have the
same application on each node (or site). They have a common schema.
In a homogeneous database, all different sites store database identically.
The operating system, database management system and the data
structures used
– all are same at all sites. Hence, they’re easy to manage.
Application of DDBMS:
1. Airlines
2. Corporate MIS (management information system)
3. Hotel Chains
4. Manufacturing
5. Military command and control
6. Any organization which has a decentralized organization structure.