0% found this document useful (0 votes)
65 views4 pages

Complete Database Backup and Recovery LO1

The document discusses database architecture and risks of database failure. It defines the physical and logical structures of a database including pages, extents, files, and file groups. It identifies security risks like unauthorized access and data corruption. Database failures can occur due to system crashes, hardware issues, user errors, or network problems. Regular backups are needed to protect the database from failure and enable recovery.

Uploaded by

edris
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
65 views4 pages

Complete Database Backup and Recovery LO1

The document discusses database architecture and risks of database failure. It defines the physical and logical structures of a database including pages, extents, files, and file groups. It identifies security risks like unauthorized access and data corruption. Database failures can occur due to system crashes, hardware issues, user errors, or network problems. Regular backups are needed to protect the database from failure and enable recovery.

Uploaded by

edris
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Information sheet UC:- Complete Database Backup and Recovery 2023

Harambee University

TVET CURRICULUM
WEB DEVELOPMENT AND DATABASE
ADMINISTRATION
LEVEL – III
Occupational Standard (OS)
Unit of Competence: Complete Database Backup and Recovery
Module Title: Completing Database Backup and Recovery
Learning outcomes:
LO#1 Review Database Architecture

1 Complied By Ayele T WD & DBA Level III


Information sheet UC:- Complete Database Backup and Recovery 2023

1.1. Identifying architecture of a database file system

Physical structure of database

Physical Architecture Logical Architecture


 Tells about how the data is actually - Tells about how the data is logically grouped
Stored in file system of an operating system. And presented to the User.
 Page, extent, database files, transaction - Tables, Constraints, views, stored
procedures,
Log files etc. are core component of functions, triggers etc. are core components
Physical architecture. Of logical architecture.

 Components of database architecture include.


- Page - Database file
- Extent - Database file group
- Table - Transaction log file
- Index
i. Page is smallest unit of storage is SQL server.
ii. An Extent consists of 8 adjacent pages.
iii. An Index is a set of one or more keys which is used to speed up
access to data in a table. It is separate physical data structure that
enables queries to access one or more data rows fast.
iv. Database file- SQL server uses three types of files to map a database
to file system of operating system.
1. Primary Data file- it is the starting point of the database and points to
the other files in the database. Every database has one primary data
file.
2. Secondary Data file- is any data file other than primary data file. A
database may or may not have secondary data files.
3. Log file- is holding all the log information that is used to recover the
database. There must be at least one log file for each database.
v. Database file group- database files can be grouped into file groups for
allocation and administration purposes.
File groups can be two types:
Primary- it contains primary data files and pages of system tables.
User – defined – these are created by database users.

2 Complied By Ayele T WD & DBA Level III


Information sheet UC:- Complete Database Backup and Recovery 2023

vi. Transaction log file- Database engine uses transaction logs to maintain
integrity of database and for data recovery. Transaction log file consists
of log records of operations performed and are stored sequentially.
Following types of operations are logged

A. The start and End of each transaction- Every data modification


(insert, update, or delete) by system stored procedures or data definition
language (DDL) statements to any table, including system tables.
B. The logical operation performed- the before and after images of the
modified data.

1.2. Identifying risks and failure scenarios

Database security concerns the use of a broad range of information security


controls to protect against compromises of their confidentiality (secrecy or
privacy), integrity/reliability and availability (ease of use).

It involves various types or categories of controls, such as technical,


procedural/administrative and physical control.

Security risks to database systems including:

 Unauthorized or unintended activity or misuse (use wrongly) by authorized


database users, database administrators or network/system managers, or
by unauthorized user or hackers.
Example: Inappropriate access to sensitive data, metadata or functions
within databases, or inappropriate changes to the database programs,
structures or security configurations.
 Malware infection causing incidents such as unauthorized access, damage
to the data or programs.
 Physical damage to database servers caused by computer room fires or
floods, overheating, lightning, electronic breakdowns/equipment failures.
 Data corruption and/or loss caused by the entry of invalid data or
commands, mistakes, in database or system administration processes,
sabotage/criminal damage etc.

Types of information security control appropriate to database include:

Access control Encryption


Auditing Integrity controls
Authentication Backups

3 Complied By Ayele T WD & DBA Level III


Information sheet UC:- Complete Database Backup and Recovery 2023

Database Failures can be due to:


 System crashes, resulting in loss of main memory
 Application software errors.
 Natural physical disasters.
 Carelessness or unintentional destruction of data or facilities.
 Statement failure: e.g.- when a program attempts to enter invalid
data into a database table.
 User process failure: e.g. - a user process may be terminated
suddenly or unexpectedly
 Network failure: e.g. - the network interface card or the network
connection has failed
 Instance failure
 Hardware failure
 A power failure
 An emergency shutdown procedure
 User Error
 Accidentally dropping a table.
 Wrongly modify or delete data form a table.
 Media failures
 Lose a disk or a disk controller fails or a head crash
 File corruption
 The overwriting or deletion of a data file

4 Complied By Ayele T WD & DBA Level III

You might also like