Block 0002
Block 0002
~~o~~ MSEI-023
~ UNIVERSITY CYBER SECURITY
Indira Gandhi National Open University
School of Vocational Education and Training
Database Security 2
11m1T lfACf ~ ~ ~ ~ CfiUft %~ 3lf\jf
~ wr it m ~ MlCfi€h41 ctT· ~ ctiT 3mlR cqr
% I~ ~ 3Rf CfiI(On ~ ~ \iflftr ~ cmmr
f4~I1€1larr ~ ~ ~ Slt ~.~ ~ ~ ~
"3Offit % I"
- Indlra Gandhi
MSEI-023
~ v
:~ignOU THE PEOPLE'S
UNIVERSITY
Cyber Security
Indira Gandhi National Open University
School of Vocational Education and Training
Block
2
DATABASE SECURITY
UNIT 1
UNIT 3
Database Security - I 55
UNIT 4
Database Security - 11 65
I
Programme Expert/Design Committee of Post Graduate
Diploma in Information Security (PGDIS)
Prof. K.R. Srivathsan Mr. Anup Girdhar, CEO, Sedulity Solutions &
Pro Vice-Chancellor, IGNOU Technologies, New Delhi
Mr. B.J. Srinath, Sr. Director & Scientist Prof. A.K. Saini, Professor. University School
'G' ,CERT-In, Department of Information of Management Studies, Guru Gobind Singh
Technology, Ministry of Communication and Indraprastha University, Delhi
Information Technology, Govt of India
Mr. C.S. Rao, Technical Director in Cyber
Mr. A.S.A Krishnan, Director, Department of Security Division, National Informatics Centre
Information Technology, Cyber-Laws and E- Ministry of Communication and Information
Security Group, Ministry of Communication and Technology
Information Technology, Govt of India
Prof. C.G Naidu, Director, School of Vocational
Mr. S. Balasubramony, Dy. Superintendent of Education & Training, IGNOU
Police, CBI, Cyber Crime Investigation Cell
Prof. Manohar Lal, Director, School of Computer
Delhi
and Information Science, IGNOU
Mr. B.V.C. Rao, Technical Director, National
Prof. K. Subramanian, Director, ACIIL, IGNOU
Informatics Centre, Ministry of Communication
Former Deputy Director General, National
and Information Technology
Informatics Centre, Ministry of Communication
Prof. M.N. Doja, Professor, Department of and Information Technology, Govt of India
Computer Engineering, Jamia Milia Islamia
Prof. K. Elurnalai , Director, School of Law
New Delhi
IGNOU
Dr. D.K. Lobiyal, Associate Professor, School
Dr. A. Murali M Rao, Joint Director, Computer
of Computer and Systems Sciences, JNU
Division, IGNOU
New Delhi
Mr. P.V. Suresh, Sr. Assistant Professor
Mr. Omveer Singh, Scientist, CERT-In
School of Computer and Information Science
Department of Information Technology, Cyber-
IGNOU
Laws and Ev Secur ity Group, Ministry of
Communication and Information Technology Ms. Mansi Sharma, Assistant Professor, School
Govt of India of Law, IGNOU
Block Preparation
Unit Writer Block Editors Proof Reading
Ms. Manka Vasti Prof. K.R. Srivathsan Ms. Urshla Kant
B.E (Computer Science) Pro Vice-Chancellor Assistant Professor
University of Pune IGNOU School of Vocational
Faculty Associate (IT) Ms. Urshla Kant Education & Training
Institute of Apparel Assistant Professor, School IGNOU
Management, Gurgaon of Vocational Education &
(Unit I, 2, 3 & 4) Training, IGNOU
Production
Mr. B. Natrajan Mr. Jitender Sethi Mr. Hemant Parida
Dy. Registrar (Pub.) Asstt. Registrar (Pub.) Proof Reader
MPDD, IGNOU, New Delhi MPDD, IGNOU, New Delhi MPDD, IGNOU, New Delhi
August, 2011
© lndira Gandhi National Open University, 2011
ISBN: 978-81-266-5616-5
All rights reserved. No part of this work may be reproduced in any form, by mimeograph or any
other means, without permission in writing from the lndira Gandhi National Open University.
Further information about the School of Vocational Education and Training and the lndira Gandhi
National Open University courses may be obtained from the University's office at Maidan Garhi,
New Delhi-l10068. or the website of IGNOU www.ignou.ac.in
Printed and published on behalf of the Indira Gandhi National Open University, New Delhi, by
the Registrar, MPDD
Laser typeset by Mctronics Printographics, 27/3 Ward No. I, Opp. Mother Dairy, Mehrauli,
New Delhi-30 .
Printed by : A-One Offset Printers, 5/34, Kirti Nagar indl. Area, New Delhi-l 100 15
BLOCK INTRODUCTION
Database security is a growing concern nowadays evidenced by an increase in
the number of reported incidents of loss of or unauthorized exposure to sensitive
data. As the amount of data collected, retained and shared electronically expands,
so does the need to understand database security. The Defense Information Systems
Agency of the US Department of Defense (2004), in its Database Security Technical
Implementation Guide, states that database security should provide controlled,
protected access to the contents of a database as well as preserve the integrity,
consistency, and overall quality of the data. It is very important to develop an
understanding of the issues and challenges related to database security and must
be able to identify possible solutions. This block comprises of four units and is
designed in the following way;
The Unit one deals with the introduction to database concepts, database
management system, relational database management system. The concepts of
Relational Algebra were undertaken. This unit also explains about the advantages
of databases and Relational database management system. The E- R Model is also
covered to explain about the entities, their properties and their relationships with
other entities. The concept of database abstraction is also explained for the
knowledge of the reader.
The Unit two describes the hands-on experience on the database. It starts with the
concepts of oracle architecture. The methods to open oracle and SQL *PLUS which
is the command line interpreter. It handles different types of queries that can be
handled on Oracle database. It gives information about all the commands that are
most commonly used in Oracle Sql database. The different types of hacking attempts
are also a raised issue. It also talks about data dictionary and database objects that
exist in the database.
The Unit three covers about distributed databases, their advantages and
disadvantages, distributed database design. The concept of centralised databases
is also highlighted. How distributed databases are advantageous over centralised
database is mentioned too. Overall it is a unit that covers security to the database
by considering the two mechanisms of storing data.
Unit four explains database transaction, its definition, database concurrency- a
problem and its solution. There are some properties called ACID properties that
need to be adhered to by the transactions. Various database concurrency control
measures were mentioned for the database to function properly. Different operations
and states of the transaction were also mentioned and the various security measures
to be taken to prevent database from failure.
Hope you benefit from this block.
ACKNOWLEDGEMENT
The material we have used is purely for educational purposes. Every effort has
been made to trace the copyright holders of material reproduced in this book.
Should any infringement have occurred, the publishers and editors apologize and
will be pleased to make the necessary corrections in future editions of this book.
-
Introduction to
UNIT 1 INTRODUCTION TO Database Concepts
DATABASE CONCEPTS
Structure
1.0 Introduction
l.1 Objectives
1.2 Advantages of Database
1.3 Traditional File Oriented Approach
1.4 Database Abstraction
1.5 Relational Database Management System (RDBMS)
1.5.1 Some Important Terminologies
1.5.2 Types of Keys .
1.5.3 Referential Integrity
1.7 ER Model
1.8 Let Us Sum Up
1.9 Check Your Progress: The Key
1.0 INTRODUCTION
A database is structured collection of data. It contains information about enterprise
which is actually useful for the decision making processes by the officials of the
organization. The day to day examples of databases include telephone directories,
catalogues, forms etc. However, a computerized database is a repository of data
stored electronically. It is a collection of related information stored sQ that it is
available to many users for different purposes. The organization of data in a database
system is done by Database Management System (DBMS). One of the most
powerful types of the database is the 'relational' model and programs which use
this model are known as relational database management systems (RDBMS).
1.1 OBJECTIVES
After studying this unit, you should be able to:
I
Database Security • advantages of using databases;
As mentioned in the example above, since all departments will then have the
latest copy of the data, no inconsistency will exist.
c) Data sharing
It facilitates sharing of data amongst several users.
d) Data Security
It enforces security to the data by giving it protection from accidental loss,
inaccessibility to unauthorized users, access only through username and
password etc.
e) Data Integrity
f) Enforces Standards
It ensures that all the data follow the standards laid by the organization using
the database or otherwise. This helps in data migration or interchange between
platforms.
a) The data redundancy is high. i.e. the data is stored in multiple copies as are
the number of modules requiring the data.
b) Any change in the field of the data in the master file requires changes in the
programs too.
c) There is lack of flexibility as the program and its data are tightly coupled.
e) Data integrity can be made applicable only through programming code and
not in the file itself.
f) Transactions such as Insert / Update / Delete are not possible through directly .
•
~ ~
logical level
Physical level
Fig. 1
7
I
Database Security Various Levels of Database Implementation
a) Physical Level: It is the lowest / internal level that concerns with the storage
of database on the physical storage medium.
b) Logical Level: It is also called as the conceptual level which concerns what
data is stored in the database. It basically deals with different data structures
and their relations and association between them.
c) External Level: At this level, the end users of the system are present. This
levels concerns with the way in which data is viewed by the end users.
A relation is a table i.e. data arranged in the form of rows and columns. In a
relation, within each column the set of values are similar and atomic
(indivisible). Each row is distinct, i.e. no two rows are totally identical in
terms of data values.
b) Domain
The set of values from which the values in each column are drawn. Eg. in an
employee table the columns salary is numerical, name is alphabetic, address
is alphanumerical, employee number can be given only odd values between 1
and lOO etc.
c) Tuple
The row of the table is called as tuple (pronounced as tupple). It is also called
as record of the table. It is actually the horizontal collection of all the data
values of the relation
d) Attribute
The column of the table is called as attribute of the table. It is also called as
the field of the column.
e) Degree
The total number of attributes of the table is the degree of the relation
f) Cardinality
The total number of columns in the table consititute the cardinality of the
relation.
Consider the following relation named STUDENT and relate the above concepts
with it.
8
Table 1: Student Introduction to
Database Concepts
STUDENT NO. NAME PHYSICS CHEMISTRY BIOLOGY MATHS ENGLISH
IAM-1l12-0001 TANYASINHA 50 67 76 80 67
IAM-1l12-001O AMRITKAUR 73 85 70 95 70
It is the attribute(s) that uniquely distinguishes each row in the table i.e. no
two values are same in that column. Each relation must have a primary key.
Eg. Supplier#, Buyer# are the primary keys in Supplier and Buyer table
respectively.
Table 2: Supplier
Supplier # Supplier Name Product Name Qty-Ordered
Table 3: Buyer
Buyer # Buyer Name Product Name Qty-Ordered Supplier #
•
BUY-OOl ADIDAS GENTS T-SHIRTS 300 SUP-OOl
BUY-002 NIKE LADIES SPORTS WEAR 350 Sl!P-002
b) Foreign Key
It is used to relate two or more tables. It is a non key attribute whose value is
derived from the primary key of another table. Eg Supplier # is foreign key in
Buyer table and primary key in Supplier table.
c) Candidate Key
The attribute(s) that can serve as primary key attribute of the relation is called •
candidate key. Alternate key is a candidate key that is not serving as the primary
key for the relation. 9
I
Database Security Note: By joining the above two tables using Supplier# as the common column in
between them, Supplier Table becomes the Foreign table and Buyer is the Primary
or Master table.
The following are certain set of rules to abide by when referential integrity is
enforced:
• .No foreign key field can be assigned a value in the primary table if the
corresponding value doesn't exist in the primary key field of the foreign table.
However, Null can be entered to show no relation between records of two
tables.
• No record can be deleted from the primary table if the related record exists in
the related table.
• No change in primary key field is allowed in the primary table if it has related
records.
Consider the following tables Emp and Dept and refer the points that follow:
Table 4: Emp
Table 5: Dept
20 RESEARCH DALLAS
30 SALES CHICAGO
40 OPERATIONS BOSTON
10
According to referential integrity set of rules are: Introduction to
Database Concepts
• No value of deptno can be added in the Emp table if the corresponding value
doesn't exist in dept table
• No value of deptno can be deleted from dept table if there exists related records
in Emp table
• The change in value in the deptno in dept table is not allowed if there exists
corresponding records in Emp table.
b) Compare your answers with the one given at the end of this Unit.
3) What is RDBMS?
4) Define:
a) Primary Key
b) Foreign Key
11
~.--::..:--
I
Database Security c) Alternate Key
d) Candidate Key
e) Referential Integrity
5) Create two tables Student personal details and Student Academic details and
relate them using a common field Stud_Id.
6) Consider the table given below and answer the questions given below:
d) Which attribute can serve as alternate key specifically for the set of values
12 given above in the relation?
Introduction to
1.6 RELATIONAL ALGEBRA Database Concepts
1.6.1 Select
• It selects rows /tuples / records from the relation based on some condition i.e.
only those rows are selected that satisfy a given condition.
• Eg o sal > 3000 in Table 4: Emp'will select only ON~ record as only employee
has salary more than 3000. Thus, the output will be
1.6.2 Project
• It selects columns/attributes from the relation
I
Database Security
Supplier # Supplier Name Product Name Qty-Ordered
And
BUY-OOl ADIDAS
BUY-002 NIKE
• Eg. In a lucky draw a set of people are nominated to travel Europe whereas
the other set of people are nominated to travel asia as given below:
Travel Europe
14
Travel Asia Introduction to
Database Concepts
The output will be:
• Two conditions that need to be taken care of before applying the Union
operator on the relations is - Both the tables should be with the same
degree and the domain for corresponding attributes of both the relations
must be same.
9001 ghi
First Draw
9944 def
2007 jkl
Second Draw
The set difference operation Travel Europe - Travel Asia will output:
9867 abc
9944 def
9001 ghi
Travel Europe
Lucky Draw No. Name
9867 abc
9944 def
2007 jkl
Travel Asia
• The set intersection operation Travel Europe - Travel Asia will output:
9867 abc
9944 def
1.6.7 Join
• This operation joins two or more relations based on one common column.
• It is represented by the join symbol (00)
• Consider the following two relations namely Emp and Dept:
Table 6: Emp
EMPNO ENAME JOB MGR HIREDATE SAL COMM DEPTNO
Xl RESEARGI DALLAS
:l) 'anCAGO
\
SALES
40 OPERATIONS BOSTON
On applying join operation on the two relations based on the attribute deptno, the
output produced will be:
EMPNO ENAME JOB MGR HIREDATE SAL COMM DEPT DEPT DNAME LOC
.NO NO
Here the two of the columns are named deptno (deptno. of emp and dept
respectively). This type of join where the combining of two tables is based on
equality condition is called as equijoin. On removing orie of the two repeated
columns converts this join to natural join as shown below:
EMPNO ENAME JOB MGR ,HIREDATE SAL COMM DEPTNO DNAME LOC
7654 MARTIN SALESMAN 7698 28-SEP-81 1250 1400 .30 SALES CHICAGO
I
Database Security
1.7 ERMODEL
The ER Model stands for Entity Relationship Model which is based on the concept
of real world comprising of entities and their relationships. It was brought as a
, concept by P.P. Chen. It is a high level, conceptual model that circulates around
entitites and their relationships.
a) Entity
It is an object that has a name and that exists with some of its properties. It is
t
denoted y a rectangle.
Eg.
I_S_T_U_D_E_N_T
__ I 1 BOOK
b) Entity Set/Type
c) Entity Instance
d) Types of entities
Some entities are dependent while others are independent. The dependent entity
depends on the other entity for its existence. It is also called as weak entities.
The independent doesn't depend upon any entity for its existence. They are
also termed as strong or regular entities.
e) Relationships
Eg:
IL..._S_T_U_D_E_N_T---~<S>>-----I-B-O-O-K-----
f) Types of relationships
i) One to One
I_ST_U_D_E_N_T ----<0>----I'--BO_O_K_, _
18
III Many to Many Introduction to
Database Concepts
There exist many to many relationships between entities X and Y.
g) Attributes
It represents the property of an entity. Eg for the entity student the attributes
are Student Roll No, Student Name, Address, Marks etc. It is represented by
an oval.
Name
STUDENT
Address ~_rks ~
3) Take two table such as Student and Marks and perform the following
operations:
a) Select operation
019
I
Database Security b) Product operation
........................................................................................................................
c) Cartesian Product
d) Join
..
by other departments as well. Thus, it reduces redundancy or duplication Introduction to
of unnecessary data which exists otherwise when the work is done Database Concepts .
manually .
vi) Enforces Standards: It ensures that all the data follow the standards laid
by the organization using the database or otherwise. This helps in data
migration or interchange between platforms.
3) RDBMS- In this type of Data Model, the data is represented in the form of
tables i.e. rows and columns. These tables are called as relations. Each row in
the table is collection of data values which represents some relation among
the set of values.
c) Alternate key is a candidate key that is not serving as the primary key
for the relation.
d) Candidate Key: The attribute(s) that can serve as primary key attribute
of the relation is called candidate key.
Integrity is enforced
• No foreign key field can be assigned a value in the primary table if the
corresponding value doesn't exist in the primary key field of the foreign
table. However, Null can be entered to show no relation between records
of two tables.
• No record can be deleted from the primary table if the related record
exists in the related table.
The above two tables are related usinf Stud_Id as the primary key to Student
Personal Details and Foreign key to Student Academic details.
6) a) EmpNo
b) 8
c) 14
d) Ename
1) In this type of Data Model, the data is represented in the form of tables i.e.
rows and columns. These tables are called as relations. Each row in the table
is collection of data values which represents some relation among the set of
values. Thus, a table is a collection of such relationships. This data model .
was brought into picture by E.F.Codd, IBM and since then it is considered as
one revolution in the field of database technology. Most of the available
databases, such as Oracle, SQL etc. are based on Relation 'Data Model
technology
2) and 3) The relations in the database are the operands and the below mentioned
operations are performed on them.
a) Select
• Eg 13' sal> 3000 in Table 4: Emp will select only one record as only
employee has salary more than 3000. Thus, the output will be
b) Project
c) Cartesian Product
• It is a binary operation. i.e. it requires minimum of two operand
relations to perform Cartesian product. Consider the following two
relations namely Supplier and Buyer
And
BUY-ODl ADIDAS
BUY-002 NIKE
SUP-002 KIRTI EXPORT HOUSE LADIES SPORTS WEAR 350 BUY-OOI ADIDAS
SUP-002 KIRTI EXPORT HOUSE LADIES SPORTS WEAR 350 BUY-002 NIKE
I
Database Security
d) Union Operator
\
Travel Europe
Travel Asia
24
Hands-on Database
UNIT 2 HANDS-ON DATABASE Usage and Hacking Attempt
2.5 DDL
2.5.1 Data Integrity through Constratints
2.5.2 Create Table, Alter Table, Delete Table Command
2.5.3 Viewing Table Structure
/
2.6 DML
2.7 Hacking Attempt
2.8 Let Us Sum Up
2.9 Check Your Progress: The Key
25
I
Database Security Oracle Architecture
,
I
ORACLE INSTANCE I
ORACLE
DATA8ASE
2.1 OBJECTIVES
After studying this unit, you should be able-to:
•
..
understand oracle and Hands-on experience;
26
Database Security 2.2.2 Some Important Concepts
Object - An object is an identifiable entity which has characteristics and behavior.
In a database, objects refer to entitites that exist within the database such as
Relations, Views, Stored Procedures and Functions, Synonyms so on and so forth.
In Oracle database management system, the different database objects that exist in
the database are as follows:
a) Relation: a table that stores data in the form of rows and columns.
b) Views: it is a virtual table which selects data from one or more underlying
base tables, but can be queried as if it were one table.
d) Synonyms: These are generally alternate names given to the database objects.
e) Indexes: It is a database object which is used to keep track of rows and columns
of the table.
Upon creation of the database objects, the details are stored in Data Dictionary.
For any further modification in the definition of database objects, Data Dictionary
is consulted.
Data Dictionary gives the inside view and the structure of the Oracle database. It
contains information and details about database objects, their logical structure,
their relationships amongst themselves etc. The views of data dictionary are divided
into three general categories:
• User
• All
• DBA
• InsertlUpdatelDelete commands
28
• It provides commands to define or alter the database objects through Data Hands-on Database
Definition Language (DDL) Usage and Hacking Attempt
DATATYPE DESCRIPTION
29
I
Database Security 3) What is data dictionary?
..............................................................................................................................
Eg.
30
Table 2: Emp Table Hands-on Database
Usage and Hacking Attempt
Eg.
7369Sill" ••• %.
7"' IItLlIt 1... JI,
75%1'_ 1%51 JI
75jf·"..S %975 %.
76SJ1 ..-r.M'
76,. lUll
1%SI<
215.,
31<
JI
77.%CL_
rt •• scen 5_ 1.
2.1<
._ 11<
21
7."
7'-''-1
7r76_
Ill ••
11..
15.. ,.
21
"••_s
__
7•• ,_
95.
••Z.
7fM IIILUI i ••• 1.
>I
Eg.
- Single Line Comment - where the comment begins with two hyphens i.e. (._). It
will comment the part of the statement starting with - till the end of the statement.
- Multiline comments - Where the comment begins with/* and ends with *1. Any
part of the query can be commented using multiline comment.
Eg.
1tt'1fI 1*'"
"' .•"..,,"'
IIIIl(QQ"".tl
--- .....••.•...•........ - .,.-
,~" JftIt1i ,
nu IQft. ,
n%. "lllU t
•. f"'Ii ~.l~t'\t~
Note - To check for a NULL value, in the field, IS NULL clause is used
Eg:
--- .•------.-------..,
,~; Mt
UN,
. ''''
.~
~.4h"
.~
, ~\.~,
. '1f~S,ft.\'t!If;\~'\
*'
32 Fig. 7
Hands-on Database
2.3.4 Selecting ALL vs. DISTINCT Values from the Table Usage and Hacking Attempt
By default all values (including duplicastes) are selected from each column.
Eg:
is same as
To have distinct values i.e. to eliminate repeated values, add DISTINCT keyword
before the column name as shown below:
Eg.
COMM
1400
300
o
500
, ..•...•
,is-> _--
+ Oracle SQI '1'10"
Soo)ft:t - -
.
EIIp:a.,-
,
__ -
- _
IW;
'-- '. :- \ ' " . • r;]6 ~
Or
DESCRIBE tablename;
·>lfUlklfm_Hf/p
~'HH iHl61J
_
~ .,.............................
~!~~!~ __If, .
qI,'
• Uro1llr. ,Ill ~)IU!: "',.:... '" ;:.!\ .••. ~ ~ • h' ~ . ' • . \ '. .' • . • ~3[Q)~
-
>If r4I; w-m _ Hf/p
fllb' §UUf 11 • " "Mf§~" f"," ~1Hi/,
J
",
I"'f._~~_
*' §tHIlf §¥§~n fWIINIlIIitI
§¥§'~f(
1Ir.H/l,-1f
*"
~_f_fffilill_;
f!
fi-,M.-i .•
@{ft fMi\fII, ffMfl W, ~ .:fffll- ~ fHff 8flj
__ §jij,fiJ/iI,i.IIlM
-~:~::::= .::=:;;.:;::;:: .:;:::=;:;;:=:::::::::: =:::===:::.::.::=
ltH§IIm IN
/.,,_ ;Ht
ml:t ~~
iiifif
t_
_.JiIi
fM/!
i
tIN
ifN
"1._ U" it"
---,
HtII_ f§f
__
'l'ifiHIIIII ;!iN
HIlI
11 •• '"" •• ltttt ••
QL>
<COLUMNNAME>;
Eg.
SQL> SELECT EMPNO, ENAME, SAL FROM EMP ORDERBY SAL; REMEMBER
ARRAN6ING NAMES
OF STUDENTS LIST
1'It!dl_~"
QL) SELECT E•• IIO. EHAME. SAL FROH £ •• DRDIR IY SAL; ALPHABETICALLY IN
7,..
7369 SMITH
JAMES
7176 RDAMS " ••
.51
•••
1S11 •• ID 1251
76S1l HAITI M 1111
?tu MIWR U"
71" flllllEl is ••
n9t RlLlM 161.
7712 CLAIIII IllS'
" •• BLUE 2151
7566 JOIES t91S
QL>J
SQL> SELECT EMPNO, ENAME, HIRED ATE, DEPTNO FROM EMP WHERE
HIREDATE BETWEEN '09-JUN-81' AND '09-DEC-82';
Fii~!Ol~~flO\l
IIn Ultftl tMl'llll, (HllMI[,MIMtlMllt,tunll t1IlII4tll' _ MIIIU.Tt IEtllUII 'It-""Il' _ 'It-DEe-er';
tMl'MI tllAMl MI~EIMIlt DtPtMl
-=:.:=.:=.=:",,:=.:=. """:,,,,,,,,,,,,,==,,.,:=,,,,, _ .• ~." ••;••••. __ .•..•. -a..••..,.,
.•.•. _'a .••~
•.
b) Pattern Matching operator: This is used for matching string patterns. This
makes use of two wildcard characters such as Underscore C) and Percent
(%). Consider the following strings:
• Bat
• Cat
• Mat
• Pat etc.
36 All these strings have same no. and type of characters with the difference only in
the intial letter. Thus all the above given strings can be mentioned as '_at' . Hands-on Database
Therefore, only by changing the intial letter, all the above strings be produced. Usage and Hacking Attempt
Similarly, in SQL the following two operators are used to apply condition on
different strings with same or different patterns:
Eg:
SQL> SELECT EMPNO, ENAME FROM EMP WHERE ENAME LIKE ' _
_S';
c) List of Items (IN Operator): This operator catches a value specified in the list
of values. The values can be inserted randomly in the list. Consider the
following lists:
SYNTAX:
Eg:
Eg:
SQL> SELECT ~MPNO, ENAME , SAL, HIRED ATE FROM EMP WHERE
SAL >2000 AND HIREDATE BETWEEN '01-JAN-81' AND '31-DEC-81';
I'll
~ mt4t~ M\'IWII,_,
~
!iit. "~~ ~ NIl ~ iil"'" 61\1I "~~ M\_ 't\~jtll"" 61\1I '''''''''\A
tWIIIIE>!,:;'~~::::::'':o.~'''ilo.':i.~7;."~~:~'li.~
WMIt
~'O!."'L"''ll.'lL''o;.
•.
"" .'Mi"
~";'~~7i.'::i.:::'::;'
lm
"" '*"
Iltti
JlQ 11\._
"n
N'
~,
It""'"
,, 'tot,
••,
"" ,,11III ~'" It-..__ .• '
~It HIM ~'" ."'"~"
~I
a) Character Functions
b) Numeric Functions
a) Aggregate Functions
a) LOWER
• Parameter: Character , .
• Return Value : Character
b) UPPER
• Parameter: Character
c) CONCAT
• Eg:
SQL> SELECT EMPNO, CONCAT(ENAME, JOB) FROM EMP
WHERE SAL> 3000;
no &It __ "'"
> SELECTE_. _HE_ •.•• ) _ EW __ SaL > 3_:
d) INITCAP
• Parameter: Character
• Purpose: This function converts the string to one with initial capitalized
letter.
• Eg:
SQL> SELECT INITCAP (rohan chopra') "INITCAP" FROM DUAL;
AtEdts..ch.c,tiQn$_
> SELEC' ' ••• TCaP ( ••••••••••••••••• ) ., ••• , •••••• __ -.,
e) LPAD
• Eg:
SQL> SELECT LPAD(' 876547' ,10, '*') "CHEQUE AMT" FROM DUAL;
"'Wl_<II~"
Ill> SElUllP •• ('8"S_1'.1 •• '.') "C_1IIMi MU" f •••• OIIM.;
HEIIIMi_liT
••.•"S_7
f) RPAD
• Purpose: This function uses three parameters. It takes the first parameter,
fixes the width (i.e. no. of columns for the output) with n and pads the
right spaces with char2.
g) SUBSTR
• Purpose: This function uses three parameters. It extracts the string from a
string. It takes the first parameter as its main string, nl represents the
position number to start extracting the string and n2 represent the no. of
characters to be extracted.
• Eg:
•
I .t Or,]! le SQI "'Plus. ~@lrKI
Ht urn
[<lit ~ HolD
Ql> Sltl£Cl SUlnl ('PGSllIQH'.I,8) FRO" DUAL;
QL)
.• _---
'~~~S~~-!-u,------------------------------,-,,-.-----,------.-,---.,--i~-Jl-~-~
sanT _'Ill ("•• ITI•• ",-1,31)__ ;
Note: Negative value of nl starts the position from the right side of the string.
h) INSTR
• Eg:
SQL> SELECT INSTR (,PEPSICO COCO 'COLA','CO',7,3) FROM
DUAL;
.• _---
•• Orecte SQl-Vtus
m...Rf"'~fIIISlI:e'"
·~.·.-"~.1.31)
•
"",')r.II ••••..
"~'!o"."•• t
' .' , ' ~ ," ~~Irg}
.~ ,
i) LTRIM
• Purpose: This function truncates char2 from the left side of charl
• Eg:
SQL> SELECT LTRIM(,PEPSI', 'PEP') FROM DUAL;
~~ ..=":'-.--).-~.
• Orad.
IT
SIlL""lu, • __ " _, rn~,f8}
F~
• Purpose: This function truncates char2 from the right side of char1
k) LENGTH
• Syntax: Length(char)
• Parameter: Character
• Eg:
SQL> SELECT tENGTH('ROHAN CHOPRA') "LENGTH" FROM
DUAL;
Mo Wt lM<II ~ __
> mICt WIIllI('''''' c.tt') ""OIll1'"nw ••. ;
1.00ll1
'1
a) MOD
• Syntax: Mod(numberl, number2)
b) SIGN
• Syntax: Sign(number)
• Parameter: Numeric
c) POWER
• Syntax: Power(numberl, number2)
• Parameter: Numeric
e) ROUND
• Parameter: Numeric
• Eg.
SQL> SELECT AVG(SAL) FROM EMP;
•
,l Oracle SQI "PIu, r:JiBll8J
qb) Ub~Ql RVI\8Rbl ~MOH ~Mlli .•.
RVft\8Rbl
m.I111l'
qb)
b) COUNT
• Parameter: Numeric
c) MAX
• Parameter: Numeric
44
•
• Return Value : Numeric Hands-on Database
Usage and Hacking Attempt
• Purpose: This function returns the maximum values from a group of
values
d) MIN
• Parameter: Numeric
• Purpose : This function returns the minimum values from a group of values
e) SUM
• Parameter: Numeric
l'Ie£dltSeardlOl>tt<>nS"'"
SQL) SELECT SUH( SAL) FRO" EHP;
SU"(SAL)
29125
SQD I
EdltSeardoOl>tt<>nS"'"
D SElECT JOB, COUNT(-) FRO" EHP GROUr BY JOB;
COUNT(-)
LVST 2
ER. .••
IlAGER 3
£SID£"" 1
L£SIIA" .••
DI
DEP'" CGUIIT(-)
I
Database Security Placing condition on Group By - use of Having clause
Eg:
•••••• _0pti0nsHe\?
QL> SELECT JOB, COUHT(.) FROH E•• GROUPBY JOB HAUING COUHT(.)<-3;
COUHT(·)
2
a
1
2.5 DDL
This stands for Data Definition Language. It is this language that decides upon the
database schema. The creation/alteration/deletion of all database objects is done
by Data Definition Language. This is also used to apply some constraints on the
fields of the table so as to maintain the data integrity.
Syntax:
ROLL_NO NUMBER(3),
NAME VARCHAR2(20),
MARKS NUMBER(5,2),
GRADE CHAR(l»;
.ble created.
QL>
QL> DESC STUDEHT;
--
Ho •• ""111 Tpp.
ROLL HO HUHBER(')
U"CHI12(2')
MRKS HUHlER(5,2)
GRADE CHII(1)
QL)
NAME VARCHAR2(20),
MARKS NUMBER(5,2),
GRADE CHAR(l»;
.•.E.• S-ch_....,
QL> CREATE TABLE STUDENT (
2 ROLL III HUMBER (a) PR I MAR? KEY,
a HAIIE-UARCHAR2(21),
_ HARKS HUMBER(5,2),
5 GRADE CHAR(1»;
able crl!'attd .
•
QL> DESC STUDEHT
Ha"" Hull? TIIP.
QL> I
b) Default: This is used to supply default values to the column in case no value
is supplied by the user.
ROLL_NO NUMBER(3),
NAME VARCHAR2(20),
MARKS NUMBER(5,2),
c) Check:
d) Foreign Key:
This checks whether the relationships between the related tables exists properly.
DESC[RIBE] TABLENAME;
47
Database Security
2.6 DML
This stands for Data Manipulation Language. It is used to INSERTIUPDATEI
DELETE the rows of data in the database.
InsertlUpdatelDelete commands
Syntax:
e) Update command
Syntax:
f) Delete Command
Syntax:
In the present business industry' scenario, the major concern is about database
hacking. The main question that comes in mind of most people is whether or not
to give their employees the role of protecting sensitive corporate data. Recent
studies have indicated that 80% of the security breach of data mainly involves
employees, insiders or those having internal access to the organization, which puts
the information at risk. The main challenge that most companies face today is to
maintain a proper balance between protecting sensitive information as much as
possible and providing appropriate access to their workers, in addition to prevention
of hacking. This is mainly because internet and e-mail have made the distribution
and sharing of information relatively easier than ever.
Database Vulnerabilities
Disclosing Vulnerabilities
Technique used to disclose the vulnerabilities is a debatable topic in the community
of computer security. Few of the people urge that complete disclosure of the vital
information related to vulnerabilities, subsequent to the discovery is the problem.
Whereas, few people argue that restricting disclosure to users pose great risk, the
complete details are only issued after a delay sometimes. The time given owing to
the delay permits the notified ones to mend the problem via developing as well as
applying patches. This will in fact, heighten the risk for people, who are not secluded
to complete details. From the point of view of the security, it is very essential to
do free as well as public disclosure, in order to make certain that all parties
interested are served with the appropriate information. To provide security by the
means of obscurity is regarded by the experts as a concept which is most unreliable.
The concept needs to be impartial so as to allow reasonable distribution of security
important information. Very often, it is regarded that a channei which is extensively
49
Database Security accepted as a source of securing information in industry circles is the most trusted
channel. For instance: SecurityFocus and FrSIRT.
Numerous software tools survive, which can help in uncovering the vulnerabilities
of the computer systems. Although, such tools can help the auditor in getting a
proper summary of the potential vulnerabilities exhibiting, they simply cannot
substitute the human discernment. By relying completely on the scanners can output
sham positives and also, a restricted overview of problem persisting in the computer
system. The vulnerabilities are discovered in majority of the operating system such
. as Mac OS, Windows, few forms of Linux and UNIX. One way by ,which, the
vulnerability occurrence can be reduced is through constant vigilance. Few instances
of vulnerabilities are: symlink races, stack smashing as well as buffer overflows,
validation error of input as such SQL injection, directory traversal. Session
Hijacking as well as distant Code Execution are also examples of vulnerabilities.
b) Compare your answer with the one given at the end of this Unit.
1) Consider the following table Teacher and create SQL queries for the points
that follow:
Table: Teacher
Teacher_No T_Name Age Department HireD ate Salary Gender
28 INFORMATION
IIT-DEL-0007 KAUSTUBH 23-MAR-2009 29000 MALE
TECHNOLOGY
IIT-DEL-0009
IIT-DEL-OOIO
MONIKA SHARMA
AVINASH SINGHAL
41
47
ELECTRONICS
CIVIL
. 08-JUN-2011
17-DEC-201O
34750
50000
FEMALE
MALE
,
b) Display TeacherNo, Teacher Name, Salary of those teachers who are in
computer department.
50
c) Display all the information of Female teachers. Hands-on Database
Usage and Hacking Attempt
d) Display records of all the teachers with their Hiredate in ascending order.
e) Display list of all male teachers who belong to Civil and Mechanical
• departments.
f) Display names of only those teachers who have salary more than 30000.
h) Display Name, Salary and Bonus for all the teachers, if bonus is 20% of
the salary of the teacher.
51
Database Security j) Display all the names starting with letter S.
k) Display all the records of teachers having their names ending with A.
1) SQL stands for Structured Query Language. It has a proper structured syntax
which is used to query/insert/update the database.
It is a type of language which is responsible for creating and setting the database
schema consisting of relations, views, stored procedures, functions etc. Some
of the DDL Commands include:
• InsertlUpdatelDelete commands
Upon creation of the database objects, the details are stored in Data Dictionary.
For any further modification in the definition of database objects, Data
Dictionary is consulted.
52
I
Data Dictionary gives the inside view and the structure of the Oracle database. Hands-on Database
It contains information and details about database objects, their logical Usage and Hacking Attempt
structure, their relationships amongst themselves etc. The views of data
dictionary are divided into three general categories:
• User
• All
• DBA
4)
DATATYPE DESCRIPTION
d) Display records of all the teachers with their Hiredate in ascending order.
e) Display list of all male teachers who belong to Civil and Mechanical
departments.
f) Display names of only those teachers who have salary more than 30000.
h) Display Name, Salary and Bonus for all the teachers, if bonus is 20% of
the salary of the teacher.
k) Display all the records of teachers having their names ending with A. .
54
Database Security • I
UNIT 3 DATABASE SECURITY· I
Structure
3.0 Introduction
3.1 Objectives
3.2 Distributed Database Design
3.3 Advantages of Distributed Databases
3.4 Methodologies for Allocating Data
3.4.1 Data Fragmentation
3.4.2 Data Replication
3.5 Disadvantages of Distributed Databases
3.6 Centralized Database
3.7 Database Security -.Distributed vs. Centralized Database
3.8 Let Us Sum Up
3.9 Check Your Progress: The Key
3.0 INTRODUCTION
Distributed Databases
high rate. 'Ilhemac ines d<jn!thave a shared memory nor do they share a clock.
The processors ill the distributed system may vary from microcomputers to work
statien to mini 90mputers to computers used in day to day life. The distributed
database.ean be soown .as:
Site 1 Slt&2
,
L. OS2 -"
:1
,.... Co puler '\
l
..".
Ne ork i
CB1 ~
L...!
I Site 4
r Site 3
3.1 OBJECTIVES
After studying this unit, you should be able to:
c) Robustness: The entire system becomes more robust as multiple servers are
involved in handling data. Thus, failure of one system doesn't lead to failure
of entire system.
d) Availability: The data is replicated at multiple sites. In case the local server
is unavailable due to some reason, the data can be retrieved from the other
available server.
ii)
•
Vertical Fragmentation: In this type of fragmentation certain attributes (most
commonly used) of the relation can be stored at one location whereas other
attributes (less commonly used) can be stored at the other location.
iii) Mixed fragmentation: a procedure that follows a mix of the above two
techniques can be used to do so.
Duplicate Duplicate
Database Database
Central
Database
Duplicate Duplicate
Database Database
1P" ~ ,p- ~
~ ...-:}
~ A
Local Portion Local Portion
of Database of Database
-,-
r
~
~
~
• , ~
~ A
Local Portion Local Portion
of Database of Database
-
Remote Site 3 Remote Site 4
Fig. 3: No replication
b) The cost to ,rnanufacture such a system may turned out to be really high
Concept
It consists of one large system located at one site having several CPU's and the
devices controller are connected through a common bus to provide shared memory.
CPU and the device controllers can execute concurrently and share the same
memory unit. There are divided into two ways in which computers, are used:
On the other hand, multi user systems have more than one disk, more memory and
multiple CPU's and multi user operating system that can be used by large number
of people at the same time.
Benefits
• Ease of training (it's the same system for everything) - another benefit of
a centralized system is that the learning curve for users is greatly reduced.' If
all processes (membership, meetings, products, etc.) are in the same database, .
then users need only learn one system, not multiple systems.
Disadvantages
Although global views are effective at data suppression and to a lesser extent at
inference protection, their use can be computationally expensive. One of the key
problems with a relational distributed database is the computation required to
execute a complex query (particularly one with several JOINs, which join tables
and table
fragments that are stored at geographically separate locations). Since each view is
unique, a different query is necessary for each view. This additional overhead is
partially offset by query optimizers. Nonetheless, the addition of global views adds
computing time to a process that already takes too long.
b) Compare your answers with the one given at the end of this Unit.
•
2) Why do we need Distributed Database?
............................................. ,~ .
5) How is security achieved in Centralised system?
61
Database Security 6) Are security measures very tight and difficult to implement in distributed
databases?
.. .... ..~ .
3) It consists of one large system located at one site having several CPU's and
the devices controller are connected through a common bus to provide shared
memory. CPU and the device controllers can execute concurrently and share
the same memory unit. There are divided into two ways in which computers
are used:
• Sharing:
.
Data at multiple sites is shared by users at different sites.
S) No with all the measures in design, the security aspects become easy to handle.
7) Data Fragmentation
Data Replication
This includes storing same piece of data at more than one location. This can
be done using any of the following methods:
"i) Partial Replication: In this method, some fragments are stored at multiple
locations. This is usually done to make some critical data available to all
the users located at multiple sites.
ii) Full Replication: The entire database is replicated at multiple sites. This
is done to maintain the full backup of the system. But this may at times
lead to slow down of the processing.
64
r Database Security - 11
UNIT 4 DATABASE SECURITY - 11
Structure
4.0 Introduction
4.1 Objectives
4.2 Database Concurrence
4.2.1 Concurrency Control Mechanisms
4.0 INTRODUCTION
Many a times databases features failure and are not easily recoverable whereas
some of the databases are capable of fault tolerance. Transaction processing is one
of the really critically handled concepts
Database transaction refer to a unit a unit of work that must occur or fail III Its
entirety i.e. it should make some change in the database or it must roll back all
together. Thus, a transaction comprises a unit of work performed within a database
management system (or similar system) against a database and treated in a coherent
and reliable way independent of other transactions.
• .Atomicity - It is based on all or none concept i.e. either the effects of all or
none of its operations when a transaction is completed (committed or aborted
respectively). Thus, the transaction results in either done or never started.
4.1 OBJECTIVES
After studying this unit, you should be able to:
• Optimistic
Delay the checking of whether a transaction meets the isolation and other
integrity rules until its end, without blocking any of its (read, write) operations
and then abort a transaction to prevent the violation, if the desired rules are to
be violated upon its commit. An aborted transaction is immediately restarted
and re-executed, which incurs an obvious overhead. If not too many transactions
are aborted, then being optimistic is usually a good strategy.
• Pessimistic
• Semi-optimistic
Block operations in some situations, if they may cause violation of some rules
and do not block in other situations while delaying rules checking (if needed)
to transaction's end, as done with optimistic.
1) Locking - Restricting the access to data by locks assigned to the data. This
can be done by the other transaction to a data item to block the availability of
the data item i.e. database object etc.
Correctness
i) Serializability
ii) Recoverability
The term "recoverability" may refer to the ability of a system to recover from
failure; within concurrency control of database systems this term has received a
specific meaning.
68
-I
Database Security - 11
4.4 FAILURE RECOVERY OF DATABASES
4.4.1 What is Database Failure?
Database failure is actually deviation from the normal execution of the database.
The failure in the database can happen for any number of reasons. First and foremost
is user or human error for data damage, loss or corruption. Included in this type of
failure is an application modifying or destroying the data on its own or through a
user choice. Recovery and restore to the point in time before the corruption
occurred.
This returns the data to a clean position at the cost of any other changes that were
being made to the data since the point the corruption took place. Any lost work
will need to be re-entered or processes repeated if necessary.
Second reason may be due to media failure leading to data loss or damage. Media
failure can happen when the f1l,'dia the data files or transaction logs are stored on
•
fail. Most databases will be stored on computer hard drives or across groups of
hard drives on designatedservers. Hard drives are mechanical devices, just like
automobiles and are made up of parts and pieces that work together. Mechanical
devices are known for failure and will need to be replaced once or if, the data has
been retrieved from them.
The third reason for database failure is a disastrous or catastrophic event. This can
be in the form of fire, flood or any naturally occurring storm. It can also happen
through electrical outage, a virus or the deliberate hacking of your data. Any of
these can corrupt or cause the loss of your data. The true disaster will be the lack
of data backup and or the lack of a recovery plan. Without data backup recovery is
impossible. And without a recovery plan there is no guarantee that your data backup
will make it through the recovery process.
Database security
It concerns the use of a broad range of information security controls to protect
databases against compromises of their confidentiality, integrity and availability.
It involves various types or categories of controls, such as technical, procedural!
administrative and physical. Database security is a specialist topic within the broader
realms of computer security, information security and risk management.
• Design flaws and programming bugs in databases and the associated programs
and systems, creating various security vulnerabilities (e.g. unauthorized
privilege escalation), data loss/corruption, performance degradation etc.;
• Data corruption and/or loss caused by the entry of invalid data or commands,
mistakes in database or system administration processes, sabotage/criminal
damage etc.
Security Measures
The following are most commonly used measures to provide security to the
database:
• Access control: This includes restricting the access from the unauthorized
users using usemame and password protection.
• Integrity controls: Some measures for maintaining and regular checking for
the integrity of the data in the database.
4.5 FAULTTOLERANCE
Definition
Implementation
Fault-tolerant system is the one that in the event that a component fails, a backup
component or procedure can immediately replace its working and take its place
with no loss of functionality. Fault tolerance can be provided at the software as
well as hardware level since both are equally vulnerable to failures.
In the software implementation, operating system plays a major role and it provides
different mechanisms to avoid failures. Hardware implementation includes
replicating/mirroring the hardware components so that the mirrored component
can take over after the hardware failure is encountered.
Database replication
• Initial Phase: this is the phase when the execution is just started.
• Failed State: this is the state where the transaction cannot execute due to
some error or failure.
• Aborted State: this state arises when the transaction has failed. An aborted
transaction must have no effect on the database and thus any changes it made
to the database have to be undone or in technical terms, rolled back. The
database will return to its consistent state i.e. the state from where the
transaction has begun. The DBMS's recovery scheme is responsible to manage
transaction aborts.
READ
WRlTE
BEGIN ~ END
TRANSAl 'TIO~ TRANSAC'TION COWdlT
All database access operations done in between the beginning and the end of the
transaction constitute a logical unit of work and thus is termed as transaction.
There are different operations that take place during the course of execution of a
transaction as mentioned below:
READ: This is the operation in which the database items in a transaction are not
updated but only retrieved for the pupose of reading data. Thus the operations is
written as READ (X) i.e. reading item X.
WRITE: This operation writes the value of program variable X into the database
item X and is denoted as WRITE(X). 71
Database Security Consider the following transactions:
Tl TRANSACTION T2 TRANSACTION
READ (X);
X:= X-N;
READ(X);
Data Item X
X:=X+M; has
incorrect
WRITE(X);
value
READ(Y);
Y:=Y+N;
WRITE(X);
WRITE(Y);
The table mentioned above illustrates two transactions Tl and T2. The Tl
transaction first reads the data item X. It then updates X but doesn't make X
permanent to the database. It then goes to wait state. The other transaction named
T2 begins execution and reads the original value of X and does some updation
and enters wait state. T'l resumes its execution and writes data item X on the
database, reads another data item Y, does some updation enters wait state. T2
resumes execution and writes X which the causes ambiguity. Thus, concurrency
control measures are used to prevent this situation.
b) Compare your answers with the one given at the end of this Unit.
1) Define Transaction.
72
I
r 4) What is ACID test? Database Security - 11
. ~ .
7) Write different ways through which security to the database can be hampered.
1) Database transaction refer to a unit a unit of work that must occur or fail in its
entirety i.e. it should make some change in the database or it must rollback all
together.
ii) Serializability - This involves checking for cycles in the schedule's graph
and breaking them by aborts.
4) ACID Testis:
i) Atomicity - It is based on all or none concept i.e. either the effects of all
or none of its operations when a transaction is completed (committed or
aborted respectively). Thus, the transaction results in either done or never
started.
•
•
Initial Phase: this is the phase when the execution is just started.
• Failed State: this is the state where the transaction cannot execute due to
some error or failure.
• Aborted State: this state arises when the transaction has failed. An aborted
transaction must have no effect on the database and thus any changes it
made to the database have to be undone or in technical terms, rolled back.
The database will return to its consistent state i.e. the state from where
the transaction has begun. The DBMS's recovery scheme is responsible
to manage transaction aborts.
74
r • Committed State: A database transaction enters the committed state when Database Security - 11
enough information has been written to disk after completing its execution
with success.
Transaction states
6) First and foremost is user or human error for data damage, loss or corruption.
Included in this type of failure is an application modifying or destroying the
data on its own or through a user choice. Recovery and restore to the point in
time before the corruption occurred.
Second reason may be due to media failure leading to data loss or damage.
Media failure can happen when the media the data files or transaction logs
are stored on fail. Most databases will be stored on computer hard drives or
across groups of hard drives on designated servers. Hard drives are mechanical
devices, just like automobiles and are made up of parts and pieces that work
together. Mechanical devices are known for failure and will need to be replaced
once or if, the data has been retrieved from them.
76
Student Satisfaction Survey l@jignou
~ THE PEOPLE'S
UNIVERSITY
Student Satisfaction Survey of IGNOU Students
Enrollment No.
Mobile No.
Name
Programme of Study
Year of Enrolment
Age Group Cl Below 30 Cl 31-40 Cl 41-50 Cl 51 and above
Gender Cl Male Cl Female
Regional Centre
States .,
• Study Centcr Code
Please indicate how much you are satisfied or dissatisfied with the following statements
SI. Questions Very Satisfied Average Dissati- Very
No. Satisfied sfied Dissati-
sfied
Concepts are clearly explained in the printed learning
1.
material CJ CJ CJ CJ CJ
2. The learning materials were received in time CJ CJ CJ CJ CJ
3. Supplementary study materials (like video/audio) available CJ CJ CJ CJ CJ
4. Academic counselors explain the concepts clearly CJ CJ CJ CJ CJ
s. The counseling sessions were interactive
CJ CJ CJ CJ CJ
Changes in the counseling schedule were communicated to
6.
you on time CJ CJ CJ CJ CJ
7. Examination procedures were clearly given to you CJ CJ CJ CJ CJ
8. Personnel in the study centers me helpful
CJ CJ CJ CJ CJ
9. Academic counseling sessions are well organized
CJ c:J CJ CJ CJ
10.
Studying the programme/course
the subject
provide the knowledge of
CJ c:J CJ CJ CJ
11. Assignments are returned in time
CJ CJ CJ CJ CJ
Feedbacks on the assignments helped in clarifying the
12.
concepts CJ CJ CJ CJ CJ
13. Project proposals are clearly marked and discussed
CJ CJ CJ c=J CJ
14.
Results and grade card of the examination
time
were provided on
c=J CJ CJ CJ CJ
15. Overall, I am satisfied with the programme CJ CJ CJ CJ CJ
16.
Guidance from the programme
from the school
coordinator and teachers
CJ CJ CJ CJ CJ
After filling this questionnaire send it to:
Programme Coordinator, School of Vocational Education and Training,
Room no. 19, Block no. 1, IGNOU, Maidangarhi, New Delhi- 110068
I I IGNOU-STRIDE © All rights reserved 2009, ACIIL
----------------------~--~----------------------------------------------------
I
MPDD-IGNOu/P.O. 1T/September 2011
.•
ISBN-978-81-266-5616-5