0% found this document useful (0 votes)
9 views30 pages

intro to dbms

The document discusses the significance of Database Management Systems (DBMS) and data security in modern organizations, highlighting how DBMS enhances data organization, sharing, and compliance while improving productivity and decision-making. It outlines the benefits of DBMS, including effective data integration, consistent data, and adherence to privacy regulations. Additionally, it emphasizes the importance of data security measures such as confidentiality, authentication, and cryptography to protect digital information from unauthorized access and cyber threats.

Uploaded by

shubhamshaw90000
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views30 pages

intro to dbms

The document discusses the significance of Database Management Systems (DBMS) and data security in modern organizations, highlighting how DBMS enhances data organization, sharing, and compliance while improving productivity and decision-making. It outlines the benefits of DBMS, including effective data integration, consistent data, and adherence to privacy regulations. Additionally, it emphasizes the importance of data security measures such as confidentiality, authentication, and cryptography to protect digital information from unauthorized access and cyber threats.

Uploaded by

shubhamshaw90000
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 30

Importance of Database

Management System
and Data Security in
today’s world

Dr Romit Beed
Head, Dept. of Computer Sc.
St. Xavier’s College (Autonomous),
Kolkata
Database Management System

DBMS contains information about a particular enterprise


• Collection of interrelated data
• Set of programs to access the data
• An environment that is both convenient and efficient to use

DATABASE + PROGRAMS = DBMS

2
Why DBMS?
As the volume of data increases, so does the need for a
DBMS
DBMS is a computerized system that helps organize large
volume of information.

DBMS increases the business value of an organization’s data


assets, freeing users across the organization from repetitive
and time-consuming data processing tasks.

The result….
A more productive workforce, better compliance with data
regulations and better decisions.

3
Definition
A database management system is a software tool used to create
and manage one or more databases, offering an easy way to

• Create a database

• Store data

• Update/modify tables

• Retrieve/ Access information

A database management system also provides tools to administer


the database schema – the structure of the database itself.

4
Database Applications
▪ Banking: all transactions
▪ Airlines: reservations, schedules
▪ Universities: registration, grades
▪ Sales: customers, products, purchases
▪ Online retailers: order tracking, customized recommendations
▪ Manufacturing: production, inventory, orders, supply chain
▪ Human resources: employee records, salaries, tax deductions

Databases touch all aspects of our lives

5
Since quality data management implies a centralized view of data,
teams need a solution that allows them to coordinate everything,
including monitoring who is accessing the system and where
they’re accessing it from.
A database management system helps improve
• organizational security
• integration
• compliance
• performance

Benefits of DBMS
6
Benefits of DBMS
1. Improved data sharing and data security
Database management systems help users share data quickly, effectively,
and securely across an organization. By providing quick solutions to
database queries, a data management system enables faster access to more
accurate data. [End users, like sales people, are able to speed up sales cycles
and get more accurate in their sales prospecting.]

2. Effective data integration


Implementing DBMS promotes a more integrated picture of your operations
by easily illustrating how processes in one segment of the organization
affect other segments. What once was done completely manually now can
be fully automated and more accurate. DBMS includes flexible integration
options to standardize data across multiple sources and remove duplicates.

7
Benefits of DBMS
3. Consistent, reliable data
Data inconsistency occurs when different versions of matching data exist
in different places in an organization. For example, one group has a
client’s correct email, another the correct phone number. By using a
DBMS, you can be sure that consistent data is shared throughout the
organization.

4. Data that complies with privacy regulations


DBMS provide a better framework for the enforcement of privacy and
security policies. By orchestrating data in a unified manner, companies
can manage privacy and data security centrally and lower the risk of
regulatory violations.

8
Benefits of DBMS
5. Increased productivity
Deploying a DBMS typically results in increased productivity because a good
DBMS empowers people to spend more time on high-value activities and
strategic initiatives and less time cleaning data manually.

6. Better decision-making
Better data management procedures generate higher-quality information,
which leads to better decision-making across an organization.

9
Pros and Cons of DBMS
10
name address age pin Phone
 (10) → ( 24 )→  (2) →  (6) →  (8) →
a Park St 21 700016 234
b Russel St 32 700015 324
c Camac St 42 700017 345
a Park St 21 700016 367
c Camac St 42 700017 657
Total size is 50x5=250

Name Address age pin Name phone


(10) (24) (2) (6) (10) (8)
a Park St 21 700016 a 234
b 324
b Russel St 32 700015
c 345
c Camac St 42 700017
a 367
Total size= 42x3=126+90=216 c 657

Pros and Cons of DBMS


11
name address age pin Phone
 (10) → ( 24 )→  (2) →  (6) →  (8) →
a Park St 21 700016 234
b Russel St 32 700015 324
c Camac St 42 700017 345
a Park St 21 700016 367
c Camac St 42 700017 657
Total size is 50x5=250

Cust Name Address age pin Cust Code phone


Code (1) (8)
(1) (10) (24) (2) (6) 1 234
1 a Park St 21 700016 2 324
2 b Russel St 32 700015 3 345
1 367
3 c Camac St 42 700017
3 657
Total size= 43x3 + 9x5 = 129+45 = 174

Pros and Cons of DBMS


12
name address age pin Phone
 (10) → ( 24 )→  (2) →  (6) →  (8) →
a Park St 21 700016 234
b Russel St 32 700015 324
c Camac St 42 700017 345
a Park St 21 700016 367
c Camac St 42 700017 657
Redundant Data
name address age pin Phone
 (10) → ( 24 )→  (2) →  (6) →  (8) →
a Park St 21 700016 234
b Russel St 32 700015 324
c Camac St Short St 42 700017 345
a Park St 21 700016 367
c Camac St 42 700017 657
Inconsistent Data

Pros and Cons of DBMS


13
ACID Properties of DBMS

Transfer 50 rupees from A to B


A=1000, B=2000, sum = 3000 – CONSISTENT
Read A
A = A - 50
Write A
A=950, B=2000, Sum=2950 – INCONSISTENT
Read B
B = B + 50
Write B
A=950, B=2050, sum=3000 – CONSISTENT
14
A transaction is a unit of program execution that accesses and possibly
updates various data items. To preserve the integrity of data the
database system must ensure:

• Atomicity. Either all operations of the transaction are properly


reflected in the database or none are.

• Consistency. Execution of a transaction preserves the consistency of


the database.

• Isolation. Although multiple transactions may execute concurrently,


each transaction must be unaware of other concurrently executing
transactions. Intermediate transaction results must be hidden from
other concurrently executed transactions.

• Durability. After a transaction completes successfully, the changes it


has made to the database persist, even if there are system failures.

ACID Properties of DBMS


15
Time A B
10:00 Start
10:01
10:02 Starts
10:03
10:04 End
10:05 end
10:06

Concurrent Executions in DBMS


16
Time A B
10:00 Start
10:01 Starts
10:02 Lock
10:03 Lock Time A B
10:04 End 10:00 Start
10:05 end 10:01 Starts
10:02 Lock
10:03 Lock
10:04 End
10:05 end

Concurrent Executions in DBMS


17
Rows, Columns and Cells

18
Tables and Database

19
Database Software
database
Platform Ease of use Cloud Version
software
MySQL Windows, Linux, Easy Yes
Mac.

Oracle Windows, Linux Medium Yes

SQL Server Windows, Linux. Very Easy No

Firebird Windows, Linux, -- No


and Mac.
PostgreSQL Windows, Linux, Easy for No.
and Mac developers.

Altibase Linux Very Easy Yes


20
Interfaces of Popular Database Software
21
Schema and Instance
Schema – the logical structure of the database

Instance – the actual content of the database at a


particular point in time
Field name Type Size Constraint
Student id number 5 not null
Student name character 15 not null
Student address character 20
Phone character 10
Age number 3 non-negative

Cmsa 2020 | Cmsa 2021

22
Database Abstraction

• Physical level: describes how a record (e.g., customer) is stored.

• Logical level: describes data stored in database, and the


relationships among the data.

• View level: What the end user sees.

23
Data
Security

24
Computer data often travels from one computer to another,
leaving the safety of the host computer. Once the data is out of
hand, people with bad intention could modify or forge your data,
either for amusement or for their own benefit.

Cryptography encrypts the data, making it safer on its trip


between computers. The technology is based on the essentials of
secret codes, augmented by modern mathematics that protects
our data in powerful ways.

• Network Security - measures to protect data during


transmission

• Internet Security - measures to protect data during


transmission over a collection of interconnected networks

• Data Security - Data security is the practice of protecting digital


information from unauthorized access, corruption, or theft.

Introduction
25
Data Security is a concept that encompasses every aspect of
information security from the physical security of hardware and
storage devices to administrative and access controls, as well as
the security of software applications.

It also includes organizational policies and procedures.

When properly implemented, robust data security strategies will


not only protect an organization’s information assets against
cybercriminal activities, but also guard against insider threats
and human error, which remains among the leading causes of
data breaches today.

Data security involves deploying tools and technologies that


enhance the organization’s control over its critical data and how
it is used.

Data Security
26
Confidentiality: Ensures that the information in a computer system and
transmitted information are accessible only for reading by authorized
parties.

Authentication: Ensures that the origin of a message or electronic


document is correctly identified, with an assurance that the identity is
not false.

Integrity: Ensures that only authorized parties are able to modify


computer system assets and transmitted information.

Non-repudiation: Requires that neither the sender nor the receiver of a


message be able to deny the transmission.

Access control: Which resource may be used and by whom

Availability: Requires that computer system assets be available to


authorized parties when needed.

Principles of Security
27
Cryptography The art or science encompassing the principles and
methods of transforming an understandable message into one
that is incomprehensible, and then retransforming that message
back to its original form.

Cryptanalysis The study of principles and methods of


transforming an unintelligible message back into an intelligible
message without knowledge of the secret key.

Plain text The original understandable message

Cipher text The transformed message

Cryptography
28
Cipher An algorithm for transforming an understandable
message into one that is jumbled by transposition and/or
substitution methods

Key The secret information used by the cipher to encrypt/decrypt


and known only to the sender & receiver

Encrypt/ Encipher (encode) The process of converting plaintext


to cipher text using a cipher and a key

Decrypt/ Decipher (decode) the process of converting cipher text


back into plaintext using a cipher and a key

Cryptography
29
Questions and Answers

30

You might also like