0% found this document useful (0 votes)
59 views28 pages

Database Integrity Controls, Backup & Recovery: Made By: J Kagrana Bhatia

This document discusses database integrity controls, backup, and recovery. It defines database security and potential threats. It describes different integrity controls like domains, authorization rules, and authentication schemes. It also outlines various security policies and procedures. The document then discusses the importance of backups and different backup types. It explains journaling facilities, checkpoint facilities, and the role of the recovery manager in restoring data. Finally, it provides an overview of how integrity, backup, and recovery work together to secure data and enable recovery from failures or errors.

Uploaded by

Varun Bhatia
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
59 views28 pages

Database Integrity Controls, Backup & Recovery: Made By: J Kagrana Bhatia

This document discusses database integrity controls, backup, and recovery. It defines database security and potential threats. It describes different integrity controls like domains, authorization rules, and authentication schemes. It also outlines various security policies and procedures. The document then discusses the importance of backups and different backup types. It explains journaling facilities, checkpoint facilities, and the role of the recovery manager in restoring data. Finally, it provides an overview of how integrity, backup, and recovery work together to secure data and enable recovery from failures or errors.

Uploaded by

Varun Bhatia
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 28

DATABASE INTEGRITY

CONTROLS, BACKUP &


RECOVERY

MADE BY:
JANHVI J KAGRANA
VARUN BHATIA
OVERVIEW:
INTRODUCTION

What is Database Security?

• Protection of the data against the accidental or


intentional loss, destruction or misuse.

• Database administrator is typically responsible


for administering database security.
Potential Threats to data security includes:
INTEGRITY CONTROLS
 Database connected with the Internet or other networks
are vulnerable to some hackers and malicious people.

 Some employees are dissatisfied with their employers,


so they cause their employers’ system some damages.
---------------------------------------------------------------------

 Data integrity control is essential in ensuring the overall


consistency of the data in your database.

 Protects data from unauthorized use and update.


Example: Employee Table
Empno Ename Salary Dname Mgrno Comm

101 King 2000 Sales 201 -

102 Blake 1500 Production 202 50

103 Smith 1800 Finance 203 80

• Empno is a Primary Key.


•To avoid Data Redundancy and maintain consistency.
FORMS OF INTEGRITY CONTROLS
Domain
• It is a way to create a user-defined data type.
• Once a domain is created, any field can be assigned to
that domain as its data type.
• Example: Salary in employee table.

CREATE DOMAIN Decsal AS DECIMAL


CHECK(VALUE BETWEEN .001 AND .15);
Authorization Rules

• Controls incorporated in data management system that restrict access


to data and also the actions that people may take when they access data.
• Example: Assume King as the Head of the sales department is
authorized to insert and modify records.

Empno Ename Salary Dname Mgrno Comm


Authentication Schemes
101 King 2000 Sales 201 -

• Difficult102
to identifyBlake
the intentions
1500 of the users over
Producti 202the network
50
on
• Different Schemes are required to maintain authenticity
103 Smith 1800 Finance 203 80

• Like PASSWORDS, STRONG AND MEDIATED AUTHENTICATION.


• Example- PIN, SMART CARDS.
SECURITY POLICIES AND PROCEDURES

1.Personnel Controls- Awareness of security at


different levels

2.Physical Access Controls- Limited Access to


particular areas of a building.

3.Maintenance Controls- Maintenance of H/W & S/W


to ensure data quality and availability.

4.Data Privacy Controls- Adequate data protection


through information privacy legislation.
DATABASE BACKUP
&
RECOVERY FACILITIES
WHAT KEEPS A DBA AWAKE AT NIGHT?

• Data protection is the concern of every Database


Administrator.

• Dealing with long term backup storage.

• Reducing exposure to data loss.


ASSESSMENT OF RECOVERY REQUIREMENTS

• Identification of critical data.

• Design recovery requirements around data


criticality.

• Assess data protection requirements


▫ Physical: Disasters, failures, corruptions
▫ Logical: Human errors, application errors
MECHANISMS FOR RESTORING
BACKUP FACILITIES-AGENDA
WHY BACKUP IS IMPORTANT?
• Events of data loss:

Disk Crash

Software Failure

Human Errors
TYPES OF BACKUP
• Physical backups :

 In a physical backup, the underlying physical files building up


the database are copied from disk to disk or from disk to tape.

 Can be either HOT or COLD


HOT or the ONLINE backup refers to the Oracle database
that is up and running.
COLD or the OFFLINE backup involves shutting down the
Oracle database and backing up all required Oracle database
files.
• LOGICAL BACKUP(“EXPORTS”)

 Creates a logical image of the database objects and stores them in a


binary file.

 Unlike physical backups, the EXPORT utility actually reads the data in
the objects using SQL and stores the data in the binary file.

 The IMPORT utility uses this file to restore these particular database
objects back into the database.

 Any changes made to the table during the export will not be
incorporated into the EXPORT file.
JOURNALIZING FACILITIES

• Audit trail of transactions and database updates

• Transaction log – record of essential data for


each transaction processed against the database

• Database change log – images of updated data


▫ Before-image – copy before modification
▫ After-image – copy after modification
DATABASE AUDIT TRIAL
CHECKPOINT FACILITY
• DBMS periodically refuses to accept new
transactions
• System is in a quiet state
• Database and transaction logs are synchronized

This allows recovery manager to resume processing from


short period, instead of repeating entire day
RECOVERY MANAGER
• Back up, restore, and recover Oracle databases

• Perform maintenance on backups and copies of


database files
WHY RMAN?
• RMAN is aware of the internal structure of Oracle data
files and control files, and knows how to take consistent
copies of data blocks even as they are being written.

• Manage the complexity of backup and recovery operations

• Minimize the possibility of human error

• Make backups scalable and reliable

• Possible to recover individual blocks in case of block


corruption of datafiles.
METHODS TO PERFORM RECOVERY
• Using operating system commands to perform
backup and restore operations, and SQL or
SQL*Plus statements to perform recovery.

• Using Recovery Manager for backup, restore,


and recovery
RMAN OVER USER-MANAGED BACKUP
OVERVIEW OF INTEGRITY,BACKUP
AND RECOVERY
• For data security, integrity is required.

• To avoid human errors like wrong entries,


duplication of data , deletion of entries, integrity
is done.

• To avoid such errors or to recover the data after


loss, backup and recovery is done.
CONCLUSION
REFERENCES
• Oracle Recovery managers users guide

• Tillämpad datasäkerhet (DAVC17) –Database Security


by Simone Fischer-Hübner

• Modern Database Management Systems-by Jeffrey A


Hoffer

• www.oracle.com

• www.pcquest.com
T H A N K
Y O U

You might also like