Introduction To Databases - Part 2
Introduction To Databases - Part 2
Week 2
In this lecture…
• Why is data important to an organisation?
• Planning a database
• File maintenance techniques
• Web databases
• Database security
2
The importance of data
• For knowledge organisations (e.g. a research lab), data is the
most important
asset
• Data represents assets for
banks, finance houses,
insurance companies etc
• Many organisations can not
function without access to
their data
3
Decisions
• For most businesses the aim is to make a profit
• To achieve the aim, there must be good decisions
• To make good decisions there must be good data
4
5
Why?
6
File maintenance
Keeping data current
• Adding records
• A new customer, product, transaction etc
• Changing (editing) records
• New address, change of name etc
• Deleting records
• Person leaves, product no longer stocked etc
• Usually a record is not deleted, but is flagged
e.g. a customer is marked "inactive"
• The data remains, but is not included in current activity
7
Forms
• File maintenance is often carried out using a form
• Same data,different view
8
Data validation
• Comparing data to a set of rules to make sure the data is
correct
• Five common validity checks:
9
Web databases
• Behind many web sites are databases
• The web page is the front end (client side)
• The database is the back end (server side)
• A web site selling books will use databases
• Books in stock
• Customers
• Orders
• Shipping
• A CGI script links the web page and the database
10
Movie database
11
Database security
• Because data is so vital to an organisation, security is very
important
• Security from theft or fraud
• Security from damage
• Security for privacy
12
Security from theft or fraud
• Threats from within or outside the organisation
• Most danger is from employees
• Access controls
• Physical access - doors, windows etc
• Electronic access
• Firewalls (p 563)
• Login names and passwords (p 566)
• Biometric controls (p 262)
• Procedural controls
• Double checks
• Job rotation, job sharing
13
Security from damage
• Accidental damage - "human error"
• Data checking and validation
• Restrict user rights (e.g. can't delete)
• Environmental risks
• Fire, storm, flood, power fluctuation
• Secure, safe buildings
• Power smoothers and uninterruptible power supply (UPS)
• In all cases, a good backup system
14
Security for privacy
• Privacy of the people the organisation holds information about
• Doctor-patient, lawyer-client confidentiality etc
• Sometimes national laws
• Privacy of the company information
• "The secret recipe"; car company's designs for next year's model;
industrial secrets
15
Disaster recovery plan
• All organisations should plan before disaster strikes
• Emergency plan
• What to do at the time
• Backup plan
• How to restore equipment and data
• Recovery plan
• How to get back to full operability
• Test plan
• How to test the above
16
Backup systems
• Backups are for individuals (that is, you!), and for
organisations
• Backup methods on next slide
• Have a system and follow it
• For personal backup
• Use a USB stick, CD-R, DVD-R or similar
• Store it away from your computer
• For important data, keep at least three copies
17
Backup methods
18
References
1. Gary B. Shelly & Misty E. Vermaat & Jeffrey J. (CON) Quasney
& Susan L. (CON) Sebok & Steven M. (CON) Freund.(2011).
Discovering Computers, Complete: Your Interactive Guide to
the Digital World. Cengage Learning
2. Cox, Joyce ; Lambert,Joan. (2010). Step by Step (Microsoft
Access 2010) , Microsoft press , USA
19