SlideShare a Scribd company logo
1 of 23
Security and Integrity of Data
Group Members
Adeel Riaz
Mirza Danish Baig
Mirza Ibad Baig
Advisor: Sir Amir Saifi
PAF KIET Fall 11
Data Integrity
Refers to the validity of data. Integrity ensure that the
data stored on devices is correct and no unauthorized
persons or malicious software has altered data. Data
integrity can be compromised in a number of ways:
• Human errors when data is entered.
• Errors that occur when data is transmitted from one
computer to another.
• Software bugs or viruses.
• Hardware malfunctions, such as disk crashes.
• Natural disasters, such as fires and floods.
Example of Data Integrity
Minimize Threats to Data Integrity
There are many ways to minimize these threats to data
integrity. these include:
1. Backing up data regularly
2. Controlling access to data via security mechanisms
3. Designing user interfaces that prevent the input of
invalid data
4. Using error detection and correction software when
transmitting data
Your work is lost if
you don't have a
back- up copy.
1- Backing up data regularly
Back up your critical data to an
external medium. Some popular
options are CDs, USB Flash drives
2- Controlling access to data via security
mechanisms
Organization must
implement physical
security mechanisms to
maintain the data
integrity.
3-Designing UI that prevent the input of invalid data
4- Use error detection and correction software
In communications, error detection refers to a class of
techniques for detecting garbled messages.The
simplest and most common techniques are
called Checksum.
•Checksum
How do I secure my Windows PC?
Operating System
Updates Antivirus Protection
Use a Firewall
What is difference between Data Integrity and Data Security?
Data Integrity:
• Making sure the data is correct and not corrupt.
Data Security:
• Making sure only the people who should have access
to the data are the only ones who can access the data.
also, keeping straight who can read the data and who
can write data.
Data Integrity Types in Database
Unique Column Values
Primary Key Values
Referential Integrity Rule
Complex Integrity Checking
Null Integrity Constraint
By default, all columns in a table allow nulls. Null means
the absence of a value. A NOT NULL constraint requires a
column of a table contain no null values.
UNIQUE Key Integrity
A UNIQUE key integrity constraint requires that every
value in a column or set of columns (key) be unique.
Primary Key Constraint
Primary key is used to uniquely identify each row in a
table. PK cannot be null
Referential Integrity Constraint
The following terms are associated with referential
integrity constraints.
**Foreign Key **Dependent/Child Table
Complex Integrity Checking
This type of foreign key references a parent key in
the same table.
More on integrity. . .
• Enforcing business rules in the code of a database
application
• Using stored procedures to completely control access
to data
• Enforcing business rules with triggered stored
database procedures
Data Security
Possible Risks
Risk are involved:
– Lost
– Destroyed
– Corrupted
– Modified
– Disclosed
Possible Threads
1) Hacking
“Use of a computer system without a specific,
constructive purpose, or without proper
authorization”
2) Virus
“A computer program that is designed to
replicate itself by copying itself into the other
programs stored in a computer.”
(source: www.answer.com)
Data Protection
1) Backup
“Backup in simple terms is an additional copy of all
your important work on additional storage media
like CD, DVD, Portable Hard disk, USB Flash
drive or anything similar to that.
Physical Protection of Data
1) Proper Monitoring System
2) Fireproof rooms
3) Can't Access Unauthorized Peoples
4) Proper Identification of Relevant Peoples
Other Ways of Protection of Data
1) User Identity and Password
2) Write protected
3) Password Protected Files
4) Data Encryption

More Related Content

What's hot

6. Integrity and Security in DBMS
6. Integrity and Security in DBMS6. Integrity and Security in DBMS
6. Integrity and Security in DBMS
koolkampus
 
Elementary data organisation
Elementary data organisationElementary data organisation
Elementary data organisation
Muzamil Hussain
 

What's hot (20)

Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
Data base security & integrity
Data base security &  integrityData base security &  integrity
Data base security & integrity
 
Data recovery
Data recoveryData recovery
Data recovery
 
Operating System Security
Operating System SecurityOperating System Security
Operating System Security
 
security and privacy in dbms and in sql database
security and privacy in dbms and in sql databasesecurity and privacy in dbms and in sql database
security and privacy in dbms and in sql database
 
Data integrity
Data integrityData integrity
Data integrity
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Database security
Database securityDatabase security
Database security
 
6. Integrity and Security in DBMS
6. Integrity and Security in DBMS6. Integrity and Security in DBMS
6. Integrity and Security in DBMS
 
Database Security & Encryption
Database Security & EncryptionDatabase Security & Encryption
Database Security & Encryption
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
Database administration and security
Database administration and securityDatabase administration and security
Database administration and security
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
 
Data Acquisition
Data AcquisitionData Acquisition
Data Acquisition
 
IOT System Management with NETCONF-YANG.pptx
IOT System Management with NETCONF-YANG.pptxIOT System Management with NETCONF-YANG.pptx
IOT System Management with NETCONF-YANG.pptx
 
Elementary data organisation
Elementary data organisationElementary data organisation
Elementary data organisation
 
DBMS Integrity rule
DBMS Integrity ruleDBMS Integrity rule
DBMS Integrity rule
 
Security and Integrity
Security and IntegritySecurity and Integrity
Security and Integrity
 
Security of the database
Security of the databaseSecurity of the database
Security of the database
 
Live memory forensics
Live memory forensicsLive memory forensics
Live memory forensics
 

Viewers also liked (7)

Creational pattern
Creational patternCreational pattern
Creational pattern
 
Design Pattern
Design PatternDesign Pattern
Design Pattern
 
Behavioral pattern By:-Priyanka Pradhan
Behavioral pattern By:-Priyanka PradhanBehavioral pattern By:-Priyanka Pradhan
Behavioral pattern By:-Priyanka Pradhan
 
Adapter Design Pattern
Adapter Design PatternAdapter Design Pattern
Adapter Design Pattern
 
Design patterns ppt
Design patterns pptDesign patterns ppt
Design patterns ppt
 
Adapter Design Pattern
Adapter Design PatternAdapter Design Pattern
Adapter Design Pattern
 
Structural patterns
Structural patternsStructural patterns
Structural patterns
 

Similar to Security and Integrity of Data

Database Security, Threats & Countermeasures.pptx
Database Security, Threats & Countermeasures.pptxDatabase Security, Threats & Countermeasures.pptx
Database Security, Threats & Countermeasures.pptx
SaqibAhmedKhan4
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4
Rodrigo Piovesana
 
MobileDBSecurity.pptx
MobileDBSecurity.pptxMobileDBSecurity.pptx
MobileDBSecurity.pptx
missionsk81
 
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docxExcel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
gitagrimston
 

Similar to Security and Integrity of Data (20)

The 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan KochThe 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan Koch
 
The 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan KochThe 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan Koch
 
Database Security, Threats & Countermeasures.pptx
Database Security, Threats & Countermeasures.pptxDatabase Security, Threats & Countermeasures.pptx
Database Security, Threats & Countermeasures.pptx
 
A Database System Security Framework
A Database System Security FrameworkA Database System Security Framework
A Database System Security Framework
 
A DATABASE SYSTEM SECURITY FRAMEWORK
A DATABASE SYSTEM SECURITY FRAMEWORKA DATABASE SYSTEM SECURITY FRAMEWORK
A DATABASE SYSTEM SECURITY FRAMEWORK
 
IT system security principles practices
IT system security principles practicesIT system security principles practices
IT system security principles practices
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4
 
Database security
Database securityDatabase security
Database security
 
Database security in database management.pptx
Database security in database management.pptxDatabase security in database management.pptx
Database security in database management.pptx
 
Database Security Presentation Why database Security is important
Database Security Presentation Why database Security is importantDatabase Security Presentation Why database Security is important
Database Security Presentation Why database Security is important
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Threats of E-Commerce in Database
Threats of E-Commerce in DatabaseThreats of E-Commerce in Database
Threats of E-Commerce in Database
 
Isys20261 lecture 02
Isys20261 lecture 02Isys20261 lecture 02
Isys20261 lecture 02
 
20210629_104540Information Security L1.pdf
20210629_104540Information Security L1.pdf20210629_104540Information Security L1.pdf
20210629_104540Information Security L1.pdf
 
Security.pdf
Security.pdfSecurity.pdf
Security.pdf
 
Dstca
DstcaDstca
Dstca
 
MobileDBSecurity.pptx
MobileDBSecurity.pptxMobileDBSecurity.pptx
MobileDBSecurity.pptx
 
Database security 12.pdf
Database security 12.pdfDatabase security 12.pdf
Database security 12.pdf
 
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docxExcel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
 
chap-1 : Vulnerabilities in Information Systems
chap-1 : Vulnerabilities in Information Systemschap-1 : Vulnerabilities in Information Systems
chap-1 : Vulnerabilities in Information Systems
 

Recently uploaded

➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men 🔝Dindigul🔝 Escor...
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men  🔝Dindigul🔝   Escor...➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men  🔝Dindigul🔝   Escor...
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men 🔝Dindigul🔝 Escor...
amitlee9823
 
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
amitlee9823
 
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
amitlee9823
 
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
Probability Grade 10 Third Quarter Lessons
Probability Grade 10 Third Quarter LessonsProbability Grade 10 Third Quarter Lessons
Probability Grade 10 Third Quarter Lessons
JoseMangaJr1
 
Abortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get CytotecAbortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Riyadh +966572737505 get cytotec
 
CHEAP Call Girls in Rabindra Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Rabindra Nagar  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Rabindra Nagar  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Rabindra Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
amitlee9823
 
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
amitlee9823
 
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
only4webmaster01
 
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts ServiceCall Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
 
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
 
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men 🔝Dindigul🔝 Escor...
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men  🔝Dindigul🔝   Escor...➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men  🔝Dindigul🔝   Escor...
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men 🔝Dindigul🔝 Escor...
 
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
 
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
 
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
 
Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -
Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -
Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -
 
Probability Grade 10 Third Quarter Lessons
Probability Grade 10 Third Quarter LessonsProbability Grade 10 Third Quarter Lessons
Probability Grade 10 Third Quarter Lessons
 
Abortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get CytotecAbortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get Cytotec
 
CHEAP Call Girls in Rabindra Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Rabindra Nagar  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Rabindra Nagar  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Rabindra Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
 
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
 
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
DATA SUMMIT 24 Building Real-Time Pipelines With FLaNK
DATA SUMMIT 24  Building Real-Time Pipelines With FLaNKDATA SUMMIT 24  Building Real-Time Pipelines With FLaNK
DATA SUMMIT 24 Building Real-Time Pipelines With FLaNK
 
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
 
hybrid Seed Production In Chilli & Capsicum.pptx
hybrid Seed Production In Chilli & Capsicum.pptxhybrid Seed Production In Chilli & Capsicum.pptx
hybrid Seed Production In Chilli & Capsicum.pptx
 
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysis
 
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts ServiceCall Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
 

Security and Integrity of Data

  • 1. Security and Integrity of Data Group Members Adeel Riaz Mirza Danish Baig Mirza Ibad Baig Advisor: Sir Amir Saifi PAF KIET Fall 11
  • 2. Data Integrity Refers to the validity of data. Integrity ensure that the data stored on devices is correct and no unauthorized persons or malicious software has altered data. Data integrity can be compromised in a number of ways: • Human errors when data is entered. • Errors that occur when data is transmitted from one computer to another. • Software bugs or viruses. • Hardware malfunctions, such as disk crashes. • Natural disasters, such as fires and floods.
  • 3. Example of Data Integrity
  • 4. Minimize Threats to Data Integrity There are many ways to minimize these threats to data integrity. these include: 1. Backing up data regularly 2. Controlling access to data via security mechanisms 3. Designing user interfaces that prevent the input of invalid data 4. Using error detection and correction software when transmitting data
  • 5. Your work is lost if you don't have a back- up copy. 1- Backing up data regularly Back up your critical data to an external medium. Some popular options are CDs, USB Flash drives
  • 6. 2- Controlling access to data via security mechanisms Organization must implement physical security mechanisms to maintain the data integrity.
  • 7. 3-Designing UI that prevent the input of invalid data
  • 8. 4- Use error detection and correction software In communications, error detection refers to a class of techniques for detecting garbled messages.The simplest and most common techniques are called Checksum. •Checksum
  • 9. How do I secure my Windows PC? Operating System Updates Antivirus Protection Use a Firewall
  • 10. What is difference between Data Integrity and Data Security? Data Integrity: • Making sure the data is correct and not corrupt. Data Security: • Making sure only the people who should have access to the data are the only ones who can access the data. also, keeping straight who can read the data and who can write data.
  • 11. Data Integrity Types in Database Unique Column Values Primary Key Values Referential Integrity Rule Complex Integrity Checking
  • 12. Null Integrity Constraint By default, all columns in a table allow nulls. Null means the absence of a value. A NOT NULL constraint requires a column of a table contain no null values.
  • 13. UNIQUE Key Integrity A UNIQUE key integrity constraint requires that every value in a column or set of columns (key) be unique.
  • 14. Primary Key Constraint Primary key is used to uniquely identify each row in a table. PK cannot be null
  • 15. Referential Integrity Constraint The following terms are associated with referential integrity constraints. **Foreign Key **Dependent/Child Table
  • 16. Complex Integrity Checking This type of foreign key references a parent key in the same table.
  • 17. More on integrity. . . • Enforcing business rules in the code of a database application • Using stored procedures to completely control access to data • Enforcing business rules with triggered stored database procedures
  • 19. Possible Risks Risk are involved: – Lost – Destroyed – Corrupted – Modified – Disclosed
  • 20. Possible Threads 1) Hacking “Use of a computer system without a specific, constructive purpose, or without proper authorization” 2) Virus “A computer program that is designed to replicate itself by copying itself into the other programs stored in a computer.” (source: www.answer.com)
  • 21. Data Protection 1) Backup “Backup in simple terms is an additional copy of all your important work on additional storage media like CD, DVD, Portable Hard disk, USB Flash drive or anything similar to that.
  • 22. Physical Protection of Data 1) Proper Monitoring System 2) Fireproof rooms 3) Can't Access Unauthorized Peoples 4) Proper Identification of Relevant Peoples
  • 23. Other Ways of Protection of Data 1) User Identity and Password 2) Write protected 3) Password Protected Files 4) Data Encryption