3. Database
• Organized collection of logically related data is called Database.
• In a relational database, a data item is called a column or attribute, a
record is called a row or tuple, and a file is called a table.
4. DBMS
Database management system (DBMS) is a software system that enables the use of a
database approach.
The primary purpose of a DBMS is
– It provides a systematic method of creating, updating, storing, and retrieving the
data stored in a database.
– It enables end users and application programmers to share data, and
– it enables data to be shared among multiple applications.
5. Components
Components of DBMS
– A database management system (DBMS) consists of several components. Each
component plays very important role in the database management system
environment. The major components of database management system are:
– Software
– Hardware
– Data
– Procedures
– Database Access Language
6. Components
Software
– The main component of a DBMS is the software. It is the set of programs used to
handle the database and to control and manage the overall computerized database.
Hardware
• Hardware consists of a set of physical electronic devices such as computers with
associated I/O devices, storage devices that make interface between computers and
the real world systems etc and so on. It is impossible to implement the DBMS
without the hardware devices, In a network, a powerful computer with high data
processing speed and a storage device with large storage capacity is required as
database server.
7. Components
Data
– Data is the most important component of the DBMS. The main purpose of
DBMS is to process the data. In DBMS, databases are defined, constructed and
then data is stored, updated and retrieved to and from the databases. The
database contains both the actual (or operational) data and the metadata (data
about data or description about data).
Procedures
– Procedures refer to the instructions and rules that help to design the database
and to use the DBMS.
8. Components
Database Access Language
– The database access language is used to access the data to and from the
database. The users use the database access language to enter new data,
change the existing data in database and to retrieve required data from
databases.
– The most popular database access language is SQL (Structured Query
Language).
Users
– The users are the people who manage the databases and perform different
operations on the databases in the database system.
9. Keywords
– word or identifier that has a particular meaning. Database keywords are the
words that have unique meaning in Database . Example of some keywords(SQL)
are:
– DDL: Create, Alter, Drop, Truncate etc.
– DCL: Grant, Revoke etc.
– DML: Insert, Delete, Update etc.
12. Definition
– Cybercrime is defined as a crime in which a computer is the object of the crime
(hacking, phishing, spamming) or is used as a tool to commit an offense (child
pornography, hate crimes). Cybercriminals may use computer technology to
access personal information, business trade secrets, or use the Internet for
exploitive or malicious purposes. Criminals can also use computers for
communication and document or data storage. Criminals who perform these
illegal activities are often referred to as hackers.
– Cyberterrorism is a cyber attack using or exploiting computer or
communication networks to cause sufficient destruction to generate fear or
intimidate a society into an ideological goal.
13. Hacking
– Using a computer to enter another network
– Cost users $1.3 trillion in 2003
– Hackers motivation
– Recreational hacking
– Financial hackers
– Hacking methods
– Sniffing(Insecure data)
– Social engineering
– Spoofing(masquerades)
14. Online Spying Tool
– Cookies
– Files delivered from a web site
– Originally improved a site’s function
– Cookies now track history and passwords
– Browsers include cookie blocking tools
15. Online Spying Tool
– Spyware
– Software downloaded to a computer
– Designed to record personal information
– Typically undesired software
– Hides from users
– Several programs exist to eliminate
16. Online Spying Tool
– Web bugs
– Small programs embedded in gif images
– Gets around cookie blocking tools
– Companies use to track usage
– Blocked with spyware killers
17. Online Spying Tool
– Spam
– Unsolicited commercial email
– Networks and PCs need a spam blocker
– Stop spam before reaching the inbox
– Spammers acquire addresses using many methods
– CAN-SPAM Act passed in 2003