SlideShare a Scribd company logo
1 of 17
DBMS &
CYBERCRIME
Database Management System
Database
• Organized collection of logically related data is called Database.
• In a relational database, a data item is called a column or attribute, a
record is called a row or tuple, and a file is called a table.
DBMS
Database management system (DBMS) is a software system that enables the use of a
database approach.
The primary purpose of a DBMS is
– It provides a systematic method of creating, updating, storing, and retrieving the
data stored in a database.
– It enables end users and application programmers to share data, and
– it enables data to be shared among multiple applications.
Components
Components of DBMS
– A database management system (DBMS) consists of several components. Each
component plays very important role in the database management system
environment. The major components of database management system are:
– Software
– Hardware
– Data
– Procedures
– Database Access Language
Components
Software
– The main component of a DBMS is the software. It is the set of programs used to
handle the database and to control and manage the overall computerized database.
Hardware
• Hardware consists of a set of physical electronic devices such as computers with
associated I/O devices, storage devices that make interface between computers and
the real world systems etc and so on. It is impossible to implement the DBMS
without the hardware devices, In a network, a powerful computer with high data
processing speed and a storage device with large storage capacity is required as
database server.
Components
Data
– Data is the most important component of the DBMS. The main purpose of
DBMS is to process the data. In DBMS, databases are defined, constructed and
then data is stored, updated and retrieved to and from the databases. The
database contains both the actual (or operational) data and the metadata (data
about data or description about data).
Procedures
– Procedures refer to the instructions and rules that help to design the database
and to use the DBMS.
Components
Database Access Language
– The database access language is used to access the data to and from the
database. The users use the database access language to enter new data,
change the existing data in database and to retrieve required data from
databases.
– The most popular database access language is SQL (Structured Query
Language).
Users
– The users are the people who manage the databases and perform different
operations on the databases in the database system.
Keywords
– word or identifier that has a particular meaning. Database keywords are the
words that have unique meaning in Database . Example of some keywords(SQL)
are:
– DDL: Create, Alter, Drop, Truncate etc.
– DCL: Grant, Revoke etc.
– DML: Insert, Delete, Update etc.
Example of DB
Cyber Crime and Terrorism
Definition
– Cybercrime is defined as a crime in which a computer is the object of the crime
(hacking, phishing, spamming) or is used as a tool to commit an offense (child
pornography, hate crimes). Cybercriminals may use computer technology to
access personal information, business trade secrets, or use the Internet for
exploitive or malicious purposes. Criminals can also use computers for
communication and document or data storage. Criminals who perform these
illegal activities are often referred to as hackers.
– Cyberterrorism is a cyber attack using or exploiting computer or
communication networks to cause sufficient destruction to generate fear or
intimidate a society into an ideological goal.
Hacking
– Using a computer to enter another network
– Cost users $1.3 trillion in 2003
– Hackers motivation
– Recreational hacking
– Financial hackers
– Hacking methods
– Sniffing(Insecure data)
– Social engineering
– Spoofing(masquerades)
Online Spying Tool
– Cookies
– Files delivered from a web site
– Originally improved a site’s function
– Cookies now track history and passwords
– Browsers include cookie blocking tools
Online Spying Tool
– Spyware
– Software downloaded to a computer
– Designed to record personal information
– Typically undesired software
– Hides from users
– Several programs exist to eliminate
Online Spying Tool
– Web bugs
– Small programs embedded in gif images
– Gets around cookie blocking tools
– Companies use to track usage
– Blocked with spyware killers
Online Spying Tool
– Spam
– Unsolicited commercial email
– Networks and PCs need a spam blocker
– Stop spam before reaching the inbox
– Spammers acquire addresses using many methods
– CAN-SPAM Act passed in 2003

More Related Content

What's hot (18)

01 dbms-introduction
01 dbms-introduction01 dbms-introduction
01 dbms-introduction
 
Slide 4 dbms users
Slide 4 dbms usersSlide 4 dbms users
Slide 4 dbms users
 
Fundamentals of Database system - Databases and Database Users
Fundamentals of Database system - Databases and Database UsersFundamentals of Database system - Databases and Database Users
Fundamentals of Database system - Databases and Database Users
 
Complete first chapter rdbm 17332
Complete first chapter rdbm 17332Complete first chapter rdbm 17332
Complete first chapter rdbm 17332
 
Multimedia Database
Multimedia DatabaseMultimedia Database
Multimedia Database
 
Week 9
Week 9Week 9
Week 9
 
Data security
Data securityData security
Data security
 
Multimedia Database
Multimedia DatabaseMultimedia Database
Multimedia Database
 
Multimedia Database
Multimedia Database Multimedia Database
Multimedia Database
 
Database
DatabaseDatabase
Database
 
History of database processing module 1 (2)
History of database processing module 1 (2)History of database processing module 1 (2)
History of database processing module 1 (2)
 
Introduction to database
Introduction to databaseIntroduction to database
Introduction to database
 
Fs 5.1 information technology_kc
Fs 5.1 information technology_kcFs 5.1 information technology_kc
Fs 5.1 information technology_kc
 
Internet Search and DRM Issues
Internet Search and DRM IssuesInternet Search and DRM Issues
Internet Search and DRM Issues
 
MultiMedia dbms
MultiMedia dbmsMultiMedia dbms
MultiMedia dbms
 
Multimedia Database
Multimedia DatabaseMultimedia Database
Multimedia Database
 
Chapter one
Chapter oneChapter one
Chapter one
 
Emerging Trends and Impacts in IT & DSS
Emerging Trends and Impacts in IT & DSSEmerging Trends and Impacts in IT & DSS
Emerging Trends and Impacts in IT & DSS
 

Similar to Database Management System and CYBERCRIME

Cp 121 lecture 01
Cp 121 lecture 01Cp 121 lecture 01
Cp 121 lecture 01ITNet
 
dbms Lesson for the Engineering students.pdf
dbms Lesson for the Engineering students.pdfdbms Lesson for the Engineering students.pdf
dbms Lesson for the Engineering students.pdfhpndegreecollegesklm
 
Lecture-1.ppt
Lecture-1.pptLecture-1.ppt
Lecture-1.pptChSheraz3
 
Dbms environment and components ppt.pptx
Dbms environment and components ppt.pptxDbms environment and components ppt.pptx
Dbms environment and components ppt.pptxRITIKRAJ437758
 
Open Source Database Management Software available on the Net
Open Source Database Management Software available on the NetOpen Source Database Management Software available on the Net
Open Source Database Management Software available on the NetDlis Mu
 
Advantages And Disadvantages Of Database System
Advantages And Disadvantages Of Database SystemAdvantages And Disadvantages Of Database System
Advantages And Disadvantages Of Database SystemMarisela Stone
 
chapter 1-Introduction Fundamentals of database system.pdf
chapter 1-Introduction Fundamentals of database system.pdfchapter 1-Introduction Fundamentals of database system.pdf
chapter 1-Introduction Fundamentals of database system.pdfMisganawAbeje1
 
Introduction to RDBMS
Introduction to RDBMSIntroduction to RDBMS
Introduction to RDBMSSarmad Ali
 
database chap 1 and 2.pptx
database chap 1 and 2.pptxdatabase chap 1 and 2.pptx
database chap 1 and 2.pptxEliasasefa
 

Similar to Database Management System and CYBERCRIME (20)

Dbms Useful PPT
Dbms Useful PPTDbms Useful PPT
Dbms Useful PPT
 
Cp 121 lecture 01
Cp 121 lecture 01Cp 121 lecture 01
Cp 121 lecture 01
 
Database, Lecture-1.ppt
Database, Lecture-1.pptDatabase, Lecture-1.ppt
Database, Lecture-1.ppt
 
dbms Lesson for the Engineering students.pdf
dbms Lesson for the Engineering students.pdfdbms Lesson for the Engineering students.pdf
dbms Lesson for the Engineering students.pdf
 
Lecture-1.ppt
Lecture-1.pptLecture-1.ppt
Lecture-1.ppt
 
Ch01
Ch01Ch01
Ch01
 
Database & dbms
Database & dbmsDatabase & dbms
Database & dbms
 
Dbms environment and components ppt.pptx
Dbms environment and components ppt.pptxDbms environment and components ppt.pptx
Dbms environment and components ppt.pptx
 
Open Source Database Management Software available on the Net
Open Source Database Management Software available on the NetOpen Source Database Management Software available on the Net
Open Source Database Management Software available on the Net
 
ppt on database management
ppt on database management ppt on database management
ppt on database management
 
Advantages And Disadvantages Of Database System
Advantages And Disadvantages Of Database SystemAdvantages And Disadvantages Of Database System
Advantages And Disadvantages Of Database System
 
DB_Lec_1 and 2.pptx
DB_Lec_1 and 2.pptxDB_Lec_1 and 2.pptx
DB_Lec_1 and 2.pptx
 
DBMS Full.ppt
DBMS Full.pptDBMS Full.ppt
DBMS Full.ppt
 
chapter 1-Introduction Fundamentals of database system.pdf
chapter 1-Introduction Fundamentals of database system.pdfchapter 1-Introduction Fundamentals of database system.pdf
chapter 1-Introduction Fundamentals of database system.pdf
 
Introduction to RDBMS
Introduction to RDBMSIntroduction to RDBMS
Introduction to RDBMS
 
Tahira I.T
Tahira I.TTahira I.T
Tahira I.T
 
database chap 1 and 2.pptx
database chap 1 and 2.pptxdatabase chap 1 and 2.pptx
database chap 1 and 2.pptx
 
DBMS.pptx
DBMS.pptxDBMS.pptx
DBMS.pptx
 
Ppt 2
Ppt 2Ppt 2
Ppt 2
 
Dbms
DbmsDbms
Dbms
 

More from Jubayer Alam Shoikat

Fundamentals of Quantitative Analysis
Fundamentals of Quantitative AnalysisFundamentals of Quantitative Analysis
Fundamentals of Quantitative AnalysisJubayer Alam Shoikat
 
Five methods for managing conflict
Five methods for managing conflictFive methods for managing conflict
Five methods for managing conflictJubayer Alam Shoikat
 
Managing Conflict, Politics, and Negotiation
Managing Conflict, Politics, and NegotiationManaging Conflict, Politics, and Negotiation
Managing Conflict, Politics, and NegotiationJubayer Alam Shoikat
 
Introductory class of conflict management
Introductory class of conflict managementIntroductory class of conflict management
Introductory class of conflict managementJubayer Alam Shoikat
 
Differences between legal compliances and managing diversity
Differences between legal compliances and managing diversityDifferences between legal compliances and managing diversity
Differences between legal compliances and managing diversityJubayer Alam Shoikat
 
database management system and cybercrime
database management system and cybercrimedatabase management system and cybercrime
database management system and cybercrimeJubayer Alam Shoikat
 
Data Communications and Computer Networks
Data Communications and Computer Networks Data Communications and Computer Networks
Data Communications and Computer Networks Jubayer Alam Shoikat
 
10 years annual report of Grameenphone
10 years annual report of Grameenphone10 years annual report of Grameenphone
10 years annual report of GrameenphoneJubayer Alam Shoikat
 

More from Jubayer Alam Shoikat (20)

Fundamentals of Quantitative Analysis
Fundamentals of Quantitative AnalysisFundamentals of Quantitative Analysis
Fundamentals of Quantitative Analysis
 
Five methods for managing conflict
Five methods for managing conflictFive methods for managing conflict
Five methods for managing conflict
 
Human Capital Trends 2017- 2020
Human Capital Trends 2017- 2020Human Capital Trends 2017- 2020
Human Capital Trends 2017- 2020
 
Conflict in Organizations
Conflict in OrganizationsConflict in Organizations
Conflict in Organizations
 
Managing Conflict, Politics, and Negotiation
Managing Conflict, Politics, and NegotiationManaging Conflict, Politics, and Negotiation
Managing Conflict, Politics, and Negotiation
 
Introductory class of conflict management
Introductory class of conflict managementIntroductory class of conflict management
Introductory class of conflict management
 
Differences between legal compliances and managing diversity
Differences between legal compliances and managing diversityDifferences between legal compliances and managing diversity
Differences between legal compliances and managing diversity
 
Capital budgeting
Capital budgetingCapital budgeting
Capital budgeting
 
database management system and cybercrime
database management system and cybercrimedatabase management system and cybercrime
database management system and cybercrime
 
Basic organization of computer
 Basic organization of computer Basic organization of computer
Basic organization of computer
 
Number Systems
Number SystemsNumber Systems
Number Systems
 
Operating System
Operating System Operating System
Operating System
 
Data Communications and Computer Networks
Data Communications and Computer Networks Data Communications and Computer Networks
Data Communications and Computer Networks
 
Fundamentals of Computer
Fundamentals of ComputerFundamentals of Computer
Fundamentals of Computer
 
Marketing Strategy
Marketing StrategyMarketing Strategy
Marketing Strategy
 
Fundamental of Management
Fundamental of ManagementFundamental of Management
Fundamental of Management
 
International Business
International BusinessInternational Business
International Business
 
Accounting Cycle (Work Sheet)
Accounting Cycle (Work Sheet)Accounting Cycle (Work Sheet)
Accounting Cycle (Work Sheet)
 
An assignment on annual reprot gp
An assignment on annual reprot gpAn assignment on annual reprot gp
An assignment on annual reprot gp
 
10 years annual report of Grameenphone
10 years annual report of Grameenphone10 years annual report of Grameenphone
10 years annual report of Grameenphone
 

Recently uploaded

Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Identifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population MeanIdentifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population MeanMYRABACSAFRA2
 
ASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel CanterASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel Cantervoginip
 
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...Florian Roscheck
 
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...limedy534
 
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degreeyuu sss
 
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default  Presentation : Data Analysis Project PPTPredictive Analysis for Loan Default  Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPTBoston Institute of Analytics
 
Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 2Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 217djon017
 
Top 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In QueensTop 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In Queensdataanalyticsqueen03
 
20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdfHuman37
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...dajasot375
 
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSINGmarianagonzalez07
 
IMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptxIMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptxdolaknnilon
 
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Sapana Sha
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPramod Kumar Srivastava
 
RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.natarajan8993
 
Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Colleen Farrelly
 
GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]📊 Markus Baersch
 
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改yuu sss
 
How we prevented account sharing with MFA
How we prevented account sharing with MFAHow we prevented account sharing with MFA
How we prevented account sharing with MFAAndrei Kaleshka
 

Recently uploaded (20)

Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Identifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population MeanIdentifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population Mean
 
ASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel CanterASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel Canter
 
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
 
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
 
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
 
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default  Presentation : Data Analysis Project PPTPredictive Analysis for Loan Default  Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
 
Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 2Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 2
 
Top 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In QueensTop 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In Queens
 
20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
 
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING
 
IMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptxIMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptx
 
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
 
RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.
 
Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024
 
GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]
 
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
 
How we prevented account sharing with MFA
How we prevented account sharing with MFAHow we prevented account sharing with MFA
How we prevented account sharing with MFA
 

Database Management System and CYBERCRIME

  • 3. Database • Organized collection of logically related data is called Database. • In a relational database, a data item is called a column or attribute, a record is called a row or tuple, and a file is called a table.
  • 4. DBMS Database management system (DBMS) is a software system that enables the use of a database approach. The primary purpose of a DBMS is – It provides a systematic method of creating, updating, storing, and retrieving the data stored in a database. – It enables end users and application programmers to share data, and – it enables data to be shared among multiple applications.
  • 5. Components Components of DBMS – A database management system (DBMS) consists of several components. Each component plays very important role in the database management system environment. The major components of database management system are: – Software – Hardware – Data – Procedures – Database Access Language
  • 6. Components Software – The main component of a DBMS is the software. It is the set of programs used to handle the database and to control and manage the overall computerized database. Hardware • Hardware consists of a set of physical electronic devices such as computers with associated I/O devices, storage devices that make interface between computers and the real world systems etc and so on. It is impossible to implement the DBMS without the hardware devices, In a network, a powerful computer with high data processing speed and a storage device with large storage capacity is required as database server.
  • 7. Components Data – Data is the most important component of the DBMS. The main purpose of DBMS is to process the data. In DBMS, databases are defined, constructed and then data is stored, updated and retrieved to and from the databases. The database contains both the actual (or operational) data and the metadata (data about data or description about data). Procedures – Procedures refer to the instructions and rules that help to design the database and to use the DBMS.
  • 8. Components Database Access Language – The database access language is used to access the data to and from the database. The users use the database access language to enter new data, change the existing data in database and to retrieve required data from databases. – The most popular database access language is SQL (Structured Query Language). Users – The users are the people who manage the databases and perform different operations on the databases in the database system.
  • 9. Keywords – word or identifier that has a particular meaning. Database keywords are the words that have unique meaning in Database . Example of some keywords(SQL) are: – DDL: Create, Alter, Drop, Truncate etc. – DCL: Grant, Revoke etc. – DML: Insert, Delete, Update etc.
  • 11. Cyber Crime and Terrorism
  • 12. Definition – Cybercrime is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming) or is used as a tool to commit an offense (child pornography, hate crimes). Cybercriminals may use computer technology to access personal information, business trade secrets, or use the Internet for exploitive or malicious purposes. Criminals can also use computers for communication and document or data storage. Criminals who perform these illegal activities are often referred to as hackers. – Cyberterrorism is a cyber attack using or exploiting computer or communication networks to cause sufficient destruction to generate fear or intimidate a society into an ideological goal.
  • 13. Hacking – Using a computer to enter another network – Cost users $1.3 trillion in 2003 – Hackers motivation – Recreational hacking – Financial hackers – Hacking methods – Sniffing(Insecure data) – Social engineering – Spoofing(masquerades)
  • 14. Online Spying Tool – Cookies – Files delivered from a web site – Originally improved a site’s function – Cookies now track history and passwords – Browsers include cookie blocking tools
  • 15. Online Spying Tool – Spyware – Software downloaded to a computer – Designed to record personal information – Typically undesired software – Hides from users – Several programs exist to eliminate
  • 16. Online Spying Tool – Web bugs – Small programs embedded in gif images – Gets around cookie blocking tools – Companies use to track usage – Blocked with spyware killers
  • 17. Online Spying Tool – Spam – Unsolicited commercial email – Networks and PCs need a spam blocker – Stop spam before reaching the inbox – Spammers acquire addresses using many methods – CAN-SPAM Act passed in 2003