SlideShare a Scribd company logo
1 of 17
DBMS &
CYBERCRIME
Database Management System
Database
• Organized collection of logically related data is called Database.
• In a relational database, a data item is called a column or attribute, a
record is called a row or tuple, and a file is called a table.
DBMS
Database management system (DBMS) is a software system that enables the use of a
database approach.
The primary purpose of a DBMS is
– It provides a systematic method of creating, updating, storing, and retrieving the
data stored in a database.
– It enables end users and application programmers to share data, and
– it enables data to be shared among multiple applications.
Components
Components of DBMS
– A database management system (DBMS) consists of several components. Each
component plays very important role in the database management system
environment. The major components of database management system are:
– Software
– Hardware
– Data
– Procedures
– Database Access Language
Components
Software
– The main component of a DBMS is the software. It is the set of programs used to
handle the database and to control and manage the overall computerized database.
Hardware
• Hardware consists of a set of physical electronic devices such as computers with
associated I/O devices, storage devices that make interface between computers and
the real world systems etc and so on. It is impossible to implement the DBMS
without the hardware devices, In a network, a powerful computer with high data
processing speed and a storage device with large storage capacity is required as
database server.
Components
Data
– Data is the most important component of the DBMS. The main purpose of
DBMS is to process the data. In DBMS, databases are defined, constructed and
then data is stored, updated and retrieved to and from the databases. The
database contains both the actual (or operational) data and the metadata (data
about data or description about data).
Procedures
– Procedures refer to the instructions and rules that help to design the database
and to use the DBMS.
Components
Database Access Language
– The database access language is used to access the data to and from the
database. The users use the database access language to enter new data,
change the existing data in database and to retrieve required data from
databases.
– The most popular database access language is SQL (Structured Query
Language).
Users
– The users are the people who manage the databases and perform different
operations on the databases in the database system.
Keywords
– word or identifier that has a particular meaning. Database keywords are the
words that have unique meaning in Database . Example of some keywords(SQL)
are:
– DDL: Create, Alter, Drop, Truncate etc.
– DCL: Grant, Revoke etc.
– DML: Insert, Delete, Update etc.
Example of DB
Cyber Crime and Terrorism
Definition
– Cybercrime is defined as a crime in which a computer is the object of the crime
(hacking, phishing, spamming) or is used as a tool to commit an offense (child
pornography, hate crimes). Cybercriminals may use computer technology to
access personal information, business trade secrets, or use the Internet for
exploitive or malicious purposes. Criminals can also use computers for
communication and document or data storage. Criminals who perform these
illegal activities are often referred to as hackers.
– Cyberterrorism is a cyber attack using or exploiting computer or
communication networks to cause sufficient destruction to generate fear or
intimidate a society into an ideological goal.
Hacking
– Using a computer to enter another network
– Cost users $1.3 trillion in 2003
– Hackers motivation
– Recreational hacking
– Financial hackers
– Hacking methods
– Sniffing(Insecure data)
– Social engineering
– Spoofing(masquerades)
Online Spying Tool
– Cookies
– Files delivered from a web site
– Originally improved a site’s function
– Cookies now track history and passwords
– Browsers include cookie blocking tools
Online Spying Tool
– Spyware
– Software downloaded to a computer
– Designed to record personal information
– Typically undesired software
– Hides from users
– Several programs exist to eliminate
Online Spying Tool
– Web bugs
– Small programs embedded in gif images
– Gets around cookie blocking tools
– Companies use to track usage
– Blocked with spyware killers
Online Spying Tool
– Spam
– Unsolicited commercial email
– Networks and PCs need a spam blocker
– Stop spam before reaching the inbox
– Spammers acquire addresses using many methods
– CAN-SPAM Act passed in 2003

More Related Content

Similar to database management system and cybercrime

Cp 121 lecture 01
Cp 121 lecture 01Cp 121 lecture 01
Cp 121 lecture 01ITNet
 
dbms Lesson for the Engineering students.pdf
dbms Lesson for the Engineering students.pdfdbms Lesson for the Engineering students.pdf
dbms Lesson for the Engineering students.pdfhpndegreecollegesklm
 
Lecture-1.ppt
Lecture-1.pptLecture-1.ppt
Lecture-1.pptChSheraz3
 
Dbms environment and components ppt.pptx
Dbms environment and components ppt.pptxDbms environment and components ppt.pptx
Dbms environment and components ppt.pptxRITIKRAJ437758
 
Open Source Database Management Software available on the Net
Open Source Database Management Software available on the NetOpen Source Database Management Software available on the Net
Open Source Database Management Software available on the NetDlis Mu
 
Advantages And Disadvantages Of Database System
Advantages And Disadvantages Of Database SystemAdvantages And Disadvantages Of Database System
Advantages And Disadvantages Of Database SystemMarisela Stone
 
chapter 1-Introduction Fundamentals of database system.pdf
chapter 1-Introduction Fundamentals of database system.pdfchapter 1-Introduction Fundamentals of database system.pdf
chapter 1-Introduction Fundamentals of database system.pdfMisganawAbeje1
 
Introduction to RDBMS
Introduction to RDBMSIntroduction to RDBMS
Introduction to RDBMSSarmad Ali
 
database chap 1 and 2.pptx
database chap 1 and 2.pptxdatabase chap 1 and 2.pptx
database chap 1 and 2.pptxEliasasefa
 

Similar to database management system and cybercrime (20)

Dbms Useful PPT
Dbms Useful PPTDbms Useful PPT
Dbms Useful PPT
 
Cp 121 lecture 01
Cp 121 lecture 01Cp 121 lecture 01
Cp 121 lecture 01
 
Database, Lecture-1.ppt
Database, Lecture-1.pptDatabase, Lecture-1.ppt
Database, Lecture-1.ppt
 
dbms Lesson for the Engineering students.pdf
dbms Lesson for the Engineering students.pdfdbms Lesson for the Engineering students.pdf
dbms Lesson for the Engineering students.pdf
 
Lecture-1.ppt
Lecture-1.pptLecture-1.ppt
Lecture-1.ppt
 
Ch01
Ch01Ch01
Ch01
 
Database & dbms
Database & dbmsDatabase & dbms
Database & dbms
 
Dbms environment and components ppt.pptx
Dbms environment and components ppt.pptxDbms environment and components ppt.pptx
Dbms environment and components ppt.pptx
 
Open Source Database Management Software available on the Net
Open Source Database Management Software available on the NetOpen Source Database Management Software available on the Net
Open Source Database Management Software available on the Net
 
ppt on database management
ppt on database management ppt on database management
ppt on database management
 
Advantages And Disadvantages Of Database System
Advantages And Disadvantages Of Database SystemAdvantages And Disadvantages Of Database System
Advantages And Disadvantages Of Database System
 
DB_Lec_1 and 2.pptx
DB_Lec_1 and 2.pptxDB_Lec_1 and 2.pptx
DB_Lec_1 and 2.pptx
 
DBMS Full.ppt
DBMS Full.pptDBMS Full.ppt
DBMS Full.ppt
 
Database ms priyanka
Database ms priyankaDatabase ms priyanka
Database ms priyanka
 
chapter 1-Introduction Fundamentals of database system.pdf
chapter 1-Introduction Fundamentals of database system.pdfchapter 1-Introduction Fundamentals of database system.pdf
chapter 1-Introduction Fundamentals of database system.pdf
 
Introduction to RDBMS
Introduction to RDBMSIntroduction to RDBMS
Introduction to RDBMS
 
Tahira I.T
Tahira I.TTahira I.T
Tahira I.T
 
database chap 1 and 2.pptx
database chap 1 and 2.pptxdatabase chap 1 and 2.pptx
database chap 1 and 2.pptx
 
DBMS.pptx
DBMS.pptxDBMS.pptx
DBMS.pptx
 
Ppt 2
Ppt 2Ppt 2
Ppt 2
 

More from Jubayer Alam Shoikat

Fundamentals of Quantitative Analysis
Fundamentals of Quantitative AnalysisFundamentals of Quantitative Analysis
Fundamentals of Quantitative AnalysisJubayer Alam Shoikat
 
Five methods for managing conflict
Five methods for managing conflictFive methods for managing conflict
Five methods for managing conflictJubayer Alam Shoikat
 
Managing Conflict, Politics, and Negotiation
Managing Conflict, Politics, and NegotiationManaging Conflict, Politics, and Negotiation
Managing Conflict, Politics, and NegotiationJubayer Alam Shoikat
 
Introductory class of conflict management
Introductory class of conflict managementIntroductory class of conflict management
Introductory class of conflict managementJubayer Alam Shoikat
 
Differences between legal compliances and managing diversity
Differences between legal compliances and managing diversityDifferences between legal compliances and managing diversity
Differences between legal compliances and managing diversityJubayer Alam Shoikat
 
Database Management System and CYBERCRIME
Database Management System and CYBERCRIMEDatabase Management System and CYBERCRIME
Database Management System and CYBERCRIMEJubayer Alam Shoikat
 
Data Communications and Computer Networks
Data Communications and Computer Networks Data Communications and Computer Networks
Data Communications and Computer Networks Jubayer Alam Shoikat
 
10 years annual report of Grameenphone
10 years annual report of Grameenphone10 years annual report of Grameenphone
10 years annual report of GrameenphoneJubayer Alam Shoikat
 

More from Jubayer Alam Shoikat (20)

Fundamentals of Quantitative Analysis
Fundamentals of Quantitative AnalysisFundamentals of Quantitative Analysis
Fundamentals of Quantitative Analysis
 
Five methods for managing conflict
Five methods for managing conflictFive methods for managing conflict
Five methods for managing conflict
 
Human Capital Trends 2017- 2020
Human Capital Trends 2017- 2020Human Capital Trends 2017- 2020
Human Capital Trends 2017- 2020
 
Conflict in Organizations
Conflict in OrganizationsConflict in Organizations
Conflict in Organizations
 
Managing Conflict, Politics, and Negotiation
Managing Conflict, Politics, and NegotiationManaging Conflict, Politics, and Negotiation
Managing Conflict, Politics, and Negotiation
 
Introductory class of conflict management
Introductory class of conflict managementIntroductory class of conflict management
Introductory class of conflict management
 
Differences between legal compliances and managing diversity
Differences between legal compliances and managing diversityDifferences between legal compliances and managing diversity
Differences between legal compliances and managing diversity
 
Capital budgeting
Capital budgetingCapital budgeting
Capital budgeting
 
Database Management System and CYBERCRIME
Database Management System and CYBERCRIMEDatabase Management System and CYBERCRIME
Database Management System and CYBERCRIME
 
Basic organization of computer
 Basic organization of computer Basic organization of computer
Basic organization of computer
 
Number Systems
Number SystemsNumber Systems
Number Systems
 
Operating System
Operating System Operating System
Operating System
 
Data Communications and Computer Networks
Data Communications and Computer Networks Data Communications and Computer Networks
Data Communications and Computer Networks
 
Fundamentals of Computer
Fundamentals of ComputerFundamentals of Computer
Fundamentals of Computer
 
Marketing Strategy
Marketing StrategyMarketing Strategy
Marketing Strategy
 
Fundamental of Management
Fundamental of ManagementFundamental of Management
Fundamental of Management
 
International Business
International BusinessInternational Business
International Business
 
Accounting Cycle (Work Sheet)
Accounting Cycle (Work Sheet)Accounting Cycle (Work Sheet)
Accounting Cycle (Work Sheet)
 
An assignment on annual reprot gp
An assignment on annual reprot gpAn assignment on annual reprot gp
An assignment on annual reprot gp
 
10 years annual report of Grameenphone
10 years annual report of Grameenphone10 years annual report of Grameenphone
10 years annual report of Grameenphone
 

Recently uploaded

Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxolyaivanovalion
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingNeil Barnes
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxJohnnyPlasten
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfSocial Samosa
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一ffjhghh
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfMarinCaroMartnezBerg
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiSuhani Kapoor
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionfulawalesam
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptSonatrach
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz1
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFxolyaivanovalion
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...Suhani Kapoor
 
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxRavak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxolyaivanovalion
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxolyaivanovalion
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxolyaivanovalion
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationshipsccctableauusergroup
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusTimothy Spann
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptxthyngster
 

Recently uploaded (20)

Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFx
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data Storytelling
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptx
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interaction
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in  KishangarhDelhi 99530 vip 56974 Genuine Escort Service Call Girls in  Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFx
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
 
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxRavak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptx
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptx
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptx
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and Milvus
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
 

database management system and cybercrime

  • 3. Database • Organized collection of logically related data is called Database. • In a relational database, a data item is called a column or attribute, a record is called a row or tuple, and a file is called a table.
  • 4. DBMS Database management system (DBMS) is a software system that enables the use of a database approach. The primary purpose of a DBMS is – It provides a systematic method of creating, updating, storing, and retrieving the data stored in a database. – It enables end users and application programmers to share data, and – it enables data to be shared among multiple applications.
  • 5. Components Components of DBMS – A database management system (DBMS) consists of several components. Each component plays very important role in the database management system environment. The major components of database management system are: – Software – Hardware – Data – Procedures – Database Access Language
  • 6. Components Software – The main component of a DBMS is the software. It is the set of programs used to handle the database and to control and manage the overall computerized database. Hardware • Hardware consists of a set of physical electronic devices such as computers with associated I/O devices, storage devices that make interface between computers and the real world systems etc and so on. It is impossible to implement the DBMS without the hardware devices, In a network, a powerful computer with high data processing speed and a storage device with large storage capacity is required as database server.
  • 7. Components Data – Data is the most important component of the DBMS. The main purpose of DBMS is to process the data. In DBMS, databases are defined, constructed and then data is stored, updated and retrieved to and from the databases. The database contains both the actual (or operational) data and the metadata (data about data or description about data). Procedures – Procedures refer to the instructions and rules that help to design the database and to use the DBMS.
  • 8. Components Database Access Language – The database access language is used to access the data to and from the database. The users use the database access language to enter new data, change the existing data in database and to retrieve required data from databases. – The most popular database access language is SQL (Structured Query Language). Users – The users are the people who manage the databases and perform different operations on the databases in the database system.
  • 9. Keywords – word or identifier that has a particular meaning. Database keywords are the words that have unique meaning in Database . Example of some keywords(SQL) are: – DDL: Create, Alter, Drop, Truncate etc. – DCL: Grant, Revoke etc. – DML: Insert, Delete, Update etc.
  • 11. Cyber Crime and Terrorism
  • 12. Definition – Cybercrime is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming) or is used as a tool to commit an offense (child pornography, hate crimes). Cybercriminals may use computer technology to access personal information, business trade secrets, or use the Internet for exploitive or malicious purposes. Criminals can also use computers for communication and document or data storage. Criminals who perform these illegal activities are often referred to as hackers. – Cyberterrorism is a cyber attack using or exploiting computer or communication networks to cause sufficient destruction to generate fear or intimidate a society into an ideological goal.
  • 13. Hacking – Using a computer to enter another network – Cost users $1.3 trillion in 2003 – Hackers motivation – Recreational hacking – Financial hackers – Hacking methods – Sniffing(Insecure data) – Social engineering – Spoofing(masquerades)
  • 14. Online Spying Tool – Cookies – Files delivered from a web site – Originally improved a site’s function – Cookies now track history and passwords – Browsers include cookie blocking tools
  • 15. Online Spying Tool – Spyware – Software downloaded to a computer – Designed to record personal information – Typically undesired software – Hides from users – Several programs exist to eliminate
  • 16. Online Spying Tool – Web bugs – Small programs embedded in gif images – Gets around cookie blocking tools – Companies use to track usage – Blocked with spyware killers
  • 17. Online Spying Tool – Spam – Unsolicited commercial email – Networks and PCs need a spam blocker – Stop spam before reaching the inbox – Spammers acquire addresses using many methods – CAN-SPAM Act passed in 2003