SlideShare a Scribd company logo
1 of 24
ANAG THE DIGITAL FIRM
January 22, 2013
Prepared By:
Monzer Osama AL-Shaikh Warak
Under supervision of Dr. Wing Lam
The Databases applications in government
sections
THE ROLE OF DATABASE SYSTEM IN ANTI-TERRORIST
1
TheDatabasesapplicationsingovernmentsections|1/22/2013
Contents
OBJECTIVE ......................................................................................................................2
INTRODUCTION ...............................................................................................................2
SECTION ONE: THE DATABASE CONCEPT. ........................................................................................3
1. WHAT IS THE DATABASE? .................................................................................................3
2. DATABASE MANAGEMENT SYSTEM (DBMS)..............................................................................3
2.1 FUNCTIONS OF DBMS .....................................................................................................4
2.2 ADVANTAGE OF DBMS....................................................................................................4
3. POPULAR RDBMS ...........................................................................................................5
4. DATABASE SECURITY.......................................................................................................5
4.1 ACCESS CONTROL .............................................................................................6
4.2 PASSWORD MANAGEMENT ...................................................................................6
4.3 AUDITING .......................................................................................................7
4.4 DATABASE VULNERABILITY ...................................................................................7
5. DATABASE ENCRYPTION...................................................................................................7
6. DATA WAREHOUSE ........................................................................................................8
6.1 DATA WAREHOUSING FUNDAMENTALS.....................................................................9
6.2. OLTP AND OLAP ..............................................................................................9
6.3. DATA FLOW ...................................................................................................9
6.4. DATA MINING .................................................................................................9
6.5 DECISION MAKING USING A DATA WAREHOUSING ...................................................... 10
6.6 DATA WAREHOUSE MODELS ............................................................................... 10
7. BIOMETRIC DATABASE AND ITS USES................................................................................... 11
8. THE DATABASE BACKUP & RESTORE METHODOLOGIES AND CONCEPT.......................................... 12
8.1 BASIC CONCEPTS: ........................................................................................... 12
SECTION 2: DATABASE'S USAGE IN THE GOVERNMENT SECTORS ..................................................13
TECHNOLOGY IS CHANGING OUR LIVES AT AN UNPRECEDENTED PACE. THESE DAYS, ANY GOVERNMENT NOT
TRANSFORMED INTO THE TECHNOLOGY WILL CONSIDERED AS AN OUTDATED GOVERNMENT! ... 13
SECTION 3:THE ROLE OF DATABASE SYSTEM IN ANTI-TERRORIST .................................................15
9.1 HOW CAN THE NEW SYRIAN GOVERNMENT TAKE ADVANTAGE OF THE DATABASE SYSTEMS TO PROTECT
COUNTRY?.................................................................................................................. 16
9.1.1 DESIGN THE DATABASE: .................................................................................. 16
9.1.2. DATABASE TRIGGERS .................................................................................... 21
9.1.3. CARTER CENTER'S EXPERIENCE: USING TECHNOLOGY TO MAP CONFLICT IN SYRIA............ 22
CONCLUSION................................................................................................................. 22
REFERENCES.................................................................................................................. 23
2
TheDatabasesapplicationsingovernmentsections|1/22/2013
Objective
The main objective of this paper is to introduce the power of the database management
systems and to shine the light on databases’ technologies that may use in governments
sections (Health, Security, Educations, Traffic management etc.) as well as describe the
ways on how can the new Syrian's government take advantage of DBMS's role in anti-
terrorist.
Introduction
As a result of increased public awareness of the importance of information in all areas of
life led to finding ways to store, retrieve and manipulate data, which is known as a
databases.
Through this it would be possible to find the results and decision-making in order to
develop business systems using data and classified according to the characteristics and
nature of the work.
The database also provides measurement of maintain the security and data privacy.
Effectiveness of database management systems in the government sector are depends on
how to select the right solution that aligned with the government infrastructure and
processes that supports the achievement of government goals.
The structure of this paper is as follows:
In the First section:
I will describe the concept of the database and related technologies
In the second section:
I will explore some real-life examples on the database's usage in government sectors.
The last section of this paper I will be more detailed on how we could use the database
management system in anti-terrorist.
3
TheDatabasesapplicationsingovernmentsections|1/22/2013
Section one:
The Database Concept.
1. What Is the Database?
A database is a collection of interrelated data. It can also be described as a repository for
data. Database and database technology have a major impact on the growing use of
computers. Database plays an important role in almost all areas where computers are used.
A Database is used in business, engineering, commerce, law, education, medicine, and
library science. A database has the following properties
a) A database is a logical collection of data with some
inherent meaning.
b) A database representing/capturing the information
about a real world enterprise or part of an enterprise.
c) A database collected and maintained to serve
specific data management needs of the enterprise.
d) Activities of the enterprise are supported by the database and continually update the
database.
e) A database can be any size and complexity.
2. Database Management System (DBMS)
Database management system is a collection of programs that enables users to create and
maintain the database. It is an aggregate of data, software, hardware, and user that helps an
enterprise manage its operational data. The main function of a DBMS is to provide efficient
and reliable methods of data retrieval to many users.
Defining a database involves specifying the different
type of data types, constraints, and structures of the data
to be stored in the database. DBMS is a central system
which provides a common interface between the data
and the various programs and application. It also
provides a central location for the whole data.
4
TheDatabasesapplicationsingovernmentsections|1/22/2013
2.1 Functions of DBMS
a) Data Definition: The DBMS provides functions to define the structure of the data in
the application. Data Definition includes defining and modifying the record database
structure, include the type and size of fields and the various conditions to be satisfied
by the data in each field.
b) Data Manipulation: Once the data structure is defined data needs to be inserted,
modified and deleted. These functions which perform these operations are also part
of the DBMS. These functions can handle planned and unplanned data manipulation
needs.
c) Data Security and Integrity: The DBMS contains functions which handle the
security and integrity of data in the application. These can be easily developed by the
application and programmer, and need not code these functions in his/her programs.
d) Data Recovery and Concurrency: Recovery of data after a system failure and
concurrent access of records by multiple users also handled by the DBMS.
e) Performance: Optimizing the performance of the queries is one of the important
functions of DBMS. The DBMS has a set of programs forming the query optimizer
which evaluates the different implementations of a query and choose the best among
them.
f) Data Dictionary Maintenance: Marinating the Data Dictionary which contains the
data definition of the application is also one of the functions of a DBMS.
2.2 Advantage of DBMS
a) Controlling Redundancy: In DBMS, the data resides in one central database; the
various programs in the application can access data in different files. So data present
in one file don't need to be duplicated in another.
Such type of redundancy should be carefully controlled, eliminated and the DBMS
should be aware of it.
b) Data Consistency: Reduce data redundancy leads to better data consistency.
c) Data Integration: Since related data is stored in one single database, applying data
integrity is much easier. The functions in the DBMS can be used to enforce the
integrity rules in the application programs.
d) Data Sharing: Related data can be shared across programmes because data is stored
in a centralized manner.
e) Application Development Ease: The application programmer don't need to build the
functions for handling issues like security, concurrent access, data integrity etc.
The application programmer only needs to implement the application business rules.
5
TheDatabasesapplicationsingovernmentsections|1/22/2013
This will enhance application development ease. Adding extra functional modules is
also easier than in file-based system.
f) Data Independence: Data independence is isolating an upper level from the changes
in the organization or structure of a lower level.
g) Reduced Maintenance: Maintenance is less easy due to the centralized nature of the
system.
3. Popular RDBMS
Relational Database Management System (RDBMS) is Database Management System
(DBMS) that is based on relational model invented by E.F Codd. There are many databases
currently in use. Most of the databases are based on relational
database model.
SQL is the most popular RDBMS. SQL is the standard language
for Relational Database system. SQL is Structured Query
Language, which is used for storing, manipulating and retrieving
data that is stored in relational database.
All relational database management system like MS Access, MySQL, Sybase, Oracle,
Postgres, Sybase and SQL Server use SQL language as a standard relational database
management system.
4. Database Security
Database technologies have a major impact on the growing use of computers.
Because of the significance of data and information in databases of any field, they have to
be secure and protected. Database security is a growing concern evidenced by an increase in
the number of reported incidents or unauthorized exposure of sensitive data.
Maintaining database security is the responsibility of the database management system rather
than the operating system or application programme. Security is a major issue in any database
management system. Security is achieved by granting access right to authorized users.
Database security can be divided into three following objective:
a. Secrecy: Secrecy is concerned with improper disclosure of information.
Confidentiality and non-disclosure are other name of secrecy.
b. Integrity: Integrity is concerned with improper modification of information.
6
TheDatabasesapplicationsingovernmentsections|1/22/2013
c. Availability: Availability is concerned with improper denial of access to information.
These objectives arise in practically every database information system. Database security
contains a set of sub-topics, these includes access control, password management, database
vulnerability and auditing management.
4.1 Access Control
Access control is the process by which rights and privileges are assigned to users and
database objects. The primary method used to protect data is limiting access to the data.
The three mechanisms are distinctly different but usually used in combination with a focus
on access control for granularity in assigning rights to specific
objects and users. These are discretionary access control and
mandatory access control.
a. Discretionary Access Control: It controls the access by
applying a discretionary protection policy which governs
the user’s access to the information on the basis of user’s
identity and the rules that specify.
With DAC, we need to authorize each end user distinctly.
In future, if the group’s authority needs to change or be
cancelled and it will be a good idea to change each member’s exclusive right
separately, for this we need some kind of mechanism to make the access management
easy.
b. Mandatory Access Control: It is an access policy supported for systems that process
especially raw data. Systems that providing mandatory access controls must assign to
all subject to user and programme, and all object.
Mandatory Access Control use sensitivity labels to determine who can access the users
system. It implements a multi-level security policy for handling multiple information
classification at different security labels within a single computer system. A security
label associated with each data and each user.
4.2 Password Management
Most database system managements protect their end users password through implementing
and maintaining a password database. Using password management, access to the database
system will be controlled. Most of database management systems use their internal password
produced algorithm to produce the end user password randomly.
7
TheDatabasesapplicationsingovernmentsections|1/22/2013
Passwords produced by this method are difficult for people to remember. It is usually allowed
end user to change their password periodically. The password’s length should be no less than
8 characters.
4.3 Auditing
Database auditing is used to track database access and user activity. Auditing can be used to
identify the accessed database objects.
Database auditing does not prevent security breaches, but it does provide a way to if breaches
have occurred. It provides a functionality to collect a set of records to show that the system
is intact and work properly. Auditing is divided into internal auditing and external auditing.
Internal auditing is a system level auditing mechanism used to audit a database system
continuously. External auditing is an auditing invoked manually by functions exported to the
outside world.
4.4 Database Vulnerability
Security breaches are an increasing incident. As more and more database accessible via the
internet and web based applications, there is more chance to security threats will raise.
The objective of database security is to reduce susceptibility to these threats. The most known
database application vulnerability is SQL injection. SQL injections can happen when SQL
statements are dynamically created user input. The threat occurs when users enter malicious
code that tricks the database into executing unintended command, The vulnerability occurs
primarily because of the features of the SQL language that allow such things as embedding
comments, concatenating SQL statement separated by semicolons, and the capability to
extract query metadata from the database. The solution to stopping SQL injection is input
validation.
5. Database Encryption
Encryption can provide strong for data stored in database. But when developing a database
encryption strategy must take many factors into consideration. In database encryption, where
should be performed the encryption, how much data should be encrypted, what type of
encryption algorithm used, and who should have access to the encryption keys?
There is two type of encryption level used in database encryption.
a. Storage-level Encryption: It is well suited for encrypting files or entire directories
in an operating system. From a database perspective, storage level encryption has the
8
TheDatabasesapplicationsingovernmentsections|1/22/2013
advantage. On the other side, the storage subsystem has no knowledge of database
objects and its structure. The encryption strategy cannot be related with user
privileges. Thus, encrypting only portions of the database in order to decrease the
encryption overhead.
b. Database-level Encryption: It allows securing data when it is inserted or retrieved
from the database. The encryption strategy can be part of the database design and can
be related with user privileges. Database encryption can be done at various granulites,
such as tables, columns and rows. Depending on the level of integration of the
encryption feature and the DBMS, the encryption process may incur some changes to
the applications.
For both strategies, data is decrypted on the database server at runtime. Thus, the encryption
keys must be transmitted or kept with the encrypted data on the server side, providing a
limited protection against the server administrator.
6. Data Warehouse
A data warehouse is a subject-oriented, time-variant, integrated, and non-volatile collection
of data in support of managements’ decision making process. Data warehouse is a
semantically consistent data store that serves as a physical implementation of a decision
support data model and stores the
information on which an enterprise needs
to make strategic decision. Data warehouse
architecture is constructed by integrating
data from multiple sources to support
adhoc queries and analytical reporting.
Data warehouse provide on-line analytical
processing (OLAP) tools for the interactive
analysis of multidimensional data of for
effective data mining.
Data can be stored in different types of database. Data warehouse is also one type of database
architecture, which is a repository of multiple heterogeneous data sources, organized under
a single site in order to facilitate management decision making. Data warehouse technology
also includes data integrating, data cleaning, and online analytical processing (OLAP) as well
as the ability to view information from different angles.
9
TheDatabasesapplicationsingovernmentsections|1/22/2013
6.1 Data warehousing Fundamentals
A data warehouse is a special repository of data designed to support decision making. The
data used in decision making comes from operational systems and external sources. To create
the data warehouse, data are extracted from source systems, cleaned, transformed and loaded
into a data store. A data store is a place in the data warehouse.
The data in data warehouse have the following characteristics:
a. Subject Oriented: The Data are logically organized around the organization needs,
such as, customer needs, sales or items produced.
b. Integrated: All data of an organization are combined and analyze together.
c. Time Variant: All historical data are maintained in detail form.
d. Non-Volatile: The data are read only not updated or changed by users.
A data warehouse draws data from operational systems, but it is physically separate and
serves different purpose. Operational systems have their own database, and are used for
transaction processing. Once the warehouse is created, users access the data in the warehouse
using tools and generate SQL (structure query language) queries Data warehousing is a
broader term and is used to describe, maintain, creation, and continuous checking of the data
in the warehouse.
6.2. OLTP and OLAP
An on-line operational system was to perform transaction and query processing. So they are
also termed as on-line transaction processing system (OLTP). Data warehouse systems serve
users in the role of data analysis and decision making. Such type of systems can organize
and present data in various formats according the needs of the different users, are called on-
line analytical processing system (OLAP).
6.3. Data Flow
The data flows from one or more sources database to intermediate staging area, and finally
into the data warehouse. At each stage there are data quality tools available to transform the
data and this will enhance the usability of the data once it resides in the data warehouses.
6.4. Data Mining
Data mining is the extraction or mining of knowledge from a large amount of data in data
warehouse. Data mining is the process of applying intelligent methods to extract data
10
TheDatabasesapplicationsingovernmentsections|1/22/2013
patterns. To do this extraction data mining combines statistical analysis, artificial
intelligence, and database management systems to extract knowledge from stored data.
6.5 Decision making using a Data Warehousing
A Decision Support System is a tool used to improve the process of decision making in
complex system. A DSS allows a subsequent decision to be made and employ artificial
intelligence that provides detailed querying across a large datasets.
The most important application areas of DSS are those complicated systems that directly
answer questions. The data warehouse environment is more controlled and more reliable for
decision support system by providing high quality information, effective cleaning routines,
and valid data transformation rules and documented pre-summarization of data values.
Data Warehouse integrates data from multiple heterogeneous information sources and
transforms into multidimensional decision support systems. Data warehouse contains data
sources, operational data stores, data staging area, the global data warehouse, and data mart.
The data warehouse architecture must evolve to efficiently support the decision making
process within the organization that owns the data warehouse. All the data warehouse
components, process and data should be tracked and administrated by a metadata repository.
6.6 Data Warehouse Models
There are three data warehouse models used according to architectural point of view:
a. Enterprise Warehouse
• Collects all of the information about the entire organization.
• Provides organization wide data integration, usually from one or more
operational systems, and is cross-functional in scope.
• It contains detailed data as well as summarized data.
• Enterprise warehouse may be implemented on traditional mainframes.
b. Data Mart
• It contains data of a specific group of users, and its scope is confined to selected
subjects.
• Data marts are usually implemented on UNIX and window based server.
• The data in data mart can be summarized.
11
TheDatabasesapplicationsingovernmentsections|1/22/2013
c. Virtual Warehouse
• It is a set of views as compare to operational databases.
• It is easy to build but require excess capacity to database servers.
• Some of the possible views may be materialized for efficient query processing.
7. Biometric Database and its uses
Biometric database refers to any computer data that is created during biometric process. The
biometric database includes biometric process such as, verification, identification, samples,
models, similarity, fingerprints etc, also in biometric, data are excluding the individuals name
and demographics location.
a) Biometric database is used to study human characteristics and their traits.
b) The purpose of biometric database is to identify individuals and group of people who
are under surveillance.
c) Biometric database is also used in computer science as a form of identification and
access control.
d) In biometric process, identification mode can be used to identify the person in two
ways either positive recognition or negative recognition.
e) The data collected during biometric process may be used in many ways. For example,
biometric security that utilizes the employees DNA profile could also be used for
various genetic diseases and undesirable traits.
12
TheDatabasesapplicationsingovernmentsections|1/22/2013
8. The Database Backup & Restore methodologies and concept
Backup and recovery of database refers to various strategies and procedures that protecting
your database against data loss and also provide backup of any kind of data loss. Backup can
be divided into physical backups and logical backups.
a. In physical backups, physical files are used in storing
and recovering the database, such as control files, data
files and log files. Physical backups are the foundation of
any sound backup and recovery strategy.
b. A logical backup contains logical data such as, tables and
stored procedures. It is stored in a binary file. Logical
backups are a useful supplement to physical in many
cases.
8.1 Basic Concepts:
The physical structures of the database and the recovery process determine in the forms of
backup and recovery. The following basic concepts used in database backup and recovery.
a. Data Files and Data Blocks: When a database consists one or more files called data
files. The database would have one table space stored in one data file. The database
supervises the storage spaces in the data files of a database is called data blocks. Data
blocks are smallest units of storage of the database.
b. Redo Logs: Redo logs records all changes made to a database’s data files. Each time
data is changed in the database, that changes first online redo log, before it is applied
to the data files.
c. Control Files: The control file contains the record of physical structures of the
database and their status. Control files contains several types of information such as,
database information, table space and data file records, log records and information
about corrupt data files
d. Undo Segments: When data in a data file is updated of that data in database are
written into undo segments. Undo information can be used to restore the original data
file contents. When a transaction is rolled back.
13
TheDatabasesapplicationsingovernmentsections|1/22/2013
Section 2:
Database's usage in the government sectors
Technology is changing our lives at an unprecedented pace. These days, any government
not transformed into the technology will considered as an outdated government!
While the data entry is huge and from many parts in the government systems, the DBMS is
playing an important role, the examples below show the importance of adapting DBMS in
governmental sectors:
1- In Health sector
The government in Turkey adopted the technology well in the health care sector.
In 2014, the number of employees working in the healthcare sector is 650,000
employees, in the plan of Ministry of Health, they are aiming for employer 715,000
employees in 2015, then 1,100,000 employees in 2023.healthcare sector
It will be impossible to manage these huge number of employees that will treating
millions of patients if there is no DBMS. Therefore, there is a global database
contains all patients historical data. For example, If any patient went to any hospital
in Turkey, his symptoms' details, medical analysis, X-Rays result, and the Prescribed
medication will registered in that database, Thus if he go to any other hospital or
Polyclinic, their medical records will be available, also, the pharmacies also has an
accessibility to that data, so they can give the right medicines without mistakes.
Moreover, the patient has ability to book the appointment at any hospital or
Polyclinic in Turkey through a mobile application by using his national ID!
2- In Traffic management sector
The Dubai police use ANPR (Automatic number plate recognition) cameras to
monitor vehicles in front and either side of the patrol car, this is a mass surveillance
method that uses optical character recognition on
images to read vehicle registration plates.
This plate's number registered in a central database to
record all traffic violations and in searching for wanted
cars.
14
TheDatabasesapplicationsingovernmentsections|1/22/2013
3- In Educations sector
Today in education sectors, most universities – like ours- provide their students
online education and other services such as Student registration, student
performance, E-library etc.
If we compare the universities today vs 15 years ago in some counties; students were
had to visit the university and stand in a long queue to make the registration process,
as well as they had to search on shelf within the books about what they want!
Today, most university use the database in a backend to be used online and make all
processes is much easier, in additional, we can't imagine how much the researches
were difficult in situation of all books were paper!
4- In Security sector
The British Home Office had a real-life example of securing their borders, by
adopting e-Borders system, It was intended to
provide a searchable record of everyone
entering and leaving the country, record their
passport number, email address and purpose
of visit, and generate a warning if anyone on a
terrorist or criminal watch list was arriving.
15
TheDatabasesapplicationsingovernmentsections|1/22/2013
Section 3:
THE ROLE OF DATABASE SYSTEM IN ANTI-
TERRORIST
The terrorists took advantage of new technologies and adapt them to serve their evil aims
where benefited from portable mobile devices and related satellite in addition to the use of
encrypted e-mail, and the Internet for training and recruitment, incitement and
communicate with each other and electronic circuits for timing and programming.
After the terrorist bombings of 11th
of September 2001 in the United States the technology
has become essential to play a role in helping countries that suffered terrorist and criminals
and promote security and stability in other countries of operations through the provision of
protection for the lives of innocent citizens, therefore, there was a demand to find methods
and techniques to monitor and follow the Suspects, either through observation of their
locations via satellite or their virtual positions on the web or monitor their communication
devices to know them and being able to reach them, and to limit the movement of terrorists
and make their movements more difficult through the activation of biotechnology and
published in the sensitive sites because they provide the possibility of these technologies
and greater ease in the automatic identification and verification of the suspects.
In March 2011, the Syrian revolution began with nationwide protests against dictator
president whose forces responded with violent crackdowns. The conflict gradually
morphed from popular protests to an armed rebellion after months of military sieges.
These conflict created a breeding ground to collect the terrorist's organizations from the
globe and each organization has his own agendas.
The political analysts expect that even if the current president went, those terrorist
organizations will still fighting each other's to reach to their goals and avoid the Syrian
Interim Government - which is elected by Syrian people - to reach the state presidency and
Ignite chaos and run another civilian war.
Based on above, Here's the role of the Syrian Interim Government to take the initiative and
start planning for transform into the technology and adopting the concept of database
technologies to limit the movement of terrorists and maintain the security.
16
TheDatabasesapplicationsingovernmentsections|1/22/2013
9.1 How can the new Syrian Government take advantage of the Database
systems to protect country?
9.1.1 Design the database:
The main and hardest task waiting the new Syrian government is to set a system create the
main database and minimize the paper documents as much as they can.
This database must be hosted in a secure data center and be accessible from anywhere in
Syria based on predefined access privilege's policy. The database must has – but not
limited to -the following tables:
• Citizens and residents table:
This table contain the main master data of citizens and residents people.
The data entry in this table will be mainly by civil affairs department and
immigration department.
• Criminals table:
This table contain the criminal records that happen in Syria by anyone.
The data entry in this table will be mainly by Police, Criminal investigation
department, courts...
• Passport's table:
It's contains the data of passports that issued for Syrian citizens.
The data entry in this table will be mainly by Passport General Department
• Fingerprint table
This table contain the data of all people that live over Syrians' cities (citizens,
Residents, and visitors)
The data entry in this table will be mainly by: Police, Border officers,
Ministry of the Interior, and other parties that need to verify identity.
• Citizens_Residents_Airports_TRX
This table contain the data of all countries has been visited in the past for all
people. This table will hold data of countries that everyone travel to or
coming from.
The data of this table should be updated automatically by the airline and
17
TheDatabasesapplicationsingovernmentsections|1/22/2013
airports systems.
• Travelers transactions
This table contain the data transaction of all people that traveling from/to
Syria through the airport, port, and land borders.
The data entry in this table will be mainly by the border officers.
• Wanted table
This table contains the data of all wanted people to be used on the country
borders to catch them while trying to travel
The data entry in this table will be mainly by the border officers, Police,
Ministry of the Interior, Criminal investigation department, court.
To maintain the integrity and accuracy of the data, the above tables must has a relationship
between their fields', as well as each tables should have a primary key, each table can have
only ONE primary key.
The figure below shown the Database structure and illustrate the tables' fields and
relationships between them. (This database created on Microsoft SQL Server 2012)
We can notes that the "Social_Num" and "Passport_Num" fields are existed in all tables,
that’s because we need to link everything with either Passport Numbers or Social Number.
Note:
There must be more than fields and tables than I mentioned above, but I'm try to focusing on the
concept by set a sample tables that may be used in the in maintain the security and tracking the
terrorists.
18
TheDatabasesapplicationsingovernmentsections|1/22/2013
Syrian government database's structure
After filling the database with a sample data, Let us now go through example and scenarios
to see how we may get benefits from above database.
19
TheDatabasesapplicationsingovernmentsections|1/22/2013
Scenario 1:
We may execute the below query on the database to the export all people that arrived
Aleppo's city from Bagdad (Iraq's capital) in a month period before 31/12/2013 and send it
to the investigators.
The result of above query presented 2 people who has arrived Aleppo coming from Iraq in
period between '01/12/2013' AND '31/12/2013'
SELECT dbo.Citizens_Residents.Social_Num, dbo.Citizens_Residents.Name, dbo.Citizens_Residents.[Father's name],
dbo.Citizens_Residents.[Family name], dbo.Citizens_Residents.Picture, dbo.Citizens_Residents.sex,
dbo.Citizens_Residents.[Present Address], dbo.Citizens_Residents.[Mobile number],
dbo.Citizens_Residents_Airports_TRX.Passport_Num, dbo.Citizens_Residents_Airports_TRX.TRX_port,
dbo.Citizens_Residents_Airports_TRX.TRX_date, dbo.Citizens_Residents_Airports_TRX.TRX_Type,
dbo.Citizens_Residents_Airports_TRX.Destination, dbo.Citizens_Residents.[Residency status]
FROM dbo.Citizens_Residents INNER JOIN dbo.Citizens_Residents_Airports_TRX ON
dbo.Citizens_Residents.Social_Num = dbo.Citizens_Residents_Airports_TRX.Social_Num
WHERE (dbo.Citizens_Residents_Airports_TRX.Destination = 'Bagdad') AND
(dbo.Citizens_Residents_Airports_TRX.TRX_Type = 'Arrive') AND (dbo.Citizens_Residents_Airports_TRX.TRX_date
BETWEEN '01/12/2013' AND '31/12/2013')
Example:
Let's suppose the there is a terrorist crime happen in Syria in Aleppo's city in 31/12/2013, and
the investigators have a doubt that there are the hands of terrorists originating
from Iraq, they found some tools that used by the terrorist and they scanned
the Fingerprints from that tools, that fingerprint converted into a binary
data by a special device and the fingerprint value was: 0111001011011110
20
TheDatabasesapplicationsingovernmentsections|1/22/2013
Scenario 2:
We may also run the below query to export the people who have one of their fingerprints
has a value equal 0111001011011110, regardless if he travelled or not!
The result of above query listed 2 persons one of their finger prints equal to 0111001011011110.
Now it's clear that "Kamil Hafiz Solo" is the suspect person because his left thumb
fingerprint's value equal 0111001011011110 as well as he was from the people who arrived from
Iraq in a month before the crime.
Now it's important to circulate suspect's
information to all security offices and country's
borders, and that may happening by inserting the
suspect's data into "Wanted" table,
The SQL code (in the right) will insert his data to
"Wanted" table.
SELECT dbo.Citizens_Residents.Name, dbo.Citizens_Residents.[Father's name], dbo.Citizens_Residents.[Family name],
dbo.Citizens_Residents.sex, dbo.Citizens_Residents.[Present Address], dbo.FingerPrints.Left_Thumb,
dbo.FingerPrints.[Left_Index finger], dbo.FingerPrints.Left_other_Fingers, dbo.FingerPrints.Right_Thumb,
dbo.FingerPrints.[Right_Index finger], dbo.FingerPrints.Right_other_Fingers
FROM dbo.FingerPrints INNER JOIN
dbo.Citizens_Residents ON dbo.FingerPrints.Social_Num = dbo.Citizens_Residents.Social_Num
WHERE (dbo.FingerPrints.Left_Thumb = '0111001011011110') OR
(dbo.FingerPrints.[Left_Index finger] = '0111001011011110') OR
(dbo.FingerPrints.Left_other_Fingers = '0111001011011110') OR
(dbo.FingerPrints.Right_Thumb = '0111001011011110') OR
(dbo.FingerPrints.[Right_Index finger] = '0111001011011110') OR
(dbo.FingerPrints.Right_other_Fingers = '0111001011011110')
USE [Syrian_Goverment]
GO
INSERT INTO [dbo].[Wanted]
([firts name]
,[family name]
,[social number]
,[Passport number])
VALUES
('Kamil', 'Solo', '2321092','1232123')
GO
21
TheDatabasesapplicationsingovernmentsections|1/22/2013
9.1.2. Database Triggers
To make the system is a tight system, we can take the advantage of "Database Triggers ".
A database trigger is procedural code that is automatically executed in response to certain
events on a particular table or view in a database. The trigger is mostly used for
maintaining the integrity of the information on the database.
Now in our example, we can create a trigger on a " Citizens_Residents_Airports_TRX"
table to be run at every transaction happening on that record, in other word, when any
people departure or arrive to Syria through any border (airport, seaport or land port) the
trigger will run and check if the person name listed in the "Wanted" table, in case of his
name is exist, the alert message will appear front of the airport officer to take the action.
Note3:
The users must use a friendly application that communicate with above database, and all above
queries and results should be executed and called through the application.
The purpose of above queries id to demonstrate how that data may processed in the database.
22
TheDatabasesapplicationsingovernmentsections|1/22/2013
9.1.3. Carter center's experience: Using Technology to Map Conflict in Syria
The Carter Center, in partnership with Emory University, is guided by a fundamental
commitment to human rights and the alleviation of human suffering. It seeks to prevent and
resolve conflicts, enhance freedom and democracy, and improve health.
This center launched Syria Conflict Mapping Project to examine the massive amounts of
citizen-generated information related to the Syrian conflict that is available online.
Specifically, the project:
1. details the growth of opposition armed groups in each governorate within Syria;
2. illuminates the evolution of armed opposition hierarchies at the local, regional, and
national levels;
3. documents the formation of pro-government paramilitary forces;
4. shows the current geographic delineation of pro and anti-government forces; and
5. Provides up-to-date analysis on the current state of the conflict.
Carter Center used Data analysis tools provided by "Palantir Technologies" in integrating,
analyzing, and visualizing the large
amounts of information collected
(like The Armed groups' videos, the
terrorist's activities on the social
media).
Conclusion
In this paper I tried to shine the light on the database concepts and exploring some examples
of its usage.
I come to the conclusion that, to build an arbitrator database management system, the
database structure must be designed well from the beginning based on the functional
requirements of the system we are aiming to build.
Other important thing – from my experience- it's very important to adjust the data inputs,
because the outputs is based on the input, and if the input is not accurate or has errors, the
output is also the same!
23
TheDatabasesapplicationsingovernmentsections|1/22/2013
References
• Abrams, M. J. (1995). Information security An integrated collection of Essays. IEEE Computer Society Press.
• Bertino, E. &. (2005). Database security—concepts, approaches, and challenges. IEEE Transactions actions on Dependable and
Secure Computing, , 2-18.
• Bhaskar, K. (1993). Computer Security: Threats and Countermeasures. published by NCC Blackwell.
• Chaudhuri, S. &. (1997). An Overview of Data Warehousing and OLAP Technology. SIGMOD Record 26:1, Mar, pp 65-74.
• Inmon, W. (1996). Building the Data Warehouse, Second Edition. New York: John Wiley & Sons.
• Jain AK, R. A. (2006). Biometrics: a tool for information. IEEE Trans Inform Forensics , Sec 1:125–143.
• Jaquith, A. (2007). Security metrics: Replacing fear, uncertainty, and doubt. Redwood City, CA: Addison- Wesley Professional.
• Kachur, R. (2000). Data Warehouse Management Handbook. Paramus: Prentice Hall.
• Navathe, E. &. (2007). Fundamentals of Database Systems (Sixth Edition). Pearson Publication.
• PJ, F. (2008). Biometric databases. In: Handbook of biometrics. Heidelberg: Springer.
• Yang, L. (2009). Teaching database security and auditing. Proceedings of the 40th ACM Technical Symposium on Computer
Science Education .
• Hospitals without Queues (2014). TV series Tourists Memoirs season 8 (Arabic), Dr. Ali Al Omari. Available from:
http://www.youtube.com/watch?v=tFgBf0TUSn0&feature=youtu.be (Accessed: 10 Jan 2015 GMT 14:11:06).
• Oweis, Khaled Yacoub; Solomon, Erika (22 February 2012). "Bombardment of Syria's Homeless kills 21 people".
Reuters. Retrieved 21 July 2014
• GeoVITe - Geodata Visualization & Interactive Training Environment, Image
URL:https://geodata.ethz.ch/resources/tutorials/L4GeodataManagement/en/html/unit_u2DataMana.html
acsessed:18/01/2015
• Attribute-Based Messaging and Security, Image URL:https://seclab.illinois.edu/attribute-based-messaging-and-
security, acsessed:18/01/2015
• Image URL:http://www.controlsystemworks.com/Product/Features/DataSources/Databases.aspx ,
acsessed:18/01/2015
• What are Biometrics?, Image URL:http://walkahwalkah.org/main/downloads/biometrics-primer/,
acsessed:18/01/2015
• Database trigger, Wikipedia, The Free Encyclopaedia. Wikimedia Foundation, Inc.
URL:http://en.wikipedia.org/wiki/Database_trigger, accessed at:21/01/2015
• Automatic number plate recognition, Wikipedia, The Free Encyclopaedia. Wikimedia Foundation, Inc.
URL:http://en.wikipedia.org/wiki/Automatic_number_plate_recognition, accessed at:21/01/2015
• "British Home Office", Why Do Projects Fail?, Aug 18th, 2014 url:http://calleam.com/WTPF/?p=6773, accessed
at 21/01/2015
• "Syria Conflict Mapping Project",Carter Center, URL:
http://www.cartercenter.org/peace/conflict_resolution/syria-conflict-mapping.html,accessed at:21/01/2015

More Related Content

What's hot

Supermarket Inventory Management System Development.pdf
Supermarket Inventory Management System Development.pdfSupermarket Inventory Management System Development.pdf
Supermarket Inventory Management System Development.pdfRenzGaming3
 
SRS and PMP of Smart Bio- Waste Management System
SRS and PMP of Smart Bio- Waste Management SystemSRS and PMP of Smart Bio- Waste Management System
SRS and PMP of Smart Bio- Waste Management SystemYahya Shuaibu
 
clinic database and software management system
clinic database and software management systemclinic database and software management system
clinic database and software management systemMujahed Ahmed
 
Thesis on Library Management System | LMS | Project Report
Thesis on Library Management System | LMS | Project ReportThesis on Library Management System | LMS | Project Report
Thesis on Library Management System | LMS | Project ReportManish Sahani
 
Hospital Management System
Hospital Management SystemHospital Management System
Hospital Management SystemRANJIT SINGH
 
Hospital management system in java
Hospital management system in javaHospital management system in java
Hospital management system in javaVarun Yadav
 
Project proposal of Library Management System.
Project proposal of Library Management System. Project proposal of Library Management System.
Project proposal of Library Management System. Arjishman Roy
 
Hospital Management System
Hospital Management SystemHospital Management System
Hospital Management SystemPranil Dukare
 
Class Management System Project Proposal
Class Management System Project ProposalClass Management System Project Proposal
Class Management System Project ProposalDhanushka Dissanayaka
 
Library management
Library managementLibrary management
Library managementfarouq umar
 
Food distribution management system
Food distribution management systemFood distribution management system
Food distribution management systemAmit P
 
Software Development Methodologies Library Management System (Part-1)
Software Development Methodologies Library Management System (Part-1)Software Development Methodologies Library Management System (Part-1)
Software Development Methodologies Library Management System (Part-1)Totan Banik
 
Chapter ii - Web-based Library Management System of East West Colleges
Chapter ii -  Web-based Library Management System of  East West CollegesChapter ii -  Web-based Library Management System of  East West Colleges
Chapter ii - Web-based Library Management System of East West CollegesNeil Mutia
 
library management system
library management systemlibrary management system
library management systemaniket chauhan
 
Online vehicle renting website
Online vehicle renting websiteOnline vehicle renting website
Online vehicle renting websiteSomendra Singh
 
System Proposal(Personal Information & Leave Management System)
System Proposal(Personal Information & Leave Management System)System Proposal(Personal Information & Leave Management System)
System Proposal(Personal Information & Leave Management System)Akila Jayarathna
 

What's hot (20)

Supermarket Inventory Management System Development.pdf
Supermarket Inventory Management System Development.pdfSupermarket Inventory Management System Development.pdf
Supermarket Inventory Management System Development.pdf
 
SRS and PMP of Smart Bio- Waste Management System
SRS and PMP of Smart Bio- Waste Management SystemSRS and PMP of Smart Bio- Waste Management System
SRS and PMP of Smart Bio- Waste Management System
 
clinic database and software management system
clinic database and software management systemclinic database and software management system
clinic database and software management system
 
Thesis on Library Management System | LMS | Project Report
Thesis on Library Management System | LMS | Project ReportThesis on Library Management System | LMS | Project Report
Thesis on Library Management System | LMS | Project Report
 
Hospital Management System
Hospital Management SystemHospital Management System
Hospital Management System
 
Srs library m s
Srs library m sSrs library m s
Srs library m s
 
Hospital management system in java
Hospital management system in javaHospital management system in java
Hospital management system in java
 
Project proposal of Library Management System.
Project proposal of Library Management System. Project proposal of Library Management System.
Project proposal of Library Management System.
 
Hospital Management System
Hospital Management SystemHospital Management System
Hospital Management System
 
Class Management System Project Proposal
Class Management System Project ProposalClass Management System Project Proposal
Class Management System Project Proposal
 
Library management
Library managementLibrary management
Library management
 
Hospital management-software-presentation
Hospital management-software-presentationHospital management-software-presentation
Hospital management-software-presentation
 
Food distribution management system
Food distribution management systemFood distribution management system
Food distribution management system
 
Software Development Methodologies Library Management System (Part-1)
Software Development Methodologies Library Management System (Part-1)Software Development Methodologies Library Management System (Part-1)
Software Development Methodologies Library Management System (Part-1)
 
tour management system
tour management systemtour management system
tour management system
 
Chapter ii - Web-based Library Management System of East West Colleges
Chapter ii -  Web-based Library Management System of  East West CollegesChapter ii -  Web-based Library Management System of  East West Colleges
Chapter ii - Web-based Library Management System of East West Colleges
 
library management system
library management systemlibrary management system
library management system
 
Online vehicle renting website
Online vehicle renting websiteOnline vehicle renting website
Online vehicle renting website
 
Hospital Management System
Hospital Management SystemHospital Management System
Hospital Management System
 
System Proposal(Personal Information & Leave Management System)
System Proposal(Personal Information & Leave Management System)System Proposal(Personal Information & Leave Management System)
System Proposal(Personal Information & Leave Management System)
 

Similar to Database Role Government Anti-Terrorism

DBMS-INTRODUCTION.pptx
DBMS-INTRODUCTION.pptxDBMS-INTRODUCTION.pptx
DBMS-INTRODUCTION.pptxDivyaKS12
 
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1Raj vardhan
 
Database Management System ( Dbms )
Database Management System ( Dbms )Database Management System ( Dbms )
Database Management System ( Dbms )Kimberly Brooks
 
Unit 2 rdbms study_material
Unit 2  rdbms study_materialUnit 2  rdbms study_material
Unit 2 rdbms study_materialgayaramesh
 
1. Chapter One.pdf
1. Chapter One.pdf1. Chapter One.pdf
1. Chapter One.pdffikadumola
 
WHAT IS A DBMS? EXPLAIN DIFFERENT MYSQL COMMANDS AND CONSTRAINTS OF THE SAME.
WHAT IS A DBMS? EXPLAIN DIFFERENT MYSQL COMMANDS AND  CONSTRAINTS OF THE SAME.WHAT IS A DBMS? EXPLAIN DIFFERENT MYSQL COMMANDS AND  CONSTRAINTS OF THE SAME.
WHAT IS A DBMS? EXPLAIN DIFFERENT MYSQL COMMANDS AND CONSTRAINTS OF THE SAME.`Shweta Bhavsar
 
Database Management Systems ( Dbms )
Database Management Systems ( Dbms )Database Management Systems ( Dbms )
Database Management Systems ( Dbms )Patty Buckley
 
We presented a list of capabilities that should be provided by the DB.pdf
We presented a list of capabilities that should be provided by the DB.pdfWe presented a list of capabilities that should be provided by the DB.pdf
We presented a list of capabilities that should be provided by the DB.pdfarchanacomputers1
 
Advantages And Disadvantages Of Database System
Advantages And Disadvantages Of Database SystemAdvantages And Disadvantages Of Database System
Advantages And Disadvantages Of Database SystemMarisela Stone
 
Database Management System.pptx
Database Management System.pptxDatabase Management System.pptx
Database Management System.pptxAaravSharma743156
 
data base unit one on what is databases.pptx
data base unit one on what is databases.pptxdata base unit one on what is databases.pptx
data base unit one on what is databases.pptxmulukendemis44
 
Data base management system
Data base management systemData base management system
Data base management systemSuneel Dogra
 

Similar to Database Role Government Anti-Terrorism (20)

DBMS-INTRODUCTION.pptx
DBMS-INTRODUCTION.pptxDBMS-INTRODUCTION.pptx
DBMS-INTRODUCTION.pptx
 
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
 
database ppt(2)
database ppt(2)database ppt(2)
database ppt(2)
 
Database Management System ( Dbms )
Database Management System ( Dbms )Database Management System ( Dbms )
Database Management System ( Dbms )
 
Unit 2 rdbms study_material
Unit 2  rdbms study_materialUnit 2  rdbms study_material
Unit 2 rdbms study_material
 
1. Chapter One.pdf
1. Chapter One.pdf1. Chapter One.pdf
1. Chapter One.pdf
 
Database & dbms
Database & dbmsDatabase & dbms
Database & dbms
 
WHAT IS A DBMS? EXPLAIN DIFFERENT MYSQL COMMANDS AND CONSTRAINTS OF THE SAME.
WHAT IS A DBMS? EXPLAIN DIFFERENT MYSQL COMMANDS AND  CONSTRAINTS OF THE SAME.WHAT IS A DBMS? EXPLAIN DIFFERENT MYSQL COMMANDS AND  CONSTRAINTS OF THE SAME.
WHAT IS A DBMS? EXPLAIN DIFFERENT MYSQL COMMANDS AND CONSTRAINTS OF THE SAME.
 
Database Management Systems ( Dbms )
Database Management Systems ( Dbms )Database Management Systems ( Dbms )
Database Management Systems ( Dbms )
 
We presented a list of capabilities that should be provided by the DB.pdf
We presented a list of capabilities that should be provided by the DB.pdfWe presented a list of capabilities that should be provided by the DB.pdf
We presented a list of capabilities that should be provided by the DB.pdf
 
Advantages And Disadvantages Of Database System
Advantages And Disadvantages Of Database SystemAdvantages And Disadvantages Of Database System
Advantages And Disadvantages Of Database System
 
Database Management System.pptx
Database Management System.pptxDatabase Management System.pptx
Database Management System.pptx
 
Ems
EmsEms
Ems
 
Database System Concepts
Database System ConceptsDatabase System Concepts
Database System Concepts
 
data base unit one on what is databases.pptx
data base unit one on what is databases.pptxdata base unit one on what is databases.pptx
data base unit one on what is databases.pptx
 
En ch01
En ch01En ch01
En ch01
 
Assign 1
Assign 1Assign 1
Assign 1
 
Dbms
DbmsDbms
Dbms
 
Data base management system
Data base management systemData base management system
Data base management system
 
Dbms
DbmsDbms
Dbms
 

More from Monzer Osama Alchikh WARAK

The Roles of Social Networks In Knowledge Management
The Roles of Social Networks In Knowledge ManagementThe Roles of Social Networks In Knowledge Management
The Roles of Social Networks In Knowledge ManagementMonzer Osama Alchikh WARAK
 
Business Model Framework using Knowledge Management
Business Model Framework using Knowledge ManagementBusiness Model Framework using Knowledge Management
Business Model Framework using Knowledge ManagementMonzer Osama Alchikh WARAK
 
Enterprise System Implementation at Alexandra Hospital .
Enterprise System Implementation at Alexandra Hospital .Enterprise System Implementation at Alexandra Hospital .
Enterprise System Implementation at Alexandra Hospital .Monzer Osama Alchikh WARAK
 
Launching and steering a green IT company The case of GreenField software
Launching and steering a green IT company    The case of GreenField softwareLaunching and steering a green IT company    The case of GreenField software
Launching and steering a green IT company The case of GreenField softwareMonzer Osama Alchikh WARAK
 
London Ambulance Services (LAS) In a state of Emergency
London Ambulance Services (LAS) In a state of EmergencyLondon Ambulance Services (LAS) In a state of Emergency
London Ambulance Services (LAS) In a state of EmergencyMonzer Osama Alchikh WARAK
 
Aviation spare parts supply chain management optimization at Cathay Pacific a...
Aviation spare parts supply chain management optimization at Cathay Pacific a...Aviation spare parts supply chain management optimization at Cathay Pacific a...
Aviation spare parts supply chain management optimization at Cathay Pacific a...Monzer Osama Alchikh WARAK
 
Customer-Focused and Process-Centric Supply Chain in Oil & Gas Industry
Customer-Focused and Process-Centric Supply Chain in Oil & Gas IndustryCustomer-Focused and Process-Centric Supply Chain in Oil & Gas Industry
Customer-Focused and Process-Centric Supply Chain in Oil & Gas IndustryMonzer Osama Alchikh WARAK
 
How can technology helps in overcoming the Project Management Challenges
How can technology helps in overcoming the Project Management Challenges How can technology helps in overcoming the Project Management Challenges
How can technology helps in overcoming the Project Management Challenges Monzer Osama Alchikh WARAK
 
IT Outsourcing and Core IS Capabilities: Challenges and Lessons at Dupont
IT Outsourcing and Core IS Capabilities: Challenges and Lessons at DupontIT Outsourcing and Core IS Capabilities: Challenges and Lessons at Dupont
IT Outsourcing and Core IS Capabilities: Challenges and Lessons at DupontMonzer Osama Alchikh WARAK
 

More from Monzer Osama Alchikh WARAK (19)

L'OREAL ERP Project
L'OREAL ERP ProjectL'OREAL ERP Project
L'OREAL ERP Project
 
Portfolio Management
Portfolio ManagementPortfolio Management
Portfolio Management
 
Virtual Project Management
Virtual Project ManagementVirtual Project Management
Virtual Project Management
 
Knowledge Management Implementation Road map
Knowledge Management Implementation Road mapKnowledge Management Implementation Road map
Knowledge Management Implementation Road map
 
The Roles of Social Networks In Knowledge Management
The Roles of Social Networks In Knowledge ManagementThe Roles of Social Networks In Knowledge Management
The Roles of Social Networks In Knowledge Management
 
Business Model Framework using Knowledge Management
Business Model Framework using Knowledge ManagementBusiness Model Framework using Knowledge Management
Business Model Framework using Knowledge Management
 
Enterprise System Implementation at Alexandra Hospital .
Enterprise System Implementation at Alexandra Hospital .Enterprise System Implementation at Alexandra Hospital .
Enterprise System Implementation at Alexandra Hospital .
 
Launching and steering a green IT company The case of GreenField software
Launching and steering a green IT company    The case of GreenField softwareLaunching and steering a green IT company    The case of GreenField software
Launching and steering a green IT company The case of GreenField software
 
Quality Management Practice in IT Projects
Quality Management Practice in IT ProjectsQuality Management Practice in IT Projects
Quality Management Practice in IT Projects
 
London Ambulance Services (LAS) In a state of Emergency
London Ambulance Services (LAS) In a state of EmergencyLondon Ambulance Services (LAS) In a state of Emergency
London Ambulance Services (LAS) In a state of Emergency
 
GE in India: The Growth Strategies
GE in India: The Growth StrategiesGE in India: The Growth Strategies
GE in India: The Growth Strategies
 
Aviation spare parts supply chain management optimization at Cathay Pacific a...
Aviation spare parts supply chain management optimization at Cathay Pacific a...Aviation spare parts supply chain management optimization at Cathay Pacific a...
Aviation spare parts supply chain management optimization at Cathay Pacific a...
 
Customer-Focused and Process-Centric Supply Chain in Oil & Gas Industry
Customer-Focused and Process-Centric Supply Chain in Oil & Gas IndustryCustomer-Focused and Process-Centric Supply Chain in Oil & Gas Industry
Customer-Focused and Process-Centric Supply Chain in Oil & Gas Industry
 
The Smart Dairy Farms
The Smart Dairy FarmsThe Smart Dairy Farms
The Smart Dairy Farms
 
How can technology helps in overcoming the Project Management Challenges
How can technology helps in overcoming the Project Management Challenges How can technology helps in overcoming the Project Management Challenges
How can technology helps in overcoming the Project Management Challenges
 
IT Outsourcing and Core IS Capabilities: Challenges and Lessons at Dupont
IT Outsourcing and Core IS Capabilities: Challenges and Lessons at DupontIT Outsourcing and Core IS Capabilities: Challenges and Lessons at Dupont
IT Outsourcing and Core IS Capabilities: Challenges and Lessons at Dupont
 
IS Projects Failures and Recommendations
IS Projects Failures and Recommendations IS Projects Failures and Recommendations
IS Projects Failures and Recommendations
 
Infosys’s Information System Strategy
Infosys’s Information System StrategyInfosys’s Information System Strategy
Infosys’s Information System Strategy
 
The role of social media in business’s grow
The role of social media in business’s growThe role of social media in business’s grow
The role of social media in business’s grow
 

Recently uploaded

Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 

Recently uploaded (20)

Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 

Database Role Government Anti-Terrorism

  • 1. ANAG THE DIGITAL FIRM January 22, 2013 Prepared By: Monzer Osama AL-Shaikh Warak Under supervision of Dr. Wing Lam The Databases applications in government sections THE ROLE OF DATABASE SYSTEM IN ANTI-TERRORIST
  • 2. 1 TheDatabasesapplicationsingovernmentsections|1/22/2013 Contents OBJECTIVE ......................................................................................................................2 INTRODUCTION ...............................................................................................................2 SECTION ONE: THE DATABASE CONCEPT. ........................................................................................3 1. WHAT IS THE DATABASE? .................................................................................................3 2. DATABASE MANAGEMENT SYSTEM (DBMS)..............................................................................3 2.1 FUNCTIONS OF DBMS .....................................................................................................4 2.2 ADVANTAGE OF DBMS....................................................................................................4 3. POPULAR RDBMS ...........................................................................................................5 4. DATABASE SECURITY.......................................................................................................5 4.1 ACCESS CONTROL .............................................................................................6 4.2 PASSWORD MANAGEMENT ...................................................................................6 4.3 AUDITING .......................................................................................................7 4.4 DATABASE VULNERABILITY ...................................................................................7 5. DATABASE ENCRYPTION...................................................................................................7 6. DATA WAREHOUSE ........................................................................................................8 6.1 DATA WAREHOUSING FUNDAMENTALS.....................................................................9 6.2. OLTP AND OLAP ..............................................................................................9 6.3. DATA FLOW ...................................................................................................9 6.4. DATA MINING .................................................................................................9 6.5 DECISION MAKING USING A DATA WAREHOUSING ...................................................... 10 6.6 DATA WAREHOUSE MODELS ............................................................................... 10 7. BIOMETRIC DATABASE AND ITS USES................................................................................... 11 8. THE DATABASE BACKUP & RESTORE METHODOLOGIES AND CONCEPT.......................................... 12 8.1 BASIC CONCEPTS: ........................................................................................... 12 SECTION 2: DATABASE'S USAGE IN THE GOVERNMENT SECTORS ..................................................13 TECHNOLOGY IS CHANGING OUR LIVES AT AN UNPRECEDENTED PACE. THESE DAYS, ANY GOVERNMENT NOT TRANSFORMED INTO THE TECHNOLOGY WILL CONSIDERED AS AN OUTDATED GOVERNMENT! ... 13 SECTION 3:THE ROLE OF DATABASE SYSTEM IN ANTI-TERRORIST .................................................15 9.1 HOW CAN THE NEW SYRIAN GOVERNMENT TAKE ADVANTAGE OF THE DATABASE SYSTEMS TO PROTECT COUNTRY?.................................................................................................................. 16 9.1.1 DESIGN THE DATABASE: .................................................................................. 16 9.1.2. DATABASE TRIGGERS .................................................................................... 21 9.1.3. CARTER CENTER'S EXPERIENCE: USING TECHNOLOGY TO MAP CONFLICT IN SYRIA............ 22 CONCLUSION................................................................................................................. 22 REFERENCES.................................................................................................................. 23
  • 3. 2 TheDatabasesapplicationsingovernmentsections|1/22/2013 Objective The main objective of this paper is to introduce the power of the database management systems and to shine the light on databases’ technologies that may use in governments sections (Health, Security, Educations, Traffic management etc.) as well as describe the ways on how can the new Syrian's government take advantage of DBMS's role in anti- terrorist. Introduction As a result of increased public awareness of the importance of information in all areas of life led to finding ways to store, retrieve and manipulate data, which is known as a databases. Through this it would be possible to find the results and decision-making in order to develop business systems using data and classified according to the characteristics and nature of the work. The database also provides measurement of maintain the security and data privacy. Effectiveness of database management systems in the government sector are depends on how to select the right solution that aligned with the government infrastructure and processes that supports the achievement of government goals. The structure of this paper is as follows: In the First section: I will describe the concept of the database and related technologies In the second section: I will explore some real-life examples on the database's usage in government sectors. The last section of this paper I will be more detailed on how we could use the database management system in anti-terrorist.
  • 4. 3 TheDatabasesapplicationsingovernmentsections|1/22/2013 Section one: The Database Concept. 1. What Is the Database? A database is a collection of interrelated data. It can also be described as a repository for data. Database and database technology have a major impact on the growing use of computers. Database plays an important role in almost all areas where computers are used. A Database is used in business, engineering, commerce, law, education, medicine, and library science. A database has the following properties a) A database is a logical collection of data with some inherent meaning. b) A database representing/capturing the information about a real world enterprise or part of an enterprise. c) A database collected and maintained to serve specific data management needs of the enterprise. d) Activities of the enterprise are supported by the database and continually update the database. e) A database can be any size and complexity. 2. Database Management System (DBMS) Database management system is a collection of programs that enables users to create and maintain the database. It is an aggregate of data, software, hardware, and user that helps an enterprise manage its operational data. The main function of a DBMS is to provide efficient and reliable methods of data retrieval to many users. Defining a database involves specifying the different type of data types, constraints, and structures of the data to be stored in the database. DBMS is a central system which provides a common interface between the data and the various programs and application. It also provides a central location for the whole data.
  • 5. 4 TheDatabasesapplicationsingovernmentsections|1/22/2013 2.1 Functions of DBMS a) Data Definition: The DBMS provides functions to define the structure of the data in the application. Data Definition includes defining and modifying the record database structure, include the type and size of fields and the various conditions to be satisfied by the data in each field. b) Data Manipulation: Once the data structure is defined data needs to be inserted, modified and deleted. These functions which perform these operations are also part of the DBMS. These functions can handle planned and unplanned data manipulation needs. c) Data Security and Integrity: The DBMS contains functions which handle the security and integrity of data in the application. These can be easily developed by the application and programmer, and need not code these functions in his/her programs. d) Data Recovery and Concurrency: Recovery of data after a system failure and concurrent access of records by multiple users also handled by the DBMS. e) Performance: Optimizing the performance of the queries is one of the important functions of DBMS. The DBMS has a set of programs forming the query optimizer which evaluates the different implementations of a query and choose the best among them. f) Data Dictionary Maintenance: Marinating the Data Dictionary which contains the data definition of the application is also one of the functions of a DBMS. 2.2 Advantage of DBMS a) Controlling Redundancy: In DBMS, the data resides in one central database; the various programs in the application can access data in different files. So data present in one file don't need to be duplicated in another. Such type of redundancy should be carefully controlled, eliminated and the DBMS should be aware of it. b) Data Consistency: Reduce data redundancy leads to better data consistency. c) Data Integration: Since related data is stored in one single database, applying data integrity is much easier. The functions in the DBMS can be used to enforce the integrity rules in the application programs. d) Data Sharing: Related data can be shared across programmes because data is stored in a centralized manner. e) Application Development Ease: The application programmer don't need to build the functions for handling issues like security, concurrent access, data integrity etc. The application programmer only needs to implement the application business rules.
  • 6. 5 TheDatabasesapplicationsingovernmentsections|1/22/2013 This will enhance application development ease. Adding extra functional modules is also easier than in file-based system. f) Data Independence: Data independence is isolating an upper level from the changes in the organization or structure of a lower level. g) Reduced Maintenance: Maintenance is less easy due to the centralized nature of the system. 3. Popular RDBMS Relational Database Management System (RDBMS) is Database Management System (DBMS) that is based on relational model invented by E.F Codd. There are many databases currently in use. Most of the databases are based on relational database model. SQL is the most popular RDBMS. SQL is the standard language for Relational Database system. SQL is Structured Query Language, which is used for storing, manipulating and retrieving data that is stored in relational database. All relational database management system like MS Access, MySQL, Sybase, Oracle, Postgres, Sybase and SQL Server use SQL language as a standard relational database management system. 4. Database Security Database technologies have a major impact on the growing use of computers. Because of the significance of data and information in databases of any field, they have to be secure and protected. Database security is a growing concern evidenced by an increase in the number of reported incidents or unauthorized exposure of sensitive data. Maintaining database security is the responsibility of the database management system rather than the operating system or application programme. Security is a major issue in any database management system. Security is achieved by granting access right to authorized users. Database security can be divided into three following objective: a. Secrecy: Secrecy is concerned with improper disclosure of information. Confidentiality and non-disclosure are other name of secrecy. b. Integrity: Integrity is concerned with improper modification of information.
  • 7. 6 TheDatabasesapplicationsingovernmentsections|1/22/2013 c. Availability: Availability is concerned with improper denial of access to information. These objectives arise in practically every database information system. Database security contains a set of sub-topics, these includes access control, password management, database vulnerability and auditing management. 4.1 Access Control Access control is the process by which rights and privileges are assigned to users and database objects. The primary method used to protect data is limiting access to the data. The three mechanisms are distinctly different but usually used in combination with a focus on access control for granularity in assigning rights to specific objects and users. These are discretionary access control and mandatory access control. a. Discretionary Access Control: It controls the access by applying a discretionary protection policy which governs the user’s access to the information on the basis of user’s identity and the rules that specify. With DAC, we need to authorize each end user distinctly. In future, if the group’s authority needs to change or be cancelled and it will be a good idea to change each member’s exclusive right separately, for this we need some kind of mechanism to make the access management easy. b. Mandatory Access Control: It is an access policy supported for systems that process especially raw data. Systems that providing mandatory access controls must assign to all subject to user and programme, and all object. Mandatory Access Control use sensitivity labels to determine who can access the users system. It implements a multi-level security policy for handling multiple information classification at different security labels within a single computer system. A security label associated with each data and each user. 4.2 Password Management Most database system managements protect their end users password through implementing and maintaining a password database. Using password management, access to the database system will be controlled. Most of database management systems use their internal password produced algorithm to produce the end user password randomly.
  • 8. 7 TheDatabasesapplicationsingovernmentsections|1/22/2013 Passwords produced by this method are difficult for people to remember. It is usually allowed end user to change their password periodically. The password’s length should be no less than 8 characters. 4.3 Auditing Database auditing is used to track database access and user activity. Auditing can be used to identify the accessed database objects. Database auditing does not prevent security breaches, but it does provide a way to if breaches have occurred. It provides a functionality to collect a set of records to show that the system is intact and work properly. Auditing is divided into internal auditing and external auditing. Internal auditing is a system level auditing mechanism used to audit a database system continuously. External auditing is an auditing invoked manually by functions exported to the outside world. 4.4 Database Vulnerability Security breaches are an increasing incident. As more and more database accessible via the internet and web based applications, there is more chance to security threats will raise. The objective of database security is to reduce susceptibility to these threats. The most known database application vulnerability is SQL injection. SQL injections can happen when SQL statements are dynamically created user input. The threat occurs when users enter malicious code that tricks the database into executing unintended command, The vulnerability occurs primarily because of the features of the SQL language that allow such things as embedding comments, concatenating SQL statement separated by semicolons, and the capability to extract query metadata from the database. The solution to stopping SQL injection is input validation. 5. Database Encryption Encryption can provide strong for data stored in database. But when developing a database encryption strategy must take many factors into consideration. In database encryption, where should be performed the encryption, how much data should be encrypted, what type of encryption algorithm used, and who should have access to the encryption keys? There is two type of encryption level used in database encryption. a. Storage-level Encryption: It is well suited for encrypting files or entire directories in an operating system. From a database perspective, storage level encryption has the
  • 9. 8 TheDatabasesapplicationsingovernmentsections|1/22/2013 advantage. On the other side, the storage subsystem has no knowledge of database objects and its structure. The encryption strategy cannot be related with user privileges. Thus, encrypting only portions of the database in order to decrease the encryption overhead. b. Database-level Encryption: It allows securing data when it is inserted or retrieved from the database. The encryption strategy can be part of the database design and can be related with user privileges. Database encryption can be done at various granulites, such as tables, columns and rows. Depending on the level of integration of the encryption feature and the DBMS, the encryption process may incur some changes to the applications. For both strategies, data is decrypted on the database server at runtime. Thus, the encryption keys must be transmitted or kept with the encrypted data on the server side, providing a limited protection against the server administrator. 6. Data Warehouse A data warehouse is a subject-oriented, time-variant, integrated, and non-volatile collection of data in support of managements’ decision making process. Data warehouse is a semantically consistent data store that serves as a physical implementation of a decision support data model and stores the information on which an enterprise needs to make strategic decision. Data warehouse architecture is constructed by integrating data from multiple sources to support adhoc queries and analytical reporting. Data warehouse provide on-line analytical processing (OLAP) tools for the interactive analysis of multidimensional data of for effective data mining. Data can be stored in different types of database. Data warehouse is also one type of database architecture, which is a repository of multiple heterogeneous data sources, organized under a single site in order to facilitate management decision making. Data warehouse technology also includes data integrating, data cleaning, and online analytical processing (OLAP) as well as the ability to view information from different angles.
  • 10. 9 TheDatabasesapplicationsingovernmentsections|1/22/2013 6.1 Data warehousing Fundamentals A data warehouse is a special repository of data designed to support decision making. The data used in decision making comes from operational systems and external sources. To create the data warehouse, data are extracted from source systems, cleaned, transformed and loaded into a data store. A data store is a place in the data warehouse. The data in data warehouse have the following characteristics: a. Subject Oriented: The Data are logically organized around the organization needs, such as, customer needs, sales or items produced. b. Integrated: All data of an organization are combined and analyze together. c. Time Variant: All historical data are maintained in detail form. d. Non-Volatile: The data are read only not updated or changed by users. A data warehouse draws data from operational systems, but it is physically separate and serves different purpose. Operational systems have their own database, and are used for transaction processing. Once the warehouse is created, users access the data in the warehouse using tools and generate SQL (structure query language) queries Data warehousing is a broader term and is used to describe, maintain, creation, and continuous checking of the data in the warehouse. 6.2. OLTP and OLAP An on-line operational system was to perform transaction and query processing. So they are also termed as on-line transaction processing system (OLTP). Data warehouse systems serve users in the role of data analysis and decision making. Such type of systems can organize and present data in various formats according the needs of the different users, are called on- line analytical processing system (OLAP). 6.3. Data Flow The data flows from one or more sources database to intermediate staging area, and finally into the data warehouse. At each stage there are data quality tools available to transform the data and this will enhance the usability of the data once it resides in the data warehouses. 6.4. Data Mining Data mining is the extraction or mining of knowledge from a large amount of data in data warehouse. Data mining is the process of applying intelligent methods to extract data
  • 11. 10 TheDatabasesapplicationsingovernmentsections|1/22/2013 patterns. To do this extraction data mining combines statistical analysis, artificial intelligence, and database management systems to extract knowledge from stored data. 6.5 Decision making using a Data Warehousing A Decision Support System is a tool used to improve the process of decision making in complex system. A DSS allows a subsequent decision to be made and employ artificial intelligence that provides detailed querying across a large datasets. The most important application areas of DSS are those complicated systems that directly answer questions. The data warehouse environment is more controlled and more reliable for decision support system by providing high quality information, effective cleaning routines, and valid data transformation rules and documented pre-summarization of data values. Data Warehouse integrates data from multiple heterogeneous information sources and transforms into multidimensional decision support systems. Data warehouse contains data sources, operational data stores, data staging area, the global data warehouse, and data mart. The data warehouse architecture must evolve to efficiently support the decision making process within the organization that owns the data warehouse. All the data warehouse components, process and data should be tracked and administrated by a metadata repository. 6.6 Data Warehouse Models There are three data warehouse models used according to architectural point of view: a. Enterprise Warehouse • Collects all of the information about the entire organization. • Provides organization wide data integration, usually from one or more operational systems, and is cross-functional in scope. • It contains detailed data as well as summarized data. • Enterprise warehouse may be implemented on traditional mainframes. b. Data Mart • It contains data of a specific group of users, and its scope is confined to selected subjects. • Data marts are usually implemented on UNIX and window based server. • The data in data mart can be summarized.
  • 12. 11 TheDatabasesapplicationsingovernmentsections|1/22/2013 c. Virtual Warehouse • It is a set of views as compare to operational databases. • It is easy to build but require excess capacity to database servers. • Some of the possible views may be materialized for efficient query processing. 7. Biometric Database and its uses Biometric database refers to any computer data that is created during biometric process. The biometric database includes biometric process such as, verification, identification, samples, models, similarity, fingerprints etc, also in biometric, data are excluding the individuals name and demographics location. a) Biometric database is used to study human characteristics and their traits. b) The purpose of biometric database is to identify individuals and group of people who are under surveillance. c) Biometric database is also used in computer science as a form of identification and access control. d) In biometric process, identification mode can be used to identify the person in two ways either positive recognition or negative recognition. e) The data collected during biometric process may be used in many ways. For example, biometric security that utilizes the employees DNA profile could also be used for various genetic diseases and undesirable traits.
  • 13. 12 TheDatabasesapplicationsingovernmentsections|1/22/2013 8. The Database Backup & Restore methodologies and concept Backup and recovery of database refers to various strategies and procedures that protecting your database against data loss and also provide backup of any kind of data loss. Backup can be divided into physical backups and logical backups. a. In physical backups, physical files are used in storing and recovering the database, such as control files, data files and log files. Physical backups are the foundation of any sound backup and recovery strategy. b. A logical backup contains logical data such as, tables and stored procedures. It is stored in a binary file. Logical backups are a useful supplement to physical in many cases. 8.1 Basic Concepts: The physical structures of the database and the recovery process determine in the forms of backup and recovery. The following basic concepts used in database backup and recovery. a. Data Files and Data Blocks: When a database consists one or more files called data files. The database would have one table space stored in one data file. The database supervises the storage spaces in the data files of a database is called data blocks. Data blocks are smallest units of storage of the database. b. Redo Logs: Redo logs records all changes made to a database’s data files. Each time data is changed in the database, that changes first online redo log, before it is applied to the data files. c. Control Files: The control file contains the record of physical structures of the database and their status. Control files contains several types of information such as, database information, table space and data file records, log records and information about corrupt data files d. Undo Segments: When data in a data file is updated of that data in database are written into undo segments. Undo information can be used to restore the original data file contents. When a transaction is rolled back.
  • 14. 13 TheDatabasesapplicationsingovernmentsections|1/22/2013 Section 2: Database's usage in the government sectors Technology is changing our lives at an unprecedented pace. These days, any government not transformed into the technology will considered as an outdated government! While the data entry is huge and from many parts in the government systems, the DBMS is playing an important role, the examples below show the importance of adapting DBMS in governmental sectors: 1- In Health sector The government in Turkey adopted the technology well in the health care sector. In 2014, the number of employees working in the healthcare sector is 650,000 employees, in the plan of Ministry of Health, they are aiming for employer 715,000 employees in 2015, then 1,100,000 employees in 2023.healthcare sector It will be impossible to manage these huge number of employees that will treating millions of patients if there is no DBMS. Therefore, there is a global database contains all patients historical data. For example, If any patient went to any hospital in Turkey, his symptoms' details, medical analysis, X-Rays result, and the Prescribed medication will registered in that database, Thus if he go to any other hospital or Polyclinic, their medical records will be available, also, the pharmacies also has an accessibility to that data, so they can give the right medicines without mistakes. Moreover, the patient has ability to book the appointment at any hospital or Polyclinic in Turkey through a mobile application by using his national ID! 2- In Traffic management sector The Dubai police use ANPR (Automatic number plate recognition) cameras to monitor vehicles in front and either side of the patrol car, this is a mass surveillance method that uses optical character recognition on images to read vehicle registration plates. This plate's number registered in a central database to record all traffic violations and in searching for wanted cars.
  • 15. 14 TheDatabasesapplicationsingovernmentsections|1/22/2013 3- In Educations sector Today in education sectors, most universities – like ours- provide their students online education and other services such as Student registration, student performance, E-library etc. If we compare the universities today vs 15 years ago in some counties; students were had to visit the university and stand in a long queue to make the registration process, as well as they had to search on shelf within the books about what they want! Today, most university use the database in a backend to be used online and make all processes is much easier, in additional, we can't imagine how much the researches were difficult in situation of all books were paper! 4- In Security sector The British Home Office had a real-life example of securing their borders, by adopting e-Borders system, It was intended to provide a searchable record of everyone entering and leaving the country, record their passport number, email address and purpose of visit, and generate a warning if anyone on a terrorist or criminal watch list was arriving.
  • 16. 15 TheDatabasesapplicationsingovernmentsections|1/22/2013 Section 3: THE ROLE OF DATABASE SYSTEM IN ANTI- TERRORIST The terrorists took advantage of new technologies and adapt them to serve their evil aims where benefited from portable mobile devices and related satellite in addition to the use of encrypted e-mail, and the Internet for training and recruitment, incitement and communicate with each other and electronic circuits for timing and programming. After the terrorist bombings of 11th of September 2001 in the United States the technology has become essential to play a role in helping countries that suffered terrorist and criminals and promote security and stability in other countries of operations through the provision of protection for the lives of innocent citizens, therefore, there was a demand to find methods and techniques to monitor and follow the Suspects, either through observation of their locations via satellite or their virtual positions on the web or monitor their communication devices to know them and being able to reach them, and to limit the movement of terrorists and make their movements more difficult through the activation of biotechnology and published in the sensitive sites because they provide the possibility of these technologies and greater ease in the automatic identification and verification of the suspects. In March 2011, the Syrian revolution began with nationwide protests against dictator president whose forces responded with violent crackdowns. The conflict gradually morphed from popular protests to an armed rebellion after months of military sieges. These conflict created a breeding ground to collect the terrorist's organizations from the globe and each organization has his own agendas. The political analysts expect that even if the current president went, those terrorist organizations will still fighting each other's to reach to their goals and avoid the Syrian Interim Government - which is elected by Syrian people - to reach the state presidency and Ignite chaos and run another civilian war. Based on above, Here's the role of the Syrian Interim Government to take the initiative and start planning for transform into the technology and adopting the concept of database technologies to limit the movement of terrorists and maintain the security.
  • 17. 16 TheDatabasesapplicationsingovernmentsections|1/22/2013 9.1 How can the new Syrian Government take advantage of the Database systems to protect country? 9.1.1 Design the database: The main and hardest task waiting the new Syrian government is to set a system create the main database and minimize the paper documents as much as they can. This database must be hosted in a secure data center and be accessible from anywhere in Syria based on predefined access privilege's policy. The database must has – but not limited to -the following tables: • Citizens and residents table: This table contain the main master data of citizens and residents people. The data entry in this table will be mainly by civil affairs department and immigration department. • Criminals table: This table contain the criminal records that happen in Syria by anyone. The data entry in this table will be mainly by Police, Criminal investigation department, courts... • Passport's table: It's contains the data of passports that issued for Syrian citizens. The data entry in this table will be mainly by Passport General Department • Fingerprint table This table contain the data of all people that live over Syrians' cities (citizens, Residents, and visitors) The data entry in this table will be mainly by: Police, Border officers, Ministry of the Interior, and other parties that need to verify identity. • Citizens_Residents_Airports_TRX This table contain the data of all countries has been visited in the past for all people. This table will hold data of countries that everyone travel to or coming from. The data of this table should be updated automatically by the airline and
  • 18. 17 TheDatabasesapplicationsingovernmentsections|1/22/2013 airports systems. • Travelers transactions This table contain the data transaction of all people that traveling from/to Syria through the airport, port, and land borders. The data entry in this table will be mainly by the border officers. • Wanted table This table contains the data of all wanted people to be used on the country borders to catch them while trying to travel The data entry in this table will be mainly by the border officers, Police, Ministry of the Interior, Criminal investigation department, court. To maintain the integrity and accuracy of the data, the above tables must has a relationship between their fields', as well as each tables should have a primary key, each table can have only ONE primary key. The figure below shown the Database structure and illustrate the tables' fields and relationships between them. (This database created on Microsoft SQL Server 2012) We can notes that the "Social_Num" and "Passport_Num" fields are existed in all tables, that’s because we need to link everything with either Passport Numbers or Social Number. Note: There must be more than fields and tables than I mentioned above, but I'm try to focusing on the concept by set a sample tables that may be used in the in maintain the security and tracking the terrorists.
  • 19. 18 TheDatabasesapplicationsingovernmentsections|1/22/2013 Syrian government database's structure After filling the database with a sample data, Let us now go through example and scenarios to see how we may get benefits from above database.
  • 20. 19 TheDatabasesapplicationsingovernmentsections|1/22/2013 Scenario 1: We may execute the below query on the database to the export all people that arrived Aleppo's city from Bagdad (Iraq's capital) in a month period before 31/12/2013 and send it to the investigators. The result of above query presented 2 people who has arrived Aleppo coming from Iraq in period between '01/12/2013' AND '31/12/2013' SELECT dbo.Citizens_Residents.Social_Num, dbo.Citizens_Residents.Name, dbo.Citizens_Residents.[Father's name], dbo.Citizens_Residents.[Family name], dbo.Citizens_Residents.Picture, dbo.Citizens_Residents.sex, dbo.Citizens_Residents.[Present Address], dbo.Citizens_Residents.[Mobile number], dbo.Citizens_Residents_Airports_TRX.Passport_Num, dbo.Citizens_Residents_Airports_TRX.TRX_port, dbo.Citizens_Residents_Airports_TRX.TRX_date, dbo.Citizens_Residents_Airports_TRX.TRX_Type, dbo.Citizens_Residents_Airports_TRX.Destination, dbo.Citizens_Residents.[Residency status] FROM dbo.Citizens_Residents INNER JOIN dbo.Citizens_Residents_Airports_TRX ON dbo.Citizens_Residents.Social_Num = dbo.Citizens_Residents_Airports_TRX.Social_Num WHERE (dbo.Citizens_Residents_Airports_TRX.Destination = 'Bagdad') AND (dbo.Citizens_Residents_Airports_TRX.TRX_Type = 'Arrive') AND (dbo.Citizens_Residents_Airports_TRX.TRX_date BETWEEN '01/12/2013' AND '31/12/2013') Example: Let's suppose the there is a terrorist crime happen in Syria in Aleppo's city in 31/12/2013, and the investigators have a doubt that there are the hands of terrorists originating from Iraq, they found some tools that used by the terrorist and they scanned the Fingerprints from that tools, that fingerprint converted into a binary data by a special device and the fingerprint value was: 0111001011011110
  • 21. 20 TheDatabasesapplicationsingovernmentsections|1/22/2013 Scenario 2: We may also run the below query to export the people who have one of their fingerprints has a value equal 0111001011011110, regardless if he travelled or not! The result of above query listed 2 persons one of their finger prints equal to 0111001011011110. Now it's clear that "Kamil Hafiz Solo" is the suspect person because his left thumb fingerprint's value equal 0111001011011110 as well as he was from the people who arrived from Iraq in a month before the crime. Now it's important to circulate suspect's information to all security offices and country's borders, and that may happening by inserting the suspect's data into "Wanted" table, The SQL code (in the right) will insert his data to "Wanted" table. SELECT dbo.Citizens_Residents.Name, dbo.Citizens_Residents.[Father's name], dbo.Citizens_Residents.[Family name], dbo.Citizens_Residents.sex, dbo.Citizens_Residents.[Present Address], dbo.FingerPrints.Left_Thumb, dbo.FingerPrints.[Left_Index finger], dbo.FingerPrints.Left_other_Fingers, dbo.FingerPrints.Right_Thumb, dbo.FingerPrints.[Right_Index finger], dbo.FingerPrints.Right_other_Fingers FROM dbo.FingerPrints INNER JOIN dbo.Citizens_Residents ON dbo.FingerPrints.Social_Num = dbo.Citizens_Residents.Social_Num WHERE (dbo.FingerPrints.Left_Thumb = '0111001011011110') OR (dbo.FingerPrints.[Left_Index finger] = '0111001011011110') OR (dbo.FingerPrints.Left_other_Fingers = '0111001011011110') OR (dbo.FingerPrints.Right_Thumb = '0111001011011110') OR (dbo.FingerPrints.[Right_Index finger] = '0111001011011110') OR (dbo.FingerPrints.Right_other_Fingers = '0111001011011110') USE [Syrian_Goverment] GO INSERT INTO [dbo].[Wanted] ([firts name] ,[family name] ,[social number] ,[Passport number]) VALUES ('Kamil', 'Solo', '2321092','1232123') GO
  • 22. 21 TheDatabasesapplicationsingovernmentsections|1/22/2013 9.1.2. Database Triggers To make the system is a tight system, we can take the advantage of "Database Triggers ". A database trigger is procedural code that is automatically executed in response to certain events on a particular table or view in a database. The trigger is mostly used for maintaining the integrity of the information on the database. Now in our example, we can create a trigger on a " Citizens_Residents_Airports_TRX" table to be run at every transaction happening on that record, in other word, when any people departure or arrive to Syria through any border (airport, seaport or land port) the trigger will run and check if the person name listed in the "Wanted" table, in case of his name is exist, the alert message will appear front of the airport officer to take the action. Note3: The users must use a friendly application that communicate with above database, and all above queries and results should be executed and called through the application. The purpose of above queries id to demonstrate how that data may processed in the database.
  • 23. 22 TheDatabasesapplicationsingovernmentsections|1/22/2013 9.1.3. Carter center's experience: Using Technology to Map Conflict in Syria The Carter Center, in partnership with Emory University, is guided by a fundamental commitment to human rights and the alleviation of human suffering. It seeks to prevent and resolve conflicts, enhance freedom and democracy, and improve health. This center launched Syria Conflict Mapping Project to examine the massive amounts of citizen-generated information related to the Syrian conflict that is available online. Specifically, the project: 1. details the growth of opposition armed groups in each governorate within Syria; 2. illuminates the evolution of armed opposition hierarchies at the local, regional, and national levels; 3. documents the formation of pro-government paramilitary forces; 4. shows the current geographic delineation of pro and anti-government forces; and 5. Provides up-to-date analysis on the current state of the conflict. Carter Center used Data analysis tools provided by "Palantir Technologies" in integrating, analyzing, and visualizing the large amounts of information collected (like The Armed groups' videos, the terrorist's activities on the social media). Conclusion In this paper I tried to shine the light on the database concepts and exploring some examples of its usage. I come to the conclusion that, to build an arbitrator database management system, the database structure must be designed well from the beginning based on the functional requirements of the system we are aiming to build. Other important thing – from my experience- it's very important to adjust the data inputs, because the outputs is based on the input, and if the input is not accurate or has errors, the output is also the same!
  • 24. 23 TheDatabasesapplicationsingovernmentsections|1/22/2013 References • Abrams, M. J. (1995). Information security An integrated collection of Essays. IEEE Computer Society Press. • Bertino, E. &. (2005). Database security—concepts, approaches, and challenges. IEEE Transactions actions on Dependable and Secure Computing, , 2-18. • Bhaskar, K. (1993). Computer Security: Threats and Countermeasures. published by NCC Blackwell. • Chaudhuri, S. &. (1997). An Overview of Data Warehousing and OLAP Technology. SIGMOD Record 26:1, Mar, pp 65-74. • Inmon, W. (1996). Building the Data Warehouse, Second Edition. New York: John Wiley & Sons. • Jain AK, R. A. (2006). Biometrics: a tool for information. IEEE Trans Inform Forensics , Sec 1:125–143. • Jaquith, A. (2007). Security metrics: Replacing fear, uncertainty, and doubt. Redwood City, CA: Addison- Wesley Professional. • Kachur, R. (2000). Data Warehouse Management Handbook. Paramus: Prentice Hall. • Navathe, E. &. (2007). Fundamentals of Database Systems (Sixth Edition). Pearson Publication. • PJ, F. (2008). Biometric databases. In: Handbook of biometrics. Heidelberg: Springer. • Yang, L. (2009). Teaching database security and auditing. Proceedings of the 40th ACM Technical Symposium on Computer Science Education . • Hospitals without Queues (2014). TV series Tourists Memoirs season 8 (Arabic), Dr. Ali Al Omari. Available from: http://www.youtube.com/watch?v=tFgBf0TUSn0&feature=youtu.be (Accessed: 10 Jan 2015 GMT 14:11:06). • Oweis, Khaled Yacoub; Solomon, Erika (22 February 2012). "Bombardment of Syria's Homeless kills 21 people". Reuters. Retrieved 21 July 2014 • GeoVITe - Geodata Visualization & Interactive Training Environment, Image URL:https://geodata.ethz.ch/resources/tutorials/L4GeodataManagement/en/html/unit_u2DataMana.html acsessed:18/01/2015 • Attribute-Based Messaging and Security, Image URL:https://seclab.illinois.edu/attribute-based-messaging-and- security, acsessed:18/01/2015 • Image URL:http://www.controlsystemworks.com/Product/Features/DataSources/Databases.aspx , acsessed:18/01/2015 • What are Biometrics?, Image URL:http://walkahwalkah.org/main/downloads/biometrics-primer/, acsessed:18/01/2015 • Database trigger, Wikipedia, The Free Encyclopaedia. Wikimedia Foundation, Inc. URL:http://en.wikipedia.org/wiki/Database_trigger, accessed at:21/01/2015 • Automatic number plate recognition, Wikipedia, The Free Encyclopaedia. Wikimedia Foundation, Inc. URL:http://en.wikipedia.org/wiki/Automatic_number_plate_recognition, accessed at:21/01/2015 • "British Home Office", Why Do Projects Fail?, Aug 18th, 2014 url:http://calleam.com/WTPF/?p=6773, accessed at 21/01/2015 • "Syria Conflict Mapping Project",Carter Center, URL: http://www.cartercenter.org/peace/conflict_resolution/syria-conflict-mapping.html,accessed at:21/01/2015