SlideShare a Scribd company logo
Data Integrity Integrity without knowledge is weak and useless, and knowledge without integrity is dangerous Samuel Johnson, 1759
Management of organizational memories
Strategies for data integrity ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Strategies for data integrity ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Transaction processing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ACID Committed data are saved by the DBMS so that, in the event of a failure and system recovery, these data are available in their correct state Durability A transaction in process and not yet committed must remain isolated from any other transaction Isolation A transaction either creates a valid new database state, or, if any failure occurs, the transaction manager returns the database to its prior state Consistency If a transaction has two or more discrete pieces of information, either all of the pieces are committed or none are Atomicity
Concurrent update ,[object Object]
Concurrent update ,[object Object]
Concurrent update ,[object Object],[object Object],[object Object],[object Object],[object Object]
Database update process D a t a b a s e ( s t a t e 1 ) D a t a b a s e ( s t a t e 2 ) D a t a b a s e ( s t a t e 3 ) D a t a b a s e ( s t a t e 4 ) D a t a b a s e ( s t a t e 2 ) U p d a t e t r a n s a c t i o n A U p d a t e t r a n s a c t i o n B U p d a t e t r a n s a c t i o n C
Backup options Transaction log or journal Transactions that caused a change in the state of the database Before image log or journal After image log or journal Changes to the database Database backup Past states of the database (also known as database dumps) Dual recording of data (mirroring) Complete copy of database Action Objective
Transaction failure and recovery ,[object Object],[object Object],[object Object],[object Object]
Recovery strategies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data recovery * preferred strategy *Backward recovery Reprocess transactions (Excluding those from the update program that created incorrect data) Incorrect data detected (database has been incorrectly updated) *Backward recovery Forward recovery or reprocess transactions—bring forward to the state just before termination of the transaction Abnormal termination of an update transaction (transaction error or system failure) *Switch to duplicate database—this can be transparent with RAID  Forward recovery Reprocess transactions Storage medium destruction (database is unreadable) Recovery Procedures Problem
Transaction processing  recovery procedures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data quality ,[object Object],[object Object],[object Object],[object Object]
Data quality ,[object Object],[object Object],[object Object],[object Object],[object Object]
Integrity constraints Supplier number is unique. Indicating whether stored values for this data item must be unique (unique compared to other values of the item within the same table or record type). The unique option is also required for identifiers. UNIQUE Employee number is mandatory. Indicating whether the data item value is mandatory (not null) or optional. The not null option is required for primary keys. NOT NULL (MANDATORY) If item type is ‘Y’, then color is null. Providing one or more conditions to apply against data values. CONDITIONAL A delivery must have valid itemname, department, and supplier values before it can be added to the database. (Tables are checked for valid entries.) Providing a procedure to be invoked to validate data items. PROCEDURE Department phone number must be of the form 542-nnnn (stands for exactly four decimal digits). Providing a pattern of allowable characters which define permissible formats for data values. PATTERN Employee numbers must be in the range 1-100. Providing one or more ranges within which the data item must fall or must NOT fall. RANGE Item colors must match the list provided. Providing a list of acceptable values for a data item. VALUES Delivery number must be at least 3 digits and at most 5. Defining and validating the minimum and maximum size of a data item. SIZE Supplier number is numeric. Validating a data item value against a specified data type. TYPE Example Explanation Type of constraint
Integrity constraints Column  stkcode  must always be assigned a value of 3 or less alphanumeric characters.  stkcode  must be unique because it is a primary key. Column  natcode  must be assigned a value of 3 or less alphanumeric characters and must exist as the primary key of nation. Do not allow the deletion of a row in nation while there still exist rows in stock containing the corresponding value of  natcode . CREATE TABLE stock ( stkcode CHAR(3), … , natcode CHAR(3), PRIMARY KEY(stkcode), CONSTRAINT fk_stock_nation FOREIGN KEY (natcode) REFERENCES nation ON DELETE RESRICT); Explanation Example
A general model of data security
Authenticating mechanisms ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Authorization tables ,[object Object],None Supplier record Delete Brier None Sale record Modify Order processing program Type and color only Item record Modify Todd None Delivery record Read Production department If quantity ≥ 200 Delivery record Insert Purchase department supervisor If quantity < 200 Supplier record Insert Purchase department clerk None Supplier record Insert Accounting department Constraint Object Action Subject/Client
Encryption ,[object Object],[object Object],[object Object],[object Object],[object Object]
Public key encryption Decrypt Encrypt Receiver’s public key Receiver’s private key Sender Receiver
Signing ,[object Object],Verify Sign Sender’s private key Sender’s public key Sender Receiver

More Related Content

What's hot

DBMS and its Models
DBMS and its ModelsDBMS and its Models
DBMS and its Models
AhmadShah Sultani
 
Dbms ppt
Dbms pptDbms ppt
Dbms ppt
Chinnu Shimna
 
Introduction to structured query language (sql)
Introduction to structured query language (sql)Introduction to structured query language (sql)
Introduction to structured query language (sql)
Sabana Maharjan
 
Ms sql-server
Ms sql-serverMs sql-server
Ms sql-server
Md.Mojibul Hoque
 
Database Design
Database DesignDatabase Design
Database Designlearnt
 
Introduction to Oracle Database
Introduction to Oracle DatabaseIntroduction to Oracle Database
Introduction to Oracle Database
puja_dhar
 
introdution to SQL and SQL functions
introdution to SQL and SQL functionsintrodution to SQL and SQL functions
introdution to SQL and SQL functions
farwa waqar
 
Data Models
Data ModelsData Models
Data Models
RituBhargava7
 
Introduction to database
Introduction to databaseIntroduction to database
Introduction to database
Arpee Callejo
 
Database fundamentals(database)
Database fundamentals(database)Database fundamentals(database)
Database fundamentals(database)welcometofacebook
 
Chapter 4 Structured Query Language
Chapter 4 Structured Query LanguageChapter 4 Structured Query Language
Chapter 4 Structured Query Language
Eddyzulham Mahluzydde
 
Integrity Constraints
Integrity ConstraintsIntegrity Constraints
Integrity Constraints
madhav bansal
 
Rdbms
RdbmsRdbms
Rdbms
rdbms
 
SQL
SQLSQL
Codd's rules
Codd's rulesCodd's rules
Codd's rulesMohd Arif
 
DBMS: Types of keys
DBMS:  Types of keysDBMS:  Types of keys
DBMS: Types of keys
Bharati Ugale
 
Oracle SQL Basics
Oracle SQL BasicsOracle SQL Basics
Oracle SQL Basics
Dhananjay Goel
 
DISE - Database Concepts
DISE - Database ConceptsDISE - Database Concepts
DISE - Database Concepts
Rasan Samarasinghe
 

What's hot (20)

DBA
DBADBA
DBA
 
Ch09
Ch09Ch09
Ch09
 
DBMS and its Models
DBMS and its ModelsDBMS and its Models
DBMS and its Models
 
Dbms ppt
Dbms pptDbms ppt
Dbms ppt
 
Introduction to structured query language (sql)
Introduction to structured query language (sql)Introduction to structured query language (sql)
Introduction to structured query language (sql)
 
Ms sql-server
Ms sql-serverMs sql-server
Ms sql-server
 
Database Design
Database DesignDatabase Design
Database Design
 
Introduction to Oracle Database
Introduction to Oracle DatabaseIntroduction to Oracle Database
Introduction to Oracle Database
 
introdution to SQL and SQL functions
introdution to SQL and SQL functionsintrodution to SQL and SQL functions
introdution to SQL and SQL functions
 
Data Models
Data ModelsData Models
Data Models
 
Introduction to database
Introduction to databaseIntroduction to database
Introduction to database
 
Database fundamentals(database)
Database fundamentals(database)Database fundamentals(database)
Database fundamentals(database)
 
Chapter 4 Structured Query Language
Chapter 4 Structured Query LanguageChapter 4 Structured Query Language
Chapter 4 Structured Query Language
 
Integrity Constraints
Integrity ConstraintsIntegrity Constraints
Integrity Constraints
 
Rdbms
RdbmsRdbms
Rdbms
 
SQL
SQLSQL
SQL
 
Codd's rules
Codd's rulesCodd's rules
Codd's rules
 
DBMS: Types of keys
DBMS:  Types of keysDBMS:  Types of keys
DBMS: Types of keys
 
Oracle SQL Basics
Oracle SQL BasicsOracle SQL Basics
Oracle SQL Basics
 
DISE - Database Concepts
DISE - Database ConceptsDISE - Database Concepts
DISE - Database Concepts
 

Viewers also liked

Topic 4 database recovery
Topic 4 database recoveryTopic 4 database recovery
Topic 4 database recovery
acap paei
 
6. Integrity and Security in DBMS
6. Integrity and Security in DBMS6. Integrity and Security in DBMS
6. Integrity and Security in DBMSkoolkampus
 
Data recovery
Data recoveryData recovery
Data recovery
Abhinav Parihar
 
Database security
Database securityDatabase security
Database security
Software Engineering
 
Database recovery
Database recoveryDatabase recovery
Database recovery
Vritti Malhotra
 
Database Security
Database SecurityDatabase Security
Database Security
alraee
 
DbMs
DbMsDbMs
Presentation on Database management system
Presentation on Database management systemPresentation on Database management system
Presentation on Database management system
Prerana Bhattarai
 
Database management system
Database management systemDatabase management system
Database management system
RizwanHafeez
 

Viewers also liked (10)

Topic 4 database recovery
Topic 4 database recoveryTopic 4 database recovery
Topic 4 database recovery
 
6. Integrity and Security in DBMS
6. Integrity and Security in DBMS6. Integrity and Security in DBMS
6. Integrity and Security in DBMS
 
Data recovery
Data recoveryData recovery
Data recovery
 
Database security
Database securityDatabase security
Database security
 
Database recovery
Database recoveryDatabase recovery
Database recovery
 
Database Security
Database SecurityDatabase Security
Database Security
 
DBMS
DBMSDBMS
DBMS
 
DbMs
DbMsDbMs
DbMs
 
Presentation on Database management system
Presentation on Database management systemPresentation on Database management system
Presentation on Database management system
 
Database management system
Database management systemDatabase management system
Database management system
 

Similar to Data integrity

Dfd mechanics
Dfd mechanicsDfd mechanics
Dfd mechanics
pushpender pandey
 
Data Flow Diagram
Data Flow DiagramData Flow Diagram
Data Flow Diagram
nethisip13
 
It 302 computerized accounting (week 2) - sharifah
It 302   computerized accounting (week 2) - sharifahIt 302   computerized accounting (week 2) - sharifah
It 302 computerized accounting (week 2) - sharifah
alish sha
 
Inventory management system
Inventory management systemInventory management system
Inventory management system
pavanwalecha
 
inventory management system
 inventory management system inventory management system
inventory management system
Barbara Onwutalobi
 
Extract, Transform and Load.pptx
Extract, Transform and Load.pptxExtract, Transform and Load.pptx
Extract, Transform and Load.pptx
JesusaEspeleta
 
Dfd mechanics
Dfd mechanicsDfd mechanics
Dfd mechanics
rishisinghgaur
 
essentialofdatabasedesign-141203001046-conversion-gate01.pdf
essentialofdatabasedesign-141203001046-conversion-gate01.pdfessentialofdatabasedesign-141203001046-conversion-gate01.pdf
essentialofdatabasedesign-141203001046-conversion-gate01.pdf
AlfiaAnsari2
 
Data quality and bi
Data quality and biData quality and bi
Data quality and bijeffd00
 
ETL_Methodology.pptx
ETL_Methodology.pptxETL_Methodology.pptx
ETL_Methodology.pptx
yogeshsuryawanshi47
 
ETL Testing Training Presentation
ETL Testing Training PresentationETL Testing Training Presentation
ETL Testing Training Presentation
Apurba Biswas
 
BIS06 Physical Database Models
BIS06 Physical Database ModelsBIS06 Physical Database Models
BIS06 Physical Database Models
Prithwis Mukerjee
 
BIS06 Physical Database Models
BIS06 Physical Database ModelsBIS06 Physical Database Models
BIS06 Physical Database Models
Prithwis Mukerjee
 
ICT-DBA-level4
ICT-DBA-level4ICT-DBA-level4
ICT-DBA-level4
Infotech27
 
MIS5101 WK10 Outcome Measures
MIS5101 WK10 Outcome MeasuresMIS5101 WK10 Outcome Measures
MIS5101 WK10 Outcome Measures
Steven Johnson
 
Final
FinalFinal

Similar to Data integrity (20)

Dfd mechanics
Dfd mechanicsDfd mechanics
Dfd mechanics
 
Data Flow Diagram
Data Flow DiagramData Flow Diagram
Data Flow Diagram
 
SQL Server Stored procedures
SQL Server Stored proceduresSQL Server Stored procedures
SQL Server Stored procedures
 
It 302 computerized accounting (week 2) - sharifah
It 302   computerized accounting (week 2) - sharifahIt 302   computerized accounting (week 2) - sharifah
It 302 computerized accounting (week 2) - sharifah
 
Inventory management system
Inventory management systemInventory management system
Inventory management system
 
inventory management system
 inventory management system inventory management system
inventory management system
 
Extract, Transform and Load.pptx
Extract, Transform and Load.pptxExtract, Transform and Load.pptx
Extract, Transform and Load.pptx
 
Dfd mechanics
Dfd mechanicsDfd mechanics
Dfd mechanics
 
essentialofdatabasedesign-141203001046-conversion-gate01.pdf
essentialofdatabasedesign-141203001046-conversion-gate01.pdfessentialofdatabasedesign-141203001046-conversion-gate01.pdf
essentialofdatabasedesign-141203001046-conversion-gate01.pdf
 
Data quality and bi
Data quality and biData quality and bi
Data quality and bi
 
ETL_Methodology.pptx
ETL_Methodology.pptxETL_Methodology.pptx
ETL_Methodology.pptx
 
ETL Testing Training Presentation
ETL Testing Training PresentationETL Testing Training Presentation
ETL Testing Training Presentation
 
BIS06 Physical Database Models
BIS06 Physical Database ModelsBIS06 Physical Database Models
BIS06 Physical Database Models
 
BIS06 Physical Database Models
BIS06 Physical Database ModelsBIS06 Physical Database Models
BIS06 Physical Database Models
 
Ch10
Ch10Ch10
Ch10
 
New
NewNew
New
 
ICT-DBA-level4
ICT-DBA-level4ICT-DBA-level4
ICT-DBA-level4
 
MIS5101 WK10 Outcome Measures
MIS5101 WK10 Outcome MeasuresMIS5101 WK10 Outcome Measures
MIS5101 WK10 Outcome Measures
 
[PHPUGPH] PHP Roadshow - MySQL
[PHPUGPH] PHP Roadshow - MySQL[PHPUGPH] PHP Roadshow - MySQL
[PHPUGPH] PHP Roadshow - MySQL
 
Final
FinalFinal
Final
 

More from Urooj Sabar

Five kingdom Classification
Five kingdom ClassificationFive kingdom Classification
Five kingdom Classification
Urooj Sabar
 
Therapeutic cloning
Therapeutic cloningTherapeutic cloning
Therapeutic cloning
Urooj Sabar
 
Biomart
BiomartBiomart
Biomart
Urooj Sabar
 
Elisa
ElisaElisa

More from Urooj Sabar (6)

Five kingdom Classification
Five kingdom ClassificationFive kingdom Classification
Five kingdom Classification
 
Therapeutic cloning
Therapeutic cloningTherapeutic cloning
Therapeutic cloning
 
Biomart
BiomartBiomart
Biomart
 
Normalization
NormalizationNormalization
Normalization
 
Rna silencing
Rna silencingRna silencing
Rna silencing
 
Elisa
ElisaElisa
Elisa
 

Recently uploaded

2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 

Recently uploaded (20)

2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 

Data integrity

  • 1. Data Integrity Integrity without knowledge is weak and useless, and knowledge without integrity is dangerous Samuel Johnson, 1759
  • 3.
  • 4.
  • 5.
  • 6. ACID Committed data are saved by the DBMS so that, in the event of a failure and system recovery, these data are available in their correct state Durability A transaction in process and not yet committed must remain isolated from any other transaction Isolation A transaction either creates a valid new database state, or, if any failure occurs, the transaction manager returns the database to its prior state Consistency If a transaction has two or more discrete pieces of information, either all of the pieces are committed or none are Atomicity
  • 7.
  • 8.
  • 9.
  • 10. Database update process D a t a b a s e ( s t a t e 1 ) D a t a b a s e ( s t a t e 2 ) D a t a b a s e ( s t a t e 3 ) D a t a b a s e ( s t a t e 4 ) D a t a b a s e ( s t a t e 2 ) U p d a t e t r a n s a c t i o n A U p d a t e t r a n s a c t i o n B U p d a t e t r a n s a c t i o n C
  • 11. Backup options Transaction log or journal Transactions that caused a change in the state of the database Before image log or journal After image log or journal Changes to the database Database backup Past states of the database (also known as database dumps) Dual recording of data (mirroring) Complete copy of database Action Objective
  • 12.
  • 13.
  • 14. Data recovery * preferred strategy *Backward recovery Reprocess transactions (Excluding those from the update program that created incorrect data) Incorrect data detected (database has been incorrectly updated) *Backward recovery Forward recovery or reprocess transactions—bring forward to the state just before termination of the transaction Abnormal termination of an update transaction (transaction error or system failure) *Switch to duplicate database—this can be transparent with RAID Forward recovery Reprocess transactions Storage medium destruction (database is unreadable) Recovery Procedures Problem
  • 15.
  • 16.
  • 17.
  • 18. Integrity constraints Supplier number is unique. Indicating whether stored values for this data item must be unique (unique compared to other values of the item within the same table or record type). The unique option is also required for identifiers. UNIQUE Employee number is mandatory. Indicating whether the data item value is mandatory (not null) or optional. The not null option is required for primary keys. NOT NULL (MANDATORY) If item type is ‘Y’, then color is null. Providing one or more conditions to apply against data values. CONDITIONAL A delivery must have valid itemname, department, and supplier values before it can be added to the database. (Tables are checked for valid entries.) Providing a procedure to be invoked to validate data items. PROCEDURE Department phone number must be of the form 542-nnnn (stands for exactly four decimal digits). Providing a pattern of allowable characters which define permissible formats for data values. PATTERN Employee numbers must be in the range 1-100. Providing one or more ranges within which the data item must fall or must NOT fall. RANGE Item colors must match the list provided. Providing a list of acceptable values for a data item. VALUES Delivery number must be at least 3 digits and at most 5. Defining and validating the minimum and maximum size of a data item. SIZE Supplier number is numeric. Validating a data item value against a specified data type. TYPE Example Explanation Type of constraint
  • 19. Integrity constraints Column stkcode must always be assigned a value of 3 or less alphanumeric characters. stkcode must be unique because it is a primary key. Column natcode must be assigned a value of 3 or less alphanumeric characters and must exist as the primary key of nation. Do not allow the deletion of a row in nation while there still exist rows in stock containing the corresponding value of natcode . CREATE TABLE stock ( stkcode CHAR(3), … , natcode CHAR(3), PRIMARY KEY(stkcode), CONSTRAINT fk_stock_nation FOREIGN KEY (natcode) REFERENCES nation ON DELETE RESRICT); Explanation Example
  • 20. A general model of data security
  • 21.
  • 22.
  • 23.
  • 24. Public key encryption Decrypt Encrypt Receiver’s public key Receiver’s private key Sender Receiver
  • 25.