SlideShare a Scribd company logo
DB FOR RDBMS
RDBMS

 A relational database is a database that
 conforms to relational model theory. The
 software used to manage relational database
 is called a relational database management
 system.
RELATION, TUPLE AND ATTRIBUTE

   A relation is defined as
    a set of tuples that
    have the same
    attributes.
   An attribute is a
    specification that
    defines a property of
    an object.
   Collection of related
    attributes in a relation
    is a tuple.
DATABASE

 Database contains one or more relations.
 A database is an organized collection of
  data, today typically in digital form.
 Databases are usually too expensive. Thus
  at any point in time most of their content
  resides in nonvolatile storage. Even if for
  operational reason very large portions of
  them reside in volatile storage.
 The content resides in file which is non
  volatile which cannot be used for efficient
  retrieval and management.
 For efficient retrieval and management,
  databases may store data in many data
  structure such as B+ Trees, Hash Tables and
  Heaps.
NOT THE REAL VIEW

   This is a relation. This
    structure is not
    permanent. All the data
    are stored only in files,
    for user convenience a
    relation is created.
INTERNAL OF DB

   Linked lists form’s the basis for the internal
    design of database. The structure of the
    attributes differ from one to another to link all
    these we require Heterogeneous Linked Lists.
    Heterogeneous Linked List is a linked list data-
    structure that is capable of storing data of
    different structures. void pointer is basically used
    in these types of linked list as we are not sure of
    which type of data needs to be stored. Void
    pointer is capable of storing pointer to any type
    as it is a generic pointer type.
INVERTED FILE

   inverted index (inverted file) is an index
    data structure storing a mapping from
    content, such as words or numbers, to its
    locations in a database file, or in a document
    or a set of documents. The purpose of an
    inverted index is to allow fast searches,
    which is used in DBMS for query processing.
TYPES OF INVERTED FILES

Two types,
 Record level inverted index

 Word level inverted index
A SAMPLE DB DESIGN

   All the tables in a            Attributes can be
    database are stored in          dynamically included as
    files and it is loaded          well as deleted. So the
    into memory for                 tuple cannot be a node
    efficient manipulation          with multiple data. Each
    and retrieval. A relation       attributes forms a node.
    contains the set of
    tuples of same
    attributes.
NODE STRUCTURE FOR A DATABASE




      Database   Pointer to   Pointer to
                 Next         Relation
      Name       Database
NODE STRUCTURE FOR A ATTRIBUTE




                     Pointer to
        Value        next attribute
NODE STRUCTURE FOR A RELATION




        Pointer to   No of           Pointer to     Pointer to
Table
        next         attributes in   last attribute first attribute
Name    relation     a tuple         of last tuple of first tuple
NODE STRUCTURE FOR ROW-ID




             Pointer to next   Pointer to first
    Row-ID   Row-ID
                               attribute of the
                               tuple
NODE STRUCTURE FOR A RELATION THAT
POINTS TO ROW-ID




               Pointer to   Pointer    Pointer
       Table
               next         to first   to last
       Name    relation     Row-ID     Row-ID
DATABASE SECURITY

   Database Security - protection from
    malicious attempts to steal (view) or modify
    data.
LEVELS OF DATA SECURITY

 Human level: Corrupt/careless User
 Network/User Interface

 Database application program

 Database system

 Operating System
COMMON SECURITY IN RDBMS

   Authentication
                   User connects to the RDBMS

   Authorization
                   User gets access to the database or database
    schema objects to perform certain actions, based on the set
    of privileges assigned to the user.

   Auditing
                For monitoring suspicious (and otherwise)
    activity.
IDENTIFICATION AND AUTHENTICATION

 The first line of defense is authentication.
 Before accessing RDBMS we must submit
  sufficient information validated either by
  RDBMS itself, or by the operating system
  within which this database is installed.
 Once the identity is authenticated, we may
  proceed with the attempt to access the
  database resources, objects, and data.
AUTHORIZATION AND ACCESS CONTROL
 Once the user is authenticated and granted
 access to the database, RDBMS employs a
 complex, finely grained system of privileges
 (permissions) for the particular database
 objects.
 These privileges include permission to
 access, modify, destroy, or execute relevant
 database objects, as well as add, modify, and
 delete data.
ENCRYPTION


   Encryption provides an additional security
    layer, protecting the data from unauthorized
    viewing. Even if access to the database is
    obtained, it will not be easy to decipher
    encrypted data into a human readable form.
PHYSICAL/OS SECURITY

   Physical level
       Traditional lock-and-key security
       Solution
            Remote backup for disaster recovery
   Operating system level
       Protection from virus/worm attacks critical
SECURITY (CONT.)

     Network level: must use encryption to
      prevent
       Eavesdropping:     unauthorized reading of
        messages
       Masquerading:
          pretending  to be an authorized
           user or legitimate site, or
          sending messages supposedly
           from authorized users
NETWORK SECURITY
   All information must be encrypted to prevent
    eavesdropping
       Public/private key encryption widely used
       Handled by secure http - https://
   Must prevent person-in-the-middle attacks
        Encrypting messages alone doesn’t solve this
         problem
        More on this in next slide
INJECTION ATTACKS




Attacks targeting the database
servers through malicious SQL
queries is collectively known as
injection attacks
THANK U

More Related Content

What's hot

Dbms logical dependance
Dbms logical dependanceDbms logical dependance
Dbms logical dependanceTej Kiran
 
Chapter 2 DBMS
Chapter 2 DBMSChapter 2 DBMS
Chapter 2 DBMS
Shahzad Zaman
 
DBMS - Relational Model
DBMS - Relational ModelDBMS - Relational Model
DBMS - Relational Model
Ovais Imtiaz
 
Dbms schema & instance
Dbms schema & instanceDbms schema & instance
Dbms schema & instance
Papan Sarkar
 
Lecture 07 relational database management system
Lecture 07 relational database management systemLecture 07 relational database management system
Lecture 07 relational database management systememailharmeet
 
Dbs213: MS ACCESS
Dbs213: MS ACCESSDbs213: MS ACCESS
Data models
Data modelsData models
Data models
Anakin Skylight
 
SQL interview questions by jeetendra mandal - part 4
SQL interview questions by jeetendra mandal - part 4SQL interview questions by jeetendra mandal - part 4
SQL interview questions by jeetendra mandal - part 4
jeetendra mandal
 
Ch1 Introduction
Ch1 IntroductionCh1 Introduction
Ch1 Introduction
MdShanewazAkib1
 

What's hot (12)

Dbms viva questions
Dbms viva questionsDbms viva questions
Dbms viva questions
 
Dbms logical dependance
Dbms logical dependanceDbms logical dependance
Dbms logical dependance
 
Chapter 2 DBMS
Chapter 2 DBMSChapter 2 DBMS
Chapter 2 DBMS
 
DBMS - Relational Model
DBMS - Relational ModelDBMS - Relational Model
DBMS - Relational Model
 
Dn31766773
Dn31766773Dn31766773
Dn31766773
 
SQL
SQL SQL
SQL
 
Dbms schema & instance
Dbms schema & instanceDbms schema & instance
Dbms schema & instance
 
Lecture 07 relational database management system
Lecture 07 relational database management systemLecture 07 relational database management system
Lecture 07 relational database management system
 
Dbs213: MS ACCESS
Dbs213: MS ACCESSDbs213: MS ACCESS
Dbs213: MS ACCESS
 
Data models
Data modelsData models
Data models
 
SQL interview questions by jeetendra mandal - part 4
SQL interview questions by jeetendra mandal - part 4SQL interview questions by jeetendra mandal - part 4
SQL interview questions by jeetendra mandal - part 4
 
Ch1 Introduction
Ch1 IntroductionCh1 Introduction
Ch1 Introduction
 

Viewers also liked

Object type casting
Object type castingObject type casting
Object type castingTech_MX
 
Deque and its applications
Deque and its applicationsDeque and its applications
Deque and its applicationsTech_MX
 
Inner Classes & Multi Threading in JAVA
Inner Classes & Multi Threading in JAVAInner Classes & Multi Threading in JAVA
Inner Classes & Multi Threading in JAVATech_MX
 
Ascii adjust & decimal adjust
Ascii adjust & decimal adjustAscii adjust & decimal adjust
Ascii adjust & decimal adjustTech_MX
 
Comparison of pentium processor with 80386 and 80486
Comparison of pentium processor with  80386 and 80486Comparison of pentium processor with  80386 and 80486
Comparison of pentium processor with 80386 and 80486Tech_MX
 
MultiMedia dbms
MultiMedia dbmsMultiMedia dbms
MultiMedia dbmsTech_MX
 
8237 dma controller
8237 dma controller8237 dma controller
8237 dma controllerTech_MX
 
Mobile dbms
Mobile dbmsMobile dbms
Mobile dbmsTech_MX
 
How to Draw an Effective ER diagram
How to Draw an Effective ER diagramHow to Draw an Effective ER diagram
How to Draw an Effective ER diagramTech_MX
 
Virtual base class
Virtual base classVirtual base class
Virtual base classTech_MX
 

Viewers also liked (13)

Object type casting
Object type castingObject type casting
Object type casting
 
Deque and its applications
Deque and its applicationsDeque and its applications
Deque and its applications
 
Ajax
AjaxAjax
Ajax
 
Ot ppt
Ot pptOt ppt
Ot ppt
 
Inner Classes & Multi Threading in JAVA
Inner Classes & Multi Threading in JAVAInner Classes & Multi Threading in JAVA
Inner Classes & Multi Threading in JAVA
 
Ascii adjust & decimal adjust
Ascii adjust & decimal adjustAscii adjust & decimal adjust
Ascii adjust & decimal adjust
 
Parsing
ParsingParsing
Parsing
 
Comparison of pentium processor with 80386 and 80486
Comparison of pentium processor with  80386 and 80486Comparison of pentium processor with  80386 and 80486
Comparison of pentium processor with 80386 and 80486
 
MultiMedia dbms
MultiMedia dbmsMultiMedia dbms
MultiMedia dbms
 
8237 dma controller
8237 dma controller8237 dma controller
8237 dma controller
 
Mobile dbms
Mobile dbmsMobile dbms
Mobile dbms
 
How to Draw an Effective ER diagram
How to Draw an Effective ER diagramHow to Draw an Effective ER diagram
How to Draw an Effective ER diagram
 
Virtual base class
Virtual base classVirtual base class
Virtual base class
 

Similar to Db for rdbms

Database Management System (DBMS) | Computer Science
Database Management System (DBMS) | Computer ScienceDatabase Management System (DBMS) | Computer Science
Database Management System (DBMS) | Computer Science
Transweb Global Inc
 
Database systems Handbook.pdf
Database systems Handbook.pdfDatabase systems Handbook.pdf
Database systems Handbook.pdf
Bahria University Islamabad, Pakistan
 
Muhammad Sharif Database systems Handbook.pdf
Muhammad Sharif  Database systems Handbook.pdfMuhammad Sharif  Database systems Handbook.pdf
Muhammad Sharif Database systems Handbook.pdf
Bahria University Islamabad, Pakistan
 
Database systems Handbook.pdf
Database systems Handbook.pdfDatabase systems Handbook.pdf
Database systems Handbook.pdf
Bahria University Islamabad, Pakistan
 
Muhammad Sharif Database systems Handbook.pdf
Muhammad Sharif  Database systems Handbook.pdfMuhammad Sharif  Database systems Handbook.pdf
Muhammad Sharif Database systems Handbook.pdf
Bahria University Islamabad, Pakistan
 
Database systems Handbook database systems muhammad sharif.pdf
Database systems Handbook database systems muhammad sharif.pdfDatabase systems Handbook database systems muhammad sharif.pdf
Database systems Handbook database systems muhammad sharif.pdf
Bahria University Islamabad, Pakistan
 
Database system Handbook.pdf
Database system Handbook.pdfDatabase system Handbook.pdf
Database system Handbook.pdf
Bahria University Islamabad, Pakistan
 
Database systems Handbook by Muhammad Sharif dba.pdf
Database systems Handbook by Muhammad Sharif dba.pdfDatabase systems Handbook by Muhammad Sharif dba.pdf
Database systems Handbook by Muhammad Sharif dba.pdf
Bahria University Islamabad, Pakistan
 
Database system Handbook.pdf
Database system Handbook.pdfDatabase system Handbook.pdf
Database system Handbook.pdf
Bahria University Islamabad, Pakistan
 
Database system Handbook.pdf
Database system Handbook.pdfDatabase system Handbook.pdf
Database system Handbook.pdf
Bahria University Islamabad, Pakistan
 
Database systems Handbook.pdf
Database systems Handbook.pdfDatabase systems Handbook.pdf
Database systems Handbook.pdf
Bahria University Islamabad, Pakistan
 
Muhammad Sharif handbook dbms Database systems Handbook.pdf
Muhammad Sharif handbook dbms Database systems Handbook.pdfMuhammad Sharif handbook dbms Database systems Handbook.pdf
Muhammad Sharif handbook dbms Database systems Handbook.pdf
Bahria University Islamabad, Pakistan
 
Database systems Handbook by Muhammad sharif dba.pdf
Database systems Handbook by Muhammad sharif dba.pdfDatabase systems Handbook by Muhammad sharif dba.pdf
Database systems Handbook by Muhammad sharif dba.pdf
Bahria University Islamabad, Pakistan
 
Database systems Handbook by Muhammad Sharif.pdf
Database systems Handbook by Muhammad Sharif.pdfDatabase systems Handbook by Muhammad Sharif.pdf
Database systems Handbook by Muhammad Sharif.pdf
Bahria University Islamabad, Pakistan
 
Database systems Handbook by Muhammad Sharif.pdf
Database systems Handbook by Muhammad Sharif.pdfDatabase systems Handbook by Muhammad Sharif.pdf
Database systems Handbook by Muhammad Sharif.pdf
Bahria University Islamabad, Pakistan
 
Database systems Handbook by Muhammad Sharif.pdf
Database systems Handbook by Muhammad Sharif.pdfDatabase systems Handbook by Muhammad Sharif.pdf
Database systems Handbook by Muhammad Sharif.pdf
Bahria University Islamabad, Pakistan
 
Database systems Handbook by Muhammad Sharif.pdf
Database systems Handbook by Muhammad Sharif.pdfDatabase systems Handbook by Muhammad Sharif.pdf
Database systems Handbook by Muhammad Sharif.pdf
Bahria University Islamabad, Pakistan
 
Database systems Handbook by Muhammad Sharif.pdf
Database systems Handbook by Muhammad Sharif.pdfDatabase systems Handbook by Muhammad Sharif.pdf
Database systems Handbook by Muhammad Sharif.pdf
Bahria University Islamabad, Pakistan
 
Database systems Handbook.pdf
Database systems Handbook.pdfDatabase systems Handbook.pdf
Database systems Handbook.pdf
Bahria University Islamabad, Pakistan
 
Database systems Handbook.pdf
Database systems Handbook.pdfDatabase systems Handbook.pdf
Database systems Handbook.pdf
Bahria University Islamabad, Pakistan
 

Similar to Db for rdbms (20)

Database Management System (DBMS) | Computer Science
Database Management System (DBMS) | Computer ScienceDatabase Management System (DBMS) | Computer Science
Database Management System (DBMS) | Computer Science
 
Database systems Handbook.pdf
Database systems Handbook.pdfDatabase systems Handbook.pdf
Database systems Handbook.pdf
 
Muhammad Sharif Database systems Handbook.pdf
Muhammad Sharif  Database systems Handbook.pdfMuhammad Sharif  Database systems Handbook.pdf
Muhammad Sharif Database systems Handbook.pdf
 
Database systems Handbook.pdf
Database systems Handbook.pdfDatabase systems Handbook.pdf
Database systems Handbook.pdf
 
Muhammad Sharif Database systems Handbook.pdf
Muhammad Sharif  Database systems Handbook.pdfMuhammad Sharif  Database systems Handbook.pdf
Muhammad Sharif Database systems Handbook.pdf
 
Database systems Handbook database systems muhammad sharif.pdf
Database systems Handbook database systems muhammad sharif.pdfDatabase systems Handbook database systems muhammad sharif.pdf
Database systems Handbook database systems muhammad sharif.pdf
 
Database system Handbook.pdf
Database system Handbook.pdfDatabase system Handbook.pdf
Database system Handbook.pdf
 
Database systems Handbook by Muhammad Sharif dba.pdf
Database systems Handbook by Muhammad Sharif dba.pdfDatabase systems Handbook by Muhammad Sharif dba.pdf
Database systems Handbook by Muhammad Sharif dba.pdf
 
Database system Handbook.pdf
Database system Handbook.pdfDatabase system Handbook.pdf
Database system Handbook.pdf
 
Database system Handbook.pdf
Database system Handbook.pdfDatabase system Handbook.pdf
Database system Handbook.pdf
 
Database systems Handbook.pdf
Database systems Handbook.pdfDatabase systems Handbook.pdf
Database systems Handbook.pdf
 
Muhammad Sharif handbook dbms Database systems Handbook.pdf
Muhammad Sharif handbook dbms Database systems Handbook.pdfMuhammad Sharif handbook dbms Database systems Handbook.pdf
Muhammad Sharif handbook dbms Database systems Handbook.pdf
 
Database systems Handbook by Muhammad sharif dba.pdf
Database systems Handbook by Muhammad sharif dba.pdfDatabase systems Handbook by Muhammad sharif dba.pdf
Database systems Handbook by Muhammad sharif dba.pdf
 
Database systems Handbook by Muhammad Sharif.pdf
Database systems Handbook by Muhammad Sharif.pdfDatabase systems Handbook by Muhammad Sharif.pdf
Database systems Handbook by Muhammad Sharif.pdf
 
Database systems Handbook by Muhammad Sharif.pdf
Database systems Handbook by Muhammad Sharif.pdfDatabase systems Handbook by Muhammad Sharif.pdf
Database systems Handbook by Muhammad Sharif.pdf
 
Database systems Handbook by Muhammad Sharif.pdf
Database systems Handbook by Muhammad Sharif.pdfDatabase systems Handbook by Muhammad Sharif.pdf
Database systems Handbook by Muhammad Sharif.pdf
 
Database systems Handbook by Muhammad Sharif.pdf
Database systems Handbook by Muhammad Sharif.pdfDatabase systems Handbook by Muhammad Sharif.pdf
Database systems Handbook by Muhammad Sharif.pdf
 
Database systems Handbook by Muhammad Sharif.pdf
Database systems Handbook by Muhammad Sharif.pdfDatabase systems Handbook by Muhammad Sharif.pdf
Database systems Handbook by Muhammad Sharif.pdf
 
Database systems Handbook.pdf
Database systems Handbook.pdfDatabase systems Handbook.pdf
Database systems Handbook.pdf
 
Database systems Handbook.pdf
Database systems Handbook.pdfDatabase systems Handbook.pdf
Database systems Handbook.pdf
 

More from Tech_MX

Theory of estimation
Theory of estimationTheory of estimation
Theory of estimationTech_MX
 
Templates in C++
Templates in C++Templates in C++
Templates in C++Tech_MX
 
String & its application
String & its applicationString & its application
String & its applicationTech_MX
 
Statistical quality__control_2
Statistical  quality__control_2Statistical  quality__control_2
Statistical quality__control_2Tech_MX
 
Stack data structure
Stack data structureStack data structure
Stack data structureTech_MX
 
Stack Data Structure & It's Application
Stack Data Structure & It's Application Stack Data Structure & It's Application
Stack Data Structure & It's Application Tech_MX
 
Spanning trees & applications
Spanning trees & applicationsSpanning trees & applications
Spanning trees & applicationsTech_MX
 
Set data structure 2
Set data structure 2Set data structure 2
Set data structure 2Tech_MX
 
Set data structure
Set data structure Set data structure
Set data structure Tech_MX
 
Real time Operating System
Real time Operating SystemReal time Operating System
Real time Operating SystemTech_MX
 
Mouse interrupts (Assembly Language & C)
Mouse interrupts (Assembly Language & C)Mouse interrupts (Assembly Language & C)
Mouse interrupts (Assembly Language & C)Tech_MX
 
Motherboard of a pc
Motherboard of a pcMotherboard of a pc
Motherboard of a pcTech_MX
 
More on Lex
More on LexMore on Lex
More on LexTech_MX
 
Merging files (Data Structure)
Merging files (Data Structure)Merging files (Data Structure)
Merging files (Data Structure)Tech_MX
 
Memory dbms
Memory dbmsMemory dbms
Memory dbmsTech_MX
 
Linear regression
Linear regressionLinear regression
Linear regressionTech_MX
 
Keyboard interrupt
Keyboard interruptKeyboard interrupt
Keyboard interruptTech_MX
 

More from Tech_MX (20)

Uid
UidUid
Uid
 
Theory of estimation
Theory of estimationTheory of estimation
Theory of estimation
 
Templates in C++
Templates in C++Templates in C++
Templates in C++
 
String & its application
String & its applicationString & its application
String & its application
 
Statistical quality__control_2
Statistical  quality__control_2Statistical  quality__control_2
Statistical quality__control_2
 
Stack data structure
Stack data structureStack data structure
Stack data structure
 
Stack Data Structure & It's Application
Stack Data Structure & It's Application Stack Data Structure & It's Application
Stack Data Structure & It's Application
 
Spss
SpssSpss
Spss
 
Spanning trees & applications
Spanning trees & applicationsSpanning trees & applications
Spanning trees & applications
 
Set data structure 2
Set data structure 2Set data structure 2
Set data structure 2
 
Set data structure
Set data structure Set data structure
Set data structure
 
Real time Operating System
Real time Operating SystemReal time Operating System
Real time Operating System
 
Mouse interrupts (Assembly Language & C)
Mouse interrupts (Assembly Language & C)Mouse interrupts (Assembly Language & C)
Mouse interrupts (Assembly Language & C)
 
Motherboard of a pc
Motherboard of a pcMotherboard of a pc
Motherboard of a pc
 
More on Lex
More on LexMore on Lex
More on Lex
 
Merging files (Data Structure)
Merging files (Data Structure)Merging files (Data Structure)
Merging files (Data Structure)
 
Memory dbms
Memory dbmsMemory dbms
Memory dbms
 
Linkers
LinkersLinkers
Linkers
 
Linear regression
Linear regressionLinear regression
Linear regression
 
Keyboard interrupt
Keyboard interruptKeyboard interrupt
Keyboard interrupt
 

Recently uploaded

Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 

Recently uploaded (20)

Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 

Db for rdbms

  • 2. RDBMS A relational database is a database that conforms to relational model theory. The software used to manage relational database is called a relational database management system.
  • 3. RELATION, TUPLE AND ATTRIBUTE  A relation is defined as a set of tuples that have the same attributes.  An attribute is a specification that defines a property of an object.  Collection of related attributes in a relation is a tuple.
  • 4. DATABASE  Database contains one or more relations.  A database is an organized collection of data, today typically in digital form.  Databases are usually too expensive. Thus at any point in time most of their content resides in nonvolatile storage. Even if for operational reason very large portions of them reside in volatile storage.
  • 5.  The content resides in file which is non volatile which cannot be used for efficient retrieval and management.  For efficient retrieval and management, databases may store data in many data structure such as B+ Trees, Hash Tables and Heaps.
  • 6. NOT THE REAL VIEW  This is a relation. This structure is not permanent. All the data are stored only in files, for user convenience a relation is created.
  • 7. INTERNAL OF DB  Linked lists form’s the basis for the internal design of database. The structure of the attributes differ from one to another to link all these we require Heterogeneous Linked Lists. Heterogeneous Linked List is a linked list data- structure that is capable of storing data of different structures. void pointer is basically used in these types of linked list as we are not sure of which type of data needs to be stored. Void pointer is capable of storing pointer to any type as it is a generic pointer type.
  • 8. INVERTED FILE  inverted index (inverted file) is an index data structure storing a mapping from content, such as words or numbers, to its locations in a database file, or in a document or a set of documents. The purpose of an inverted index is to allow fast searches, which is used in DBMS for query processing.
  • 9. TYPES OF INVERTED FILES Two types,  Record level inverted index  Word level inverted index
  • 10. A SAMPLE DB DESIGN  All the tables in a  Attributes can be database are stored in dynamically included as files and it is loaded well as deleted. So the into memory for tuple cannot be a node efficient manipulation with multiple data. Each and retrieval. A relation attributes forms a node. contains the set of tuples of same attributes.
  • 11. NODE STRUCTURE FOR A DATABASE Database Pointer to Pointer to Next Relation Name Database
  • 12. NODE STRUCTURE FOR A ATTRIBUTE Pointer to Value next attribute
  • 13. NODE STRUCTURE FOR A RELATION Pointer to No of Pointer to Pointer to Table next attributes in last attribute first attribute Name relation a tuple of last tuple of first tuple
  • 14. NODE STRUCTURE FOR ROW-ID Pointer to next Pointer to first Row-ID Row-ID attribute of the tuple
  • 15. NODE STRUCTURE FOR A RELATION THAT POINTS TO ROW-ID Pointer to Pointer Pointer Table next to first to last Name relation Row-ID Row-ID
  • 16. DATABASE SECURITY  Database Security - protection from malicious attempts to steal (view) or modify data.
  • 17. LEVELS OF DATA SECURITY  Human level: Corrupt/careless User  Network/User Interface  Database application program  Database system  Operating System
  • 18. COMMON SECURITY IN RDBMS  Authentication User connects to the RDBMS  Authorization User gets access to the database or database schema objects to perform certain actions, based on the set of privileges assigned to the user.  Auditing For monitoring suspicious (and otherwise) activity.
  • 19. IDENTIFICATION AND AUTHENTICATION  The first line of defense is authentication.  Before accessing RDBMS we must submit sufficient information validated either by RDBMS itself, or by the operating system within which this database is installed.  Once the identity is authenticated, we may proceed with the attempt to access the database resources, objects, and data.
  • 20. AUTHORIZATION AND ACCESS CONTROL Once the user is authenticated and granted access to the database, RDBMS employs a complex, finely grained system of privileges (permissions) for the particular database objects. These privileges include permission to access, modify, destroy, or execute relevant database objects, as well as add, modify, and delete data.
  • 21. ENCRYPTION  Encryption provides an additional security layer, protecting the data from unauthorized viewing. Even if access to the database is obtained, it will not be easy to decipher encrypted data into a human readable form.
  • 22. PHYSICAL/OS SECURITY  Physical level  Traditional lock-and-key security  Solution  Remote backup for disaster recovery  Operating system level  Protection from virus/worm attacks critical
  • 23. SECURITY (CONT.)  Network level: must use encryption to prevent  Eavesdropping: unauthorized reading of messages  Masquerading:  pretending to be an authorized user or legitimate site, or  sending messages supposedly from authorized users
  • 24. NETWORK SECURITY  All information must be encrypted to prevent eavesdropping  Public/private key encryption widely used  Handled by secure http - https://  Must prevent person-in-the-middle attacks  Encrypting messages alone doesn’t solve this problem  More on this in next slide
  • 25. INJECTION ATTACKS Attacks targeting the database servers through malicious SQL queries is collectively known as injection attacks