SlideShare a Scribd company logo
Thank You!
L ogistics
E d i t t h i s t e x t h e r e
DBMS
Seminar
Security &
Integrity violations
Authorization
and views
Integrity
constraints
Presented By :
Prakash Kumar
MCA/25023/22
Security and
Integrity
Violations
The data stored in the database needs to be protected from
unauthorized access, malicious destruction or alteration, and
accidental introduction of inconsistency.
Misuse of the database can be categorized as being either
intentional (malicious) or accidental. Accidental loss of data
consistency may result from:
 Crashes during transaction processing
 Abnormalities due to concurrent access to the database
 Abnormalities due to the distribution of data over several
computers
It is easier to protect accidental loss of data consistency than
to protect against malicious access to the database. Among
the forms of malicious access are the following:
 Unauthorized reading of data (theft of information)
 Unauthorized modification of data
 Unauthorized destruction of data
Absolute protection of the database from malicious abuse is
not possible, but the cost of the perpetrator can be made
sufficiently high to deter most if not all attempts to access the
database without proper authority.
The term database security usually refers to security from
malicious access, while integrity refer to the avoidance of
accidental loss of consistency. In practice, the dividing line
between security and integrity is not always clear. We shall use
the term security to refer to both security and integrity in
cases where the distinction between these concepts is not
essential.
To protect the database, security measures must be taken at several
levels:
 Physical: The site or sites containing the computer systems must be
physically secured against armed or surreptitious entry by intruders.
 Human: Authorization of users must be done carefully to
chance of authorized user giving access to an intruder in exchange
for a bribe or other favors.
 Operating system: No matter how secure the database system is,
in operating system security may serve as a means of unauthorized
access to the database. Since almost all database systems allow
remote access through terminals or networks, software-level
security within the operation system is as important as physical
security.
 Database system: Some authorized database system users may be
authorized to access only a limited portion of the database. Other
users may be allowed to issue queries, but may be forbidden to
modify the data. It is the responsibility of the database system to
ensure that these restrictions are not violated.
Authorization and Views
The concept of views is a means of providing a user with a “personalized” model
of the database. A view can hide data that a user does not need to see. The
ability of views to hide data serves both to simplify usage of the system and to
enhance security. System usage is simplified since the user is allowed to restrict
attention to the data of interest. Security is provided if there is a mechanism to
restrict the user to his or her personal view or views.
Relational database systems typically provide security at two levels:
 Relation: A user may be permitted or denied direct access to a relation
 View: A user may be permitted or denied access to data appearing in a view.
Although a user may be denied direct access to a relation, the user may be able
to access part of that relation through a view. Thus, a combination of relational
level security and view level security can be used to limit a user’s access to
precisely the data that user needs.
A user may have several forms of authorization on part of the
database. Among these are the following:
 Read authorization, which allows reading, but not
modification of data
 Insert authorization, which allows insertion of new data, but
not the modification of existing data
 Update authorization, which allows modification, but not
deletion, of data
 Delete authorization, which allows deletion of data.
In addition to the above forms of authorization for access to data, a
user may be granted authorization to modify the database scheme:
 Index authorization, which allow creation and deletion of indices
 Resources authorization, which allow the creation new
relations
 Alteration authorization, which allow the addition or deletion of
attributes in a relation
 Drop authorization, which allows the deletion of relations
The drop and delete authorization differ in that delete authorization
allows deletion of tuples only. If a user deletes all tuples of a
relation, the relation still exists, but it is empty. If a relation is
dropped, it no longer exists.
Integrity constraints
Integrity constraints provide a means of ensuring that changes made
to the database by authorized users do not result in a loss of data
consistency.
In the network model and the E-R model, we saw integrity constraints
in the form of:
 Key declarations, the stipulation that certain attributes form a
candidate key for a given entity set constrains the set of legal
insertions.
 Form of a relationship, many-to–many, one–to–many, one–to–
one. A one-to– one or one–to-many relationship restricts the set of
legal relationships among entities of a collection of entity sets.
Another example of an integrity constraint is set retention in the
network model.
In general, an integrity constraint can be an arbitrary predicate pertaining to the
database. However, arbitrary predicates may be costly to test. Thus, we usually
limit ourselves to integrity constraints that can be tested with minimal overhead.
This is the purpose behind dependency – preserving decompositions of relation
schemes. Recall that in a dependency – preserving decomposition, it is
possible to test for satisfaction of the data dependencies without the need to
compute any joins. Domain – key normal is an ideal design from the point of
view of efficient testing of integrity constraints, since the only forms of constraint
that need be tested are key constraints and domain constraints.
If the key and domain constraints are satisfied, and the database scheme is in
DKNF, then all integrity constraints on the database are satisfied.
Key constraints are one of the most easily tested forms of consistency
constraint, especially if an index is maintained on that candidate key. During the
process of inserting a record into the database a lookup must be performed
using the index and any duplicate key values that may exist are found. Since
not all index search keys are candidate keys for the relation (Indices may be for
secondary keys), we need to declare an index to be either
 Unique: Only one record may exist for a key value
 Non-unique: Multiple records are allowed to have the same key value
Another form of constraint that is easy to test is domain
constraints. Testing domain constraints is analogous to runtime –
type checking in a programming language. A form of constraint
closely related to domain constraints involves the admissibility of
null values. We may forbid null values for certain attributes but
allow them for others.
Relatively few systems allow the expression of constraints that
are more complex than key declarations or domain constraints.
The original proposal for the SQL language included a general
purpose construct called the assert statement for the expression
of integrity constraints.
An assertion pertaining to a single relation takes the form:
For example, if we wish to define an integrity constraint that no
account balance is negative we write:
In its most general form, the assert statement takes the form:
Thank You

More Related Content

What's hot

Data dictionary
Data dictionaryData dictionary
Data dictionary
Surbhi Panhalkar
 
13. Query Processing in DBMS
13. Query Processing in DBMS13. Query Processing in DBMS
13. Query Processing in DBMSkoolkampus
 
17. Recovery System in DBMS
17. Recovery System in DBMS17. Recovery System in DBMS
17. Recovery System in DBMSkoolkampus
 
Relational model
Relational modelRelational model
Relational model
Dabbal Singh Mahara
 
directory structure and file system mounting
directory structure and file system mountingdirectory structure and file system mounting
directory structure and file system mounting
rajshreemuthiah
 
Partitioning
PartitioningPartitioning
Partitioning
Reema Gajjar
 
6. Integrity and Security in DBMS
6. Integrity and Security in DBMS6. Integrity and Security in DBMS
6. Integrity and Security in DBMSkoolkampus
 
Recovery techniques
Recovery techniquesRecovery techniques
Recovery techniques
Dr. C.V. Suresh Babu
 
Address Binding Scheme
Address Binding SchemeAddress Binding Scheme
Address Binding Scheme
Rajesh Piryani
 
Java thread life cycle
Java thread life cycleJava thread life cycle
Java thread life cycle
Archana Gopinath
 
Acid properties
Acid propertiesAcid properties
Acid properties
Abhilasha Lahigude
 
Multithreading in java
Multithreading in javaMultithreading in java
Multithreading in java
Monika Mishra
 
STRUCTURE OF SQL QUERIES
STRUCTURE OF SQL QUERIESSTRUCTURE OF SQL QUERIES
STRUCTURE OF SQL QUERIES
VENNILAV6
 
Dbms relational model
Dbms relational modelDbms relational model
Dbms relational model
Chirag vasava
 
View of data DBMS
View of data DBMSView of data DBMS
View of data DBMS
Rahul Narang
 
Hash table in data structure and algorithm
Hash table in data structure and algorithmHash table in data structure and algorithm
Hash table in data structure and algorithm
Aamir Sohail
 
Basic DBMS ppt
Basic DBMS pptBasic DBMS ppt
Basic DBMS ppt
dangwalrajendra888
 
DML, DDL, DCL ,DRL/DQL and TCL Statements in SQL with Examples
DML, DDL, DCL ,DRL/DQL and TCL Statements in SQL with ExamplesDML, DDL, DCL ,DRL/DQL and TCL Statements in SQL with Examples
DML, DDL, DCL ,DRL/DQL and TCL Statements in SQL with Examples
LGS, GBHS&IC, University Of South-Asia, TARA-Technologies
 
Complete dbms notes
Complete dbms notesComplete dbms notes
Complete dbms notes
Tanya Makkar
 

What's hot (20)

Data dictionary
Data dictionaryData dictionary
Data dictionary
 
Introduction to triggers
Introduction to triggersIntroduction to triggers
Introduction to triggers
 
13. Query Processing in DBMS
13. Query Processing in DBMS13. Query Processing in DBMS
13. Query Processing in DBMS
 
17. Recovery System in DBMS
17. Recovery System in DBMS17. Recovery System in DBMS
17. Recovery System in DBMS
 
Relational model
Relational modelRelational model
Relational model
 
directory structure and file system mounting
directory structure and file system mountingdirectory structure and file system mounting
directory structure and file system mounting
 
Partitioning
PartitioningPartitioning
Partitioning
 
6. Integrity and Security in DBMS
6. Integrity and Security in DBMS6. Integrity and Security in DBMS
6. Integrity and Security in DBMS
 
Recovery techniques
Recovery techniquesRecovery techniques
Recovery techniques
 
Address Binding Scheme
Address Binding SchemeAddress Binding Scheme
Address Binding Scheme
 
Java thread life cycle
Java thread life cycleJava thread life cycle
Java thread life cycle
 
Acid properties
Acid propertiesAcid properties
Acid properties
 
Multithreading in java
Multithreading in javaMultithreading in java
Multithreading in java
 
STRUCTURE OF SQL QUERIES
STRUCTURE OF SQL QUERIESSTRUCTURE OF SQL QUERIES
STRUCTURE OF SQL QUERIES
 
Dbms relational model
Dbms relational modelDbms relational model
Dbms relational model
 
View of data DBMS
View of data DBMSView of data DBMS
View of data DBMS
 
Hash table in data structure and algorithm
Hash table in data structure and algorithmHash table in data structure and algorithm
Hash table in data structure and algorithm
 
Basic DBMS ppt
Basic DBMS pptBasic DBMS ppt
Basic DBMS ppt
 
DML, DDL, DCL ,DRL/DQL and TCL Statements in SQL with Examples
DML, DDL, DCL ,DRL/DQL and TCL Statements in SQL with ExamplesDML, DDL, DCL ,DRL/DQL and TCL Statements in SQL with Examples
DML, DDL, DCL ,DRL/DQL and TCL Statements in SQL with Examples
 
Complete dbms notes
Complete dbms notesComplete dbms notes
Complete dbms notes
 

Similar to Security and Integrity violations, Authorisation and views, Integrity Constant

Data base Access Control a look at Fine grain Access method
Data base Access Control a look at Fine grain Access methodData base Access Control a look at Fine grain Access method
Data base Access Control a look at Fine grain Access method
International Journal of Engineering Inventions www.ijeijournal.com
 
Security Issues Surrounding Data Manipulation in a Relational Database
Security Issues Surrounding Data Manipulation in a Relational DatabaseSecurity Issues Surrounding Data Manipulation in a Relational Database
Security Issues Surrounding Data Manipulation in a Relational DatabaseDavid Murphy
 
01 database security ent-db
01  database security ent-db01  database security ent-db
01 database security ent-db
uncleRhyme
 
Unit iii dbms
Unit iii dbmsUnit iii dbms
Unit iii dbms
Arnav Chowdhury
 
Week 2 Characteristics & Benefits of a Database & Types of Data Models
Week 2 Characteristics & Benefits of a Database & Types of Data ModelsWeek 2 Characteristics & Benefits of a Database & Types of Data Models
Week 2 Characteristics & Benefits of a Database & Types of Data Models
oudesign
 
A Review Report on Security Threats on Database
A Review Report on Security Threats on DatabaseA Review Report on Security Threats on Database
A Review Report on Security Threats on Database
Shivnandan Singh
 
Locking Down Your Data: Best Practices for Database Security
Locking Down Your Data: Best Practices for Database SecurityLocking Down Your Data: Best Practices for Database Security
Locking Down Your Data: Best Practices for Database Security
FredReynolds2
 
Database Security - IK
Database Security - IKDatabase Security - IK
Database Security - IK
Ilgın Kavaklıoğulları
 
Bluedog white paper - Our WebObjects Web Security Model
Bluedog white paper - Our WebObjects Web Security ModelBluedog white paper - Our WebObjects Web Security Model
Bluedog white paper - Our WebObjects Web Security Model
tom termini
 
A1802030104
A1802030104A1802030104
A1802030104
IOSR Journals
 
Ijarcet vol-2-issue-3-942-946
Ijarcet vol-2-issue-3-942-946Ijarcet vol-2-issue-3-942-946
Ijarcet vol-2-issue-3-942-946Editor IJARCET
 
A DATABASE SYSTEM SECURITY FRAMEWORK
A DATABASE SYSTEM SECURITY FRAMEWORKA DATABASE SYSTEM SECURITY FRAMEWORK
A DATABASE SYSTEM SECURITY FRAMEWORK
ijcsit
 
A Database System Security Framework
A Database System Security FrameworkA Database System Security Framework
A Database System Security Framework
Maria Perkins
 
Attribute Based Encryption with Attribute Hiding in Cloud Storage
Attribute Based Encryption with Attribute Hiding in Cloud StorageAttribute Based Encryption with Attribute Hiding in Cloud Storage
Attribute Based Encryption with Attribute Hiding in Cloud Storage
IJTET Journal
 
IT 650 Principles of Database DesignProject Milestone – 5.docx
IT 650 Principles of Database DesignProject Milestone – 5.docxIT 650 Principles of Database DesignProject Milestone – 5.docx
IT 650 Principles of Database DesignProject Milestone – 5.docx
priestmanmable
 
Bca examination 2016 dbms
Bca examination 2016 dbmsBca examination 2016 dbms
Bca examination 2016 dbms
Anjaan Gajendra
 
An Attribute-based Controlled Collaborative Access Control Scheme for Public ...
An Attribute-based Controlled Collaborative Access Control Scheme for Public ...An Attribute-based Controlled Collaborative Access Control Scheme for Public ...
An Attribute-based Controlled Collaborative Access Control Scheme for Public ...
JAYAPRAKASH JPINFOTECH
 
Ieeepro techno solutions 2011 ieee java project -secure role based data
Ieeepro techno solutions   2011 ieee java project -secure role based dataIeeepro techno solutions   2011 ieee java project -secure role based data
Ieeepro techno solutions 2011 ieee java project -secure role based data
hemanthbbc
 

Similar to Security and Integrity violations, Authorisation and views, Integrity Constant (20)

Data base Access Control a look at Fine grain Access method
Data base Access Control a look at Fine grain Access methodData base Access Control a look at Fine grain Access method
Data base Access Control a look at Fine grain Access method
 
Security Issues Surrounding Data Manipulation in a Relational Database
Security Issues Surrounding Data Manipulation in a Relational DatabaseSecurity Issues Surrounding Data Manipulation in a Relational Database
Security Issues Surrounding Data Manipulation in a Relational Database
 
01 database security ent-db
01  database security ent-db01  database security ent-db
01 database security ent-db
 
Unit iii dbms
Unit iii dbmsUnit iii dbms
Unit iii dbms
 
Database security
Database securityDatabase security
Database security
 
Week 2 Characteristics & Benefits of a Database & Types of Data Models
Week 2 Characteristics & Benefits of a Database & Types of Data ModelsWeek 2 Characteristics & Benefits of a Database & Types of Data Models
Week 2 Characteristics & Benefits of a Database & Types of Data Models
 
A Review Report on Security Threats on Database
A Review Report on Security Threats on DatabaseA Review Report on Security Threats on Database
A Review Report on Security Threats on Database
 
Locking Down Your Data: Best Practices for Database Security
Locking Down Your Data: Best Practices for Database SecurityLocking Down Your Data: Best Practices for Database Security
Locking Down Your Data: Best Practices for Database Security
 
Database Security - IK
Database Security - IKDatabase Security - IK
Database Security - IK
 
Bluedog white paper - Our WebObjects Web Security Model
Bluedog white paper - Our WebObjects Web Security ModelBluedog white paper - Our WebObjects Web Security Model
Bluedog white paper - Our WebObjects Web Security Model
 
A1802030104
A1802030104A1802030104
A1802030104
 
Ijarcet vol-2-issue-3-942-946
Ijarcet vol-2-issue-3-942-946Ijarcet vol-2-issue-3-942-946
Ijarcet vol-2-issue-3-942-946
 
A DATABASE SYSTEM SECURITY FRAMEWORK
A DATABASE SYSTEM SECURITY FRAMEWORKA DATABASE SYSTEM SECURITY FRAMEWORK
A DATABASE SYSTEM SECURITY FRAMEWORK
 
A Database System Security Framework
A Database System Security FrameworkA Database System Security Framework
A Database System Security Framework
 
Attribute Based Encryption with Attribute Hiding in Cloud Storage
Attribute Based Encryption with Attribute Hiding in Cloud StorageAttribute Based Encryption with Attribute Hiding in Cloud Storage
Attribute Based Encryption with Attribute Hiding in Cloud Storage
 
Database security
Database securityDatabase security
Database security
 
IT 650 Principles of Database DesignProject Milestone – 5.docx
IT 650 Principles of Database DesignProject Milestone – 5.docxIT 650 Principles of Database DesignProject Milestone – 5.docx
IT 650 Principles of Database DesignProject Milestone – 5.docx
 
Bca examination 2016 dbms
Bca examination 2016 dbmsBca examination 2016 dbms
Bca examination 2016 dbms
 
An Attribute-based Controlled Collaborative Access Control Scheme for Public ...
An Attribute-based Controlled Collaborative Access Control Scheme for Public ...An Attribute-based Controlled Collaborative Access Control Scheme for Public ...
An Attribute-based Controlled Collaborative Access Control Scheme for Public ...
 
Ieeepro techno solutions 2011 ieee java project -secure role based data
Ieeepro techno solutions   2011 ieee java project -secure role based dataIeeepro techno solutions   2011 ieee java project -secure role based data
Ieeepro techno solutions 2011 ieee java project -secure role based data
 

Recently uploaded

一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
Basic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparelBasic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparel
top1002
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Soumen Santra
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 

Recently uploaded (20)

一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
Basic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparelBasic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparel
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 

Security and Integrity violations, Authorisation and views, Integrity Constant

  • 1. Thank You! L ogistics E d i t t h i s t e x t h e r e DBMS Seminar Security & Integrity violations Authorization and views Integrity constraints Presented By : Prakash Kumar MCA/25023/22
  • 2. Security and Integrity Violations The data stored in the database needs to be protected from unauthorized access, malicious destruction or alteration, and accidental introduction of inconsistency. Misuse of the database can be categorized as being either intentional (malicious) or accidental. Accidental loss of data consistency may result from:  Crashes during transaction processing  Abnormalities due to concurrent access to the database  Abnormalities due to the distribution of data over several computers
  • 3. It is easier to protect accidental loss of data consistency than to protect against malicious access to the database. Among the forms of malicious access are the following:  Unauthorized reading of data (theft of information)  Unauthorized modification of data  Unauthorized destruction of data Absolute protection of the database from malicious abuse is not possible, but the cost of the perpetrator can be made sufficiently high to deter most if not all attempts to access the database without proper authority. The term database security usually refers to security from malicious access, while integrity refer to the avoidance of accidental loss of consistency. In practice, the dividing line between security and integrity is not always clear. We shall use the term security to refer to both security and integrity in cases where the distinction between these concepts is not essential.
  • 4. To protect the database, security measures must be taken at several levels:  Physical: The site or sites containing the computer systems must be physically secured against armed or surreptitious entry by intruders.  Human: Authorization of users must be done carefully to chance of authorized user giving access to an intruder in exchange for a bribe or other favors.  Operating system: No matter how secure the database system is, in operating system security may serve as a means of unauthorized access to the database. Since almost all database systems allow remote access through terminals or networks, software-level security within the operation system is as important as physical security.  Database system: Some authorized database system users may be authorized to access only a limited portion of the database. Other users may be allowed to issue queries, but may be forbidden to modify the data. It is the responsibility of the database system to ensure that these restrictions are not violated.
  • 5. Authorization and Views The concept of views is a means of providing a user with a “personalized” model of the database. A view can hide data that a user does not need to see. The ability of views to hide data serves both to simplify usage of the system and to enhance security. System usage is simplified since the user is allowed to restrict attention to the data of interest. Security is provided if there is a mechanism to restrict the user to his or her personal view or views. Relational database systems typically provide security at two levels:  Relation: A user may be permitted or denied direct access to a relation  View: A user may be permitted or denied access to data appearing in a view. Although a user may be denied direct access to a relation, the user may be able to access part of that relation through a view. Thus, a combination of relational level security and view level security can be used to limit a user’s access to precisely the data that user needs.
  • 6. A user may have several forms of authorization on part of the database. Among these are the following:  Read authorization, which allows reading, but not modification of data  Insert authorization, which allows insertion of new data, but not the modification of existing data  Update authorization, which allows modification, but not deletion, of data  Delete authorization, which allows deletion of data.
  • 7. In addition to the above forms of authorization for access to data, a user may be granted authorization to modify the database scheme:  Index authorization, which allow creation and deletion of indices  Resources authorization, which allow the creation new relations  Alteration authorization, which allow the addition or deletion of attributes in a relation  Drop authorization, which allows the deletion of relations The drop and delete authorization differ in that delete authorization allows deletion of tuples only. If a user deletes all tuples of a relation, the relation still exists, but it is empty. If a relation is dropped, it no longer exists.
  • 8. Integrity constraints Integrity constraints provide a means of ensuring that changes made to the database by authorized users do not result in a loss of data consistency. In the network model and the E-R model, we saw integrity constraints in the form of:  Key declarations, the stipulation that certain attributes form a candidate key for a given entity set constrains the set of legal insertions.  Form of a relationship, many-to–many, one–to–many, one–to– one. A one-to– one or one–to-many relationship restricts the set of legal relationships among entities of a collection of entity sets. Another example of an integrity constraint is set retention in the network model.
  • 9. In general, an integrity constraint can be an arbitrary predicate pertaining to the database. However, arbitrary predicates may be costly to test. Thus, we usually limit ourselves to integrity constraints that can be tested with minimal overhead. This is the purpose behind dependency – preserving decompositions of relation schemes. Recall that in a dependency – preserving decomposition, it is possible to test for satisfaction of the data dependencies without the need to compute any joins. Domain – key normal is an ideal design from the point of view of efficient testing of integrity constraints, since the only forms of constraint that need be tested are key constraints and domain constraints. If the key and domain constraints are satisfied, and the database scheme is in DKNF, then all integrity constraints on the database are satisfied. Key constraints are one of the most easily tested forms of consistency constraint, especially if an index is maintained on that candidate key. During the process of inserting a record into the database a lookup must be performed using the index and any duplicate key values that may exist are found. Since not all index search keys are candidate keys for the relation (Indices may be for secondary keys), we need to declare an index to be either  Unique: Only one record may exist for a key value  Non-unique: Multiple records are allowed to have the same key value
  • 10. Another form of constraint that is easy to test is domain constraints. Testing domain constraints is analogous to runtime – type checking in a programming language. A form of constraint closely related to domain constraints involves the admissibility of null values. We may forbid null values for certain attributes but allow them for others. Relatively few systems allow the expression of constraints that are more complex than key declarations or domain constraints. The original proposal for the SQL language included a general purpose construct called the assert statement for the expression of integrity constraints.
  • 11. An assertion pertaining to a single relation takes the form: For example, if we wish to define an integrity constraint that no account balance is negative we write: In its most general form, the assert statement takes the form:

Editor's Notes

  1. Links: https://www.pexels.com/photo/black-sail-ship-on-body-of-water-906982/
  2. https://www.pexels.com/photo/man-in-bubble-jacket-holding-tablet-computer-4484078/
  3. https://www.pexels.com/photo/man-in-bubble-jacket-holding-tablet-computer-4484078/
  4. https://www.pexels.com/photo/man-in-bubble-jacket-holding-tablet-computer-4484078/
  5. https://www.pexels.com/photo/man-in-bubble-jacket-holding-tablet-computer-4484078/
  6. https://www.pexels.com/photo/man-in-bubble-jacket-holding-tablet-computer-4484078/
  7. https://www.pexels.com/photo/man-in-bubble-jacket-holding-tablet-computer-4484078/
  8. https://www.pexels.com/photo/man-in-bubble-jacket-holding-tablet-computer-4484078/
  9. https://www.pexels.com/photo/man-in-bubble-jacket-holding-tablet-computer-4484078/
  10. https://www.pexels.com/photo/man-in-bubble-jacket-holding-tablet-computer-4484078/
  11. https://www.pexels.com/photo/man-in-bubble-jacket-holding-tablet-computer-4484078/