7. Over View
Collection of information
that is organized so that it
can easily access.
Data store in tables,rows
And column
Data Base
8. A database management system (DBMS) is system
software.
Creating and managing databases.
The DBMS provides users and programmers with a
systematic way to create, retrieve, update and
manage data.
Definition of DBMS1
10. A database management system is important because
It helps make data management more efficient and effective.
A database management system stores.
organizes and manages a large amount of information within a
single software application.
Use of this system increases efficiency of business operations and
reduces overall costs.
Importance of DBMS2
13. Verification of documentation.
Customer service representative / Personal banker
Clearing , Account opening , online transfers etc.
Forms of special crossing cheques.
Customer debit and credit problem.
Employee is not efficient.
Customer Communication problem face.
Face a Problems5
14. They do not communication with us accurate time.
Death of any person.
Verification of Deduction of Zakat.
Provision for Bad Debit.
Missing Vouchers.
Verification of lockers facilities.
Face a Problems5
18. Representation of real world objects, event and their
association called molding.
It helps the user understand the complexities.
Used to as a communication tool.
Good data model enables the users to understand the
organization.
For which the data base design is developed.
Good data model very necessary to design the data base.
Modeling8
Importance of Data model
19. Types of data model
Object-based Data model
Record based model
Physical Data model
20. Object based Data Model
Object based model use the concept.
Like Entities, attributes, relationship
Entities
Person, place, things, for which data is collected.
Attribute
The characteristics of entity is called attribute.
Relationship
The association b/w two or more entity.
21. Record based data model
Used to describe external and conceptual level of data
base.
Also use to describe internal level to some extent.
They are used to develop and logical structure.
The record may different type.
Each record types define of fixed number of field.
22. Types of Record based
Hierarchical Model
Network model
Relational model
(In our project we use the relational model)
23. Physical Data model
Describe the store the data in computer.
They give information, such as record structure.
They are not as many physical data model as logical data
model
25. S.Q.L
S.Q.L stands foe Structured Query language.
It is not full features programming language.
It is simply data sub language
SQL was developed by IBM.
It endorsed as a national standard by ANSI
(American national standard institution).
New standard SQL3 also exists.
The most widely implement of version of SQL is ANSI-92
26. SQL is English-like language.
It uses words Like SELECT, INSERT etc.
SQL commands are not case Sensitive
SQL provide commands for variety of task including.
o Inserting, updating, deleting row in a table.
o Creating, modifying, and deleting.
o Controlling access to the data base and data base object.
Features of S.Q.L
27. DDL (Data Definition Language)
Data Definition Language (DDL) is a standard for
commands that define the different structures in a
database.
DDL statements create, modify, and remove database
objects such as tables.
Common DDL statements are CREATE, ALTER, and
DROP.
28. Create Statement:
Using Create statement, we can create a new table in the
database. The syntax of the Create statement is as follows.
Syntax:
CREATE TABLE <Table Name>
(Column 1 data type,
Column 2 data type,
Column 3 data type …
Column n data type);
DDL (Data Definition Language)
29. Here, CREATE and TABLE are keywords.
The table and column names must start with a letter and
can be followed by letters, numbers, or underscores.
SQL reserved keywords should not be used as names for
tables and columns
DDL (Data Definition Language)
30. Alter Statement:
Using alter statement we can do the following alterations
in our existing table.
Adding a new column
Renaming a column
DDL (Data Definition Language)
31. Adding a new column:
The syntax for adding a new column into the table is as
follows.
Syntax:
ALTER TABLE <Table name>
ADD(column 1 data type, column 2 data type, … column
n data type);
Here, ALTER, TABLE and ADD are keywords.
DDL (Data Definition Language)
32. Renaming a column:
The syntax for renaming a column is as follows.
Syntax:
ALTER TABLE <Table name> RENAME COLUMN <old
name> TO <new name>;
Here, ALTER, TABLE, RENAME, COLUMN and TO are
keywords.
DDL (Data Definition Language)
33. Drop Statement:
The drop statement is used to delete a table and all the
rows in the table.
Syntax:
DROP TABLE <Table name>
Here, DROP and TABLE are keywords.
DDL (Data Definition Language)
34. DML (Data manipulation Language)
The DML commands are used to insert and modify the data
in the database. It enables us to perform the following
tasks.
Inserting a row or the values of particular columns into the
table (Using Insert statement)
Updating values of columns in a table (Using Update
statement)
Deleting rows in a table (Using Delete statement)
35. Syntax 1: (To insert values for the specified columns in a table)
INSERT INTO <Table Name> (column 1, column 2, … column n)
VALUES (value1, value2, … value n);
Here, INSERT, INTO and VALUES are keywords.
DML (Data manipulation Language)
36. Update Statement:
The update statement is used to update or change
records that match specified criteria. This is accomplished
by using a WHERE clause.
Syntax:
UPDATE <Table Name>
SET column 1 = value 1, column 2 = value 2, … column 3 =
value 3
WHERE <condition>;
DML (Data manipulation Language)
37. Delete Statement:
The delete statement is used to delete the records or rows
from the table.
Syntax:
DELETE FROM <Table Name>
WHERE <Condition>
Here, DELETE, FROM and WHERE are keywords.
DML (Data manipulation Language)
39. Overview To Database Security.
Why need of database security.
What is Database Security.
Concepts of Database Security.
Security9
40. Threats and risk to database have increased, So there is a
need for security of the database.
The majority companies store sensitive data in database.
If there is no
security to
database what
happens???
Data will be
easily corrupted
Overview
41. Security risk to database includes
Unauthorized database users
Unauthorized Database Administrator
Unauthorized access to Database
Lack of access to Database
services
Sensitive data includes
•Bank/Demat accounts
•Credit card, Salary,
Income tax data
•University admissions,
marks/grades
•Land records, licenses
42. Definition of Database Security
Database Security is defined as the
process by which “Confidentiality,
Integrity and Availability” of the database
can be protected.
44.
SQL Injection
A form of attack on a database-driven of insecure code on a system connected
to the Internet , bypassing the firewall Web site in which the attacker executes
unauthorized SQL commands by taking advantage.
3/4/2017
Vulnerabilities:
Poor Input validation to web
application.
Unsafe ,dynamically constructed
SQL commands.
Weak permissions that fail to
restrict the application to Database
45. Methods of securing the database
Authorization - privileges,
views.
Authentication – passwords.
Encryption - public key / private
key, secure sockets.
Logical - firewalls, net proxies.
3/4/2017Database security issues
46. Security of The Database Through Firewalls
A FIREWALL is dedicated software on another computer which inspects
network traffic passing through it and denies (or) permits passage based on set
of rules. Basically it is a piece of software that monitors all traffic that goes from
your system to another via the Internet or network and Vice Versa
Database Firewalls are a type of Web Application Firewalls that monitor
databases to identify and protect against database specific attacks that
mostly seek to access sensitive information stored in the databases.
47. How Database Firewall works
The Database Firewalls include a set of pre-defined, customizable security audit policies
and they can identify database attacks based on threat patterns called signatures.
The SQL input statements (or) queries are compared to these signatures, which are
updated frequently by the vendors to identify known attacks on the database.
But all the attacks on the databases may not be familiar.
Database Firewalls build (or come with) white list of approved SQL commands(or)
statements that are safe.
All the input commands are compared with this white list and only those that are already
present in the white list are sent to the database.
52. Conclusion
A DBMS is a systematic operational system which consists of tools
making data, data saving and data manipulation an easier task.
DBMS is the majorly used through out the wold for data handling.
Thus its a good data manager till today.
If some one ask you question How do we protect data form crashes.