SlideShare une entreprise Scribd logo
1  sur  54
Banking Management System
Topic
Definition1
importance2
Implement3
Requirements4
Face problems
5
ER-Diagram6
Contents
Entities & attribute7
Modeling8
S.Q.L
9
Conclusion
10
Question answer
11
Contents
Over View
Collection of information
that is organized so that it
can easily access.
Data store in tables,rows
And column
Data Base
 A database management system (DBMS) is system
software.
 Creating and managing databases.
 The DBMS provides users and programmers with a
systematic way to create, retrieve, update and
manage data.
Definition of DBMS1
Importance of DBMS2
 A database management system is important because
 It helps make data management more efficient and effective.
 A database management system stores.
 organizes and manages a large amount of information within a
single software application.
 Use of this system increases efficiency of business operations and
reduces overall costs.
Importance of DBMS2
 Analyze user environment.
 Develop logical model.
 Choose DBMS.
 Map logical model DBMS.
 Develop physical Design.
 Evaluate Physical Model.
 Tune System.
 Implement System.
3 Implement
 Customer
 Banker-info
 Branch
 Loan
 Credit-Card
 Account
Requirements BMS4
 Verification of documentation.
 Customer service representative / Personal banker
Clearing , Account opening , online transfers etc.
 Forms of special crossing cheques.
 Customer debit and credit problem.
 Employee is not efficient.
 Customer Communication problem face.
Face a Problems5
 They do not communication with us accurate time.
 Death of any person.
 Verification of Deduction of Zakat.
 Provision for Bad Debit.
 Missing Vouchers.
 Verification of lockers facilities.
Face a Problems5
ER-Diagram6
1: ENTITIES (Customer)
ATTRIBUTES (Customer-id , Customer-name , Customer-street , Customer-city)
2: ENTITIES (Banker-info)
ATTRIBUTES (Banker-name , Banker-email , Banker-id)
3: ENTITIES (Branch)
ATTRIBUTES (Assets , Branch-name , Branch-city)
4: ENTITIES (Loan)
ATTRIBUTES (loan-number , Amount)
5: ENTITIES (Credit-Card)
ATTRIBUTES (Expired-date , Limit , Credit_card_number )
6: ENTITIES (Account)
ATTRIBUTES (Balance , Account-number , Category)
Entities & attribute7
 Representation of real world objects, event and their
association called molding.
 It helps the user understand the complexities.
 Used to as a communication tool.
 Good data model enables the users to understand the
organization.
 For which the data base design is developed.
 Good data model very necessary to design the data base.
Modeling8
Importance of Data model
Types of data model
 Object-based Data model
 Record based model
 Physical Data model
Object based Data Model
 Object based model use the concept.
 Like Entities, attributes, relationship
 Entities
Person, place, things, for which data is collected.
 Attribute
The characteristics of entity is called attribute.
 Relationship
The association b/w two or more entity.
Record based data model
 Used to describe external and conceptual level of data
base.
 Also use to describe internal level to some extent.
 They are used to develop and logical structure.
 The record may different type.
 Each record types define of fixed number of field.
Types of Record based
 Hierarchical Model
 Network model
 Relational model
(In our project we use the relational model)
Physical Data model
 Describe the store the data in computer.
 They give information, such as record structure.
 They are not as many physical data model as logical data
model
S.Q.L9
S.Q.L (Structured Query Language)
S.Q.L
 S.Q.L stands foe Structured Query language.
 It is not full features programming language.
 It is simply data sub language
 SQL was developed by IBM.
 It endorsed as a national standard by ANSI
 (American national standard institution).
 New standard SQL3 also exists.
 The most widely implement of version of SQL is ANSI-92
 SQL is English-like language.
 It uses words Like SELECT, INSERT etc.
 SQL commands are not case Sensitive
 SQL provide commands for variety of task including.
o Inserting, updating, deleting row in a table.
o Creating, modifying, and deleting.
o Controlling access to the data base and data base object.
Features of S.Q.L
DDL (Data Definition Language)
 Data Definition Language (DDL) is a standard for
commands that define the different structures in a
database.
 DDL statements create, modify, and remove database
objects such as tables.
 Common DDL statements are CREATE, ALTER, and
DROP.
Create Statement:
Using Create statement, we can create a new table in the
database. The syntax of the Create statement is as follows.
Syntax:
CREATE TABLE <Table Name>
(Column 1 data type,
Column 2 data type,
Column 3 data type …
Column n data type);
DDL (Data Definition Language)
 Here, CREATE and TABLE are keywords.
 The table and column names must start with a letter and
can be followed by letters, numbers, or underscores.
 SQL reserved keywords should not be used as names for
tables and columns
DDL (Data Definition Language)
Alter Statement:
 Using alter statement we can do the following alterations
in our existing table.
 Adding a new column
 Renaming a column
DDL (Data Definition Language)
Adding a new column:
The syntax for adding a new column into the table is as
follows.
Syntax:
ALTER TABLE <Table name>
ADD(column 1 data type, column 2 data type, … column
n data type);
 Here, ALTER, TABLE and ADD are keywords.
DDL (Data Definition Language)
Renaming a column:
The syntax for renaming a column is as follows.
Syntax:
ALTER TABLE <Table name> RENAME COLUMN <old
name> TO <new name>;
 Here, ALTER, TABLE, RENAME, COLUMN and TO are
keywords.
DDL (Data Definition Language)
Drop Statement:
The drop statement is used to delete a table and all the
rows in the table.
Syntax:
DROP TABLE <Table name>
 Here, DROP and TABLE are keywords.
DDL (Data Definition Language)
DML (Data manipulation Language)
 The DML commands are used to insert and modify the data
in the database. It enables us to perform the following
tasks.
 Inserting a row or the values of particular columns into the
table (Using Insert statement)
 Updating values of columns in a table (Using Update
statement)
 Deleting rows in a table (Using Delete statement)
Syntax 1: (To insert values for the specified columns in a table)
INSERT INTO <Table Name> (column 1, column 2, … column n)
VALUES (value1, value2, … value n);
 Here, INSERT, INTO and VALUES are keywords.
DML (Data manipulation Language)
Update Statement:
The update statement is used to update or change
records that match specified criteria. This is accomplished
by using a WHERE clause.
Syntax:
UPDATE <Table Name>
SET column 1 = value 1, column 2 = value 2, … column 3 =
value 3
WHERE <condition>;
DML (Data manipulation Language)
Delete Statement:
The delete statement is used to delete the records or rows
from the table.
Syntax:
DELETE FROM <Table Name>
WHERE <Condition>
 Here, DELETE, FROM and WHERE are keywords.
DML (Data manipulation Language)
9
Security
Security
 Overview To Database Security.
 Why need of database security.
 What is Database Security.
 Concepts of Database Security.
Security9
Threats and risk to database have increased, So there is a
need for security of the database.
The majority companies store sensitive data in database.
If there is no
security to
database what
happens???
Data will be
easily corrupted
Overview
Security risk to database includes
Unauthorized database users
Unauthorized Database Administrator
Unauthorized access to Database
Lack of access to Database
services
Sensitive data includes
•Bank/Demat accounts
•Credit card, Salary,
Income tax data
•University admissions,
marks/grades
•Land records, licenses
Definition of Database Security
Database Security is defined as the
process by which “Confidentiality,
Integrity and Availability” of the database
can be protected.
Threats to database
Unauthorized access.
Password Cracking.
Network Eaves Dropping.
SQL Injection.

SQL Injection
A form of attack on a database-driven of insecure code on a system connected
to the Internet , bypassing the firewall Web site in which the attacker executes
unauthorized SQL commands by taking advantage.
3/4/2017
Vulnerabilities:
Poor Input validation to web
application.
Unsafe ,dynamically constructed
SQL commands.
Weak permissions that fail to
restrict the application to Database
Methods of securing the database
Authorization - privileges,
views.
Authentication – passwords.
Encryption - public key / private
key, secure sockets.
Logical - firewalls, net proxies.
3/4/2017Database security issues
Security of The Database Through Firewalls
A FIREWALL is dedicated software on another computer which inspects
network traffic passing through it and denies (or) permits passage based on set
of rules. Basically it is a piece of software that monitors all traffic that goes from
your system to another via the Internet or network and Vice Versa
Database Firewalls are a type of Web Application Firewalls that monitor
databases to identify and protect against database specific attacks that
mostly seek to access sensitive information stored in the databases.
How Database Firewall works
The Database Firewalls include a set of pre-defined, customizable security audit policies
and they can identify database attacks based on threat patterns called signatures.
The SQL input statements (or) queries are compared to these signatures, which are
updated frequently by the vendors to identify known attacks on the database.
But all the attacks on the databases may not be familiar.
Database Firewalls build (or come with) white list of approved SQL commands(or)
statements that are safe.
All the input commands are compared with this white list and only those that are already
present in the white list are sent to the database.
Diagrammatic Representation
DATABASES MANAGEMENT SYSTEM
Keys
DATABASES MANAGEMENT SYSTEM
Conclusion
10
Conclusion
 A DBMS is a systematic operational system which consists of tools
making data, data saving and data manipulation an easier task.
 DBMS is the majorly used through out the wold for data handling.
 Thus its a good data manager till today.
 If some one ask you question How do we protect data form crashes.
Bank mangement system
Bank mangement system

Contenu connexe

Tendances

Data base management system
Data base management systemData base management system
Data base management system
Navneet Jingar
 

Tendances (20)

Physical Database Design & Performance
Physical Database Design & PerformancePhysical Database Design & Performance
Physical Database Design & Performance
 
Data base management system
Data base management systemData base management system
Data base management system
 
Codds rule
Codds ruleCodds rule
Codds rule
 
DBMS and its Models
DBMS and its ModelsDBMS and its Models
DBMS and its Models
 
Data models
Data modelsData models
Data models
 
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
 
Dbms and rdbms ppt
Dbms and rdbms pptDbms and rdbms ppt
Dbms and rdbms ppt
 
MySQL
MySQLMySQL
MySQL
 
Using the set operators
Using the set operatorsUsing the set operators
Using the set operators
 
Database concepts
Database conceptsDatabase concepts
Database concepts
 
Entity relationship (er) modeling
Entity relationship (er) modelingEntity relationship (er) modeling
Entity relationship (er) modeling
 
Normal forms
Normal formsNormal forms
Normal forms
 
Normalization of database tables
Normalization of database tablesNormalization of database tables
Normalization of database tables
 
Mysql joins
Mysql joinsMysql joins
Mysql joins
 
The relational database model
The relational database modelThe relational database model
The relational database model
 
Dbms ii mca-ch4-relational model-2013
Dbms ii mca-ch4-relational model-2013Dbms ii mca-ch4-relational model-2013
Dbms ii mca-ch4-relational model-2013
 
Data Models [DATABASE SYSTEMS: Design, Implementation, and Management]
Data Models [DATABASE SYSTEMS: Design, Implementation, and Management]Data Models [DATABASE SYSTEMS: Design, Implementation, and Management]
Data Models [DATABASE SYSTEMS: Design, Implementation, and Management]
 
Normalization in SQL | Edureka
Normalization in SQL | EdurekaNormalization in SQL | Edureka
Normalization in SQL | Edureka
 
Slide 4 dbms users
Slide 4 dbms usersSlide 4 dbms users
Slide 4 dbms users
 
Introduction to structured query language (sql)
Introduction to structured query language (sql)Introduction to structured query language (sql)
Introduction to structured query language (sql)
 

En vedette

Evidence Seizure
Evidence SeizureEvidence Seizure
Evidence Seizure
CTIN
 
Data Base Management System(Dbms)Sunita
Data Base Management System(Dbms)SunitaData Base Management System(Dbms)Sunita
Data Base Management System(Dbms)Sunita
Apex
 
Enhanced E-R diagram
Enhanced E-R diagramEnhanced E-R diagram
Enhanced E-R diagram
Mayank Jain
 
Previous question papers of Database Management System (DBMS) By SHABEEB
Previous question papers of Database Management System (DBMS) By SHABEEBPrevious question papers of Database Management System (DBMS) By SHABEEB
Previous question papers of Database Management System (DBMS) By SHABEEB
Shabeeb Shabi
 
SYNOPSIS ON BANK MANAGEMENT SYSTEM
SYNOPSIS ON BANK MANAGEMENT SYSTEMSYNOPSIS ON BANK MANAGEMENT SYSTEM
SYNOPSIS ON BANK MANAGEMENT SYSTEM
Nitish Xavier Tirkey
 

En vedette (16)

Tesi magistrale Martino Marangon
Tesi magistrale Martino MarangonTesi magistrale Martino Marangon
Tesi magistrale Martino Marangon
 
Evidence Seizure
Evidence SeizureEvidence Seizure
Evidence Seizure
 
My CorporateComm. Presentation Talk - for the UPM Final Student 2014
My CorporateComm. Presentation Talk - for the UPM Final Student 2014My CorporateComm. Presentation Talk - for the UPM Final Student 2014
My CorporateComm. Presentation Talk - for the UPM Final Student 2014
 
MOU Between Voice of Women ( Malaysia) & World Muslimah Foundation (WMF)
MOU Between Voice of Women  ( Malaysia) & World Muslimah Foundation (WMF)MOU Between Voice of Women  ( Malaysia) & World Muslimah Foundation (WMF)
MOU Between Voice of Women ( Malaysia) & World Muslimah Foundation (WMF)
 
Marketing planning
Marketing planningMarketing planning
Marketing planning
 
The MEAN stack
The MEAN stack The MEAN stack
The MEAN stack
 
marketing management
marketing managementmarketing management
marketing management
 
Presentation of DBMS (database management system) part 1
Presentation of DBMS (database management system) part 1Presentation of DBMS (database management system) part 1
Presentation of DBMS (database management system) part 1
 
Data Base Management System(Dbms)Sunita
Data Base Management System(Dbms)SunitaData Base Management System(Dbms)Sunita
Data Base Management System(Dbms)Sunita
 
Enhanced E-R diagram
Enhanced E-R diagramEnhanced E-R diagram
Enhanced E-R diagram
 
enhanced er diagram
enhanced er diagramenhanced er diagram
enhanced er diagram
 
Previous question papers of Database Management System (DBMS) By SHABEEB
Previous question papers of Database Management System (DBMS) By SHABEEBPrevious question papers of Database Management System (DBMS) By SHABEEB
Previous question papers of Database Management System (DBMS) By SHABEEB
 
Distributed blood bank management system database
Distributed blood bank management system databaseDistributed blood bank management system database
Distributed blood bank management system database
 
Bank management system
Bank management systemBank management system
Bank management system
 
SYNOPSIS ON BANK MANAGEMENT SYSTEM
SYNOPSIS ON BANK MANAGEMENT SYSTEMSYNOPSIS ON BANK MANAGEMENT SYSTEM
SYNOPSIS ON BANK MANAGEMENT SYSTEM
 
Bank Management System
Bank Management SystemBank Management System
Bank Management System
 

Similaire à Bank mangement system

Lecture on DBMS & MySQL.pdf v. C. .
Lecture on DBMS & MySQL.pdf v.  C.     .Lecture on DBMS & MySQL.pdf v.  C.     .
Lecture on DBMS & MySQL.pdf v. C. .
MayankSinghRawat6
 

Similaire à Bank mangement system (20)

unit 1.pptx
unit 1.pptxunit 1.pptx
unit 1.pptx
 
Database fundamentals
Database fundamentalsDatabase fundamentals
Database fundamentals
 
Introduction to the Structured Query Language SQL
Introduction to the Structured Query Language SQLIntroduction to the Structured Query Language SQL
Introduction to the Structured Query Language SQL
 
Module02
Module02Module02
Module02
 
unit 1.pptx
unit 1.pptxunit 1.pptx
unit 1.pptx
 
2nd chapter dbms.pptx
2nd chapter dbms.pptx2nd chapter dbms.pptx
2nd chapter dbms.pptx
 
Introduction to database with ms access.hetvii
Introduction to database with ms access.hetviiIntroduction to database with ms access.hetvii
Introduction to database with ms access.hetvii
 
Introduction to database with ms access(DBMS)
Introduction to database with ms access(DBMS)Introduction to database with ms access(DBMS)
Introduction to database with ms access(DBMS)
 
Data base
Data baseData base
Data base
 
PPT SQL CLASS.pptx
PPT SQL CLASS.pptxPPT SQL CLASS.pptx
PPT SQL CLASS.pptx
 
csedatabasemanagementsystemppt-170825044344.pdf
csedatabasemanagementsystemppt-170825044344.pdfcsedatabasemanagementsystemppt-170825044344.pdf
csedatabasemanagementsystemppt-170825044344.pdf
 
Database Management System ppt
Database Management System pptDatabase Management System ppt
Database Management System ppt
 
Bca examination 2017 dbms
Bca examination 2017 dbmsBca examination 2017 dbms
Bca examination 2017 dbms
 
Lecture on DBMS & MySQL.pdf v. C. .
Lecture on DBMS & MySQL.pdf v.  C.     .Lecture on DBMS & MySQL.pdf v.  C.     .
Lecture on DBMS & MySQL.pdf v. C. .
 
Database-management-system-dbms-ppt.pptx
Database-management-system-dbms-ppt.pptxDatabase-management-system-dbms-ppt.pptx
Database-management-system-dbms-ppt.pptx
 
Dbms Basics
Dbms BasicsDbms Basics
Dbms Basics
 
Database Systems Concepts, 5th Ed
Database Systems Concepts, 5th EdDatabase Systems Concepts, 5th Ed
Database Systems Concepts, 5th Ed
 
Artifacts, Data Dictionary, Data Modeling, Data Wrangling
Artifacts, Data Dictionary, Data Modeling, Data WranglingArtifacts, Data Dictionary, Data Modeling, Data Wrangling
Artifacts, Data Dictionary, Data Modeling, Data Wrangling
 
T-SQL Overview
T-SQL OverviewT-SQL Overview
T-SQL Overview
 
Ch1- Introduction to dbms
Ch1- Introduction to dbmsCh1- Introduction to dbms
Ch1- Introduction to dbms
 

Dernier

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 

Dernier (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 

Bank mangement system

  • 1.
  • 2.
  • 6.
  • 7. Over View Collection of information that is organized so that it can easily access. Data store in tables,rows And column Data Base
  • 8.  A database management system (DBMS) is system software.  Creating and managing databases.  The DBMS provides users and programmers with a systematic way to create, retrieve, update and manage data. Definition of DBMS1
  • 10.  A database management system is important because  It helps make data management more efficient and effective.  A database management system stores.  organizes and manages a large amount of information within a single software application.  Use of this system increases efficiency of business operations and reduces overall costs. Importance of DBMS2
  • 11.  Analyze user environment.  Develop logical model.  Choose DBMS.  Map logical model DBMS.  Develop physical Design.  Evaluate Physical Model.  Tune System.  Implement System. 3 Implement
  • 12.  Customer  Banker-info  Branch  Loan  Credit-Card  Account Requirements BMS4
  • 13.  Verification of documentation.  Customer service representative / Personal banker Clearing , Account opening , online transfers etc.  Forms of special crossing cheques.  Customer debit and credit problem.  Employee is not efficient.  Customer Communication problem face. Face a Problems5
  • 14.  They do not communication with us accurate time.  Death of any person.  Verification of Deduction of Zakat.  Provision for Bad Debit.  Missing Vouchers.  Verification of lockers facilities. Face a Problems5
  • 16.
  • 17. 1: ENTITIES (Customer) ATTRIBUTES (Customer-id , Customer-name , Customer-street , Customer-city) 2: ENTITIES (Banker-info) ATTRIBUTES (Banker-name , Banker-email , Banker-id) 3: ENTITIES (Branch) ATTRIBUTES (Assets , Branch-name , Branch-city) 4: ENTITIES (Loan) ATTRIBUTES (loan-number , Amount) 5: ENTITIES (Credit-Card) ATTRIBUTES (Expired-date , Limit , Credit_card_number ) 6: ENTITIES (Account) ATTRIBUTES (Balance , Account-number , Category) Entities & attribute7
  • 18.  Representation of real world objects, event and their association called molding.  It helps the user understand the complexities.  Used to as a communication tool.  Good data model enables the users to understand the organization.  For which the data base design is developed.  Good data model very necessary to design the data base. Modeling8 Importance of Data model
  • 19. Types of data model  Object-based Data model  Record based model  Physical Data model
  • 20. Object based Data Model  Object based model use the concept.  Like Entities, attributes, relationship  Entities Person, place, things, for which data is collected.  Attribute The characteristics of entity is called attribute.  Relationship The association b/w two or more entity.
  • 21. Record based data model  Used to describe external and conceptual level of data base.  Also use to describe internal level to some extent.  They are used to develop and logical structure.  The record may different type.  Each record types define of fixed number of field.
  • 22. Types of Record based  Hierarchical Model  Network model  Relational model (In our project we use the relational model)
  • 23. Physical Data model  Describe the store the data in computer.  They give information, such as record structure.  They are not as many physical data model as logical data model
  • 25. S.Q.L  S.Q.L stands foe Structured Query language.  It is not full features programming language.  It is simply data sub language  SQL was developed by IBM.  It endorsed as a national standard by ANSI  (American national standard institution).  New standard SQL3 also exists.  The most widely implement of version of SQL is ANSI-92
  • 26.  SQL is English-like language.  It uses words Like SELECT, INSERT etc.  SQL commands are not case Sensitive  SQL provide commands for variety of task including. o Inserting, updating, deleting row in a table. o Creating, modifying, and deleting. o Controlling access to the data base and data base object. Features of S.Q.L
  • 27. DDL (Data Definition Language)  Data Definition Language (DDL) is a standard for commands that define the different structures in a database.  DDL statements create, modify, and remove database objects such as tables.  Common DDL statements are CREATE, ALTER, and DROP.
  • 28. Create Statement: Using Create statement, we can create a new table in the database. The syntax of the Create statement is as follows. Syntax: CREATE TABLE <Table Name> (Column 1 data type, Column 2 data type, Column 3 data type … Column n data type); DDL (Data Definition Language)
  • 29.  Here, CREATE and TABLE are keywords.  The table and column names must start with a letter and can be followed by letters, numbers, or underscores.  SQL reserved keywords should not be used as names for tables and columns DDL (Data Definition Language)
  • 30. Alter Statement:  Using alter statement we can do the following alterations in our existing table.  Adding a new column  Renaming a column DDL (Data Definition Language)
  • 31. Adding a new column: The syntax for adding a new column into the table is as follows. Syntax: ALTER TABLE <Table name> ADD(column 1 data type, column 2 data type, … column n data type);  Here, ALTER, TABLE and ADD are keywords. DDL (Data Definition Language)
  • 32. Renaming a column: The syntax for renaming a column is as follows. Syntax: ALTER TABLE <Table name> RENAME COLUMN <old name> TO <new name>;  Here, ALTER, TABLE, RENAME, COLUMN and TO are keywords. DDL (Data Definition Language)
  • 33. Drop Statement: The drop statement is used to delete a table and all the rows in the table. Syntax: DROP TABLE <Table name>  Here, DROP and TABLE are keywords. DDL (Data Definition Language)
  • 34. DML (Data manipulation Language)  The DML commands are used to insert and modify the data in the database. It enables us to perform the following tasks.  Inserting a row or the values of particular columns into the table (Using Insert statement)  Updating values of columns in a table (Using Update statement)  Deleting rows in a table (Using Delete statement)
  • 35. Syntax 1: (To insert values for the specified columns in a table) INSERT INTO <Table Name> (column 1, column 2, … column n) VALUES (value1, value2, … value n);  Here, INSERT, INTO and VALUES are keywords. DML (Data manipulation Language)
  • 36. Update Statement: The update statement is used to update or change records that match specified criteria. This is accomplished by using a WHERE clause. Syntax: UPDATE <Table Name> SET column 1 = value 1, column 2 = value 2, … column 3 = value 3 WHERE <condition>; DML (Data manipulation Language)
  • 37. Delete Statement: The delete statement is used to delete the records or rows from the table. Syntax: DELETE FROM <Table Name> WHERE <Condition>  Here, DELETE, FROM and WHERE are keywords. DML (Data manipulation Language)
  • 39.  Overview To Database Security.  Why need of database security.  What is Database Security.  Concepts of Database Security. Security9
  • 40. Threats and risk to database have increased, So there is a need for security of the database. The majority companies store sensitive data in database. If there is no security to database what happens??? Data will be easily corrupted Overview
  • 41. Security risk to database includes Unauthorized database users Unauthorized Database Administrator Unauthorized access to Database Lack of access to Database services Sensitive data includes •Bank/Demat accounts •Credit card, Salary, Income tax data •University admissions, marks/grades •Land records, licenses
  • 42. Definition of Database Security Database Security is defined as the process by which “Confidentiality, Integrity and Availability” of the database can be protected.
  • 43. Threats to database Unauthorized access. Password Cracking. Network Eaves Dropping. SQL Injection.
  • 44.  SQL Injection A form of attack on a database-driven of insecure code on a system connected to the Internet , bypassing the firewall Web site in which the attacker executes unauthorized SQL commands by taking advantage. 3/4/2017 Vulnerabilities: Poor Input validation to web application. Unsafe ,dynamically constructed SQL commands. Weak permissions that fail to restrict the application to Database
  • 45. Methods of securing the database Authorization - privileges, views. Authentication – passwords. Encryption - public key / private key, secure sockets. Logical - firewalls, net proxies. 3/4/2017Database security issues
  • 46. Security of The Database Through Firewalls A FIREWALL is dedicated software on another computer which inspects network traffic passing through it and denies (or) permits passage based on set of rules. Basically it is a piece of software that monitors all traffic that goes from your system to another via the Internet or network and Vice Versa Database Firewalls are a type of Web Application Firewalls that monitor databases to identify and protect against database specific attacks that mostly seek to access sensitive information stored in the databases.
  • 47. How Database Firewall works The Database Firewalls include a set of pre-defined, customizable security audit policies and they can identify database attacks based on threat patterns called signatures. The SQL input statements (or) queries are compared to these signatures, which are updated frequently by the vendors to identify known attacks on the database. But all the attacks on the databases may not be familiar. Database Firewalls build (or come with) white list of approved SQL commands(or) statements that are safe. All the input commands are compared with this white list and only those that are already present in the white list are sent to the database.
  • 50.
  • 52. Conclusion  A DBMS is a systematic operational system which consists of tools making data, data saving and data manipulation an easier task.  DBMS is the majorly used through out the wold for data handling.  Thus its a good data manager till today.  If some one ask you question How do we protect data form crashes.