SlideShare a Scribd company logo
1 of 24
Chapter 5 Database Administration and Security Transparencies
Chapter 5 - Objectives ,[object Object],[object Object],[object Object]
Chapter 5 - Objectives ,[object Object],[object Object],[object Object]
Data administration and database administration   ,[object Object],[object Object]
Data administration ,[object Object],[object Object],[object Object],[object Object]
Data administration tasks
Database administration ,[object Object],[object Object],[object Object],[object Object],[object Object]
Database administration tasks
Comparison of data and database administration
Database security ,[object Object],[object Object]
Database security ,[object Object],[object Object]
Database security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Database security ,[object Object],[object Object]
Examples of threats and possible outcomes
Summary of threats to computer systems
Typical multi-user computer environment
Countermeasures – computer-based controls ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Countermeasures – computer-based controls  ,[object Object],[object Object],[object Object],[object Object]
Countermeasures – computer-based controls ,[object Object],[object Object]
Countermeasures – computer-based controls ,[object Object],[object Object],[object Object],[object Object]
Countermeasures – computer-based controls ,[object Object],[object Object],[object Object],[object Object]
Redundant array of independent disks (RAID) ,[object Object],[object Object]
Redundant array of independent disks  ( RAID) ,[object Object],[object Object]
Redundant array of independent disks (RAID) ,[object Object]

More Related Content

What's hot

Securing data
Securing dataSecuring data
Securing dataDaniel Le
 
Chapter 5 database security
Chapter 5   database securityChapter 5   database security
Chapter 5 database securitySyaiful Ahdan
 
Security and Integrity of Data
Security and Integrity of DataSecurity and Integrity of Data
Security and Integrity of DataAdeel Riaz
 
Database security and security in networks
Database security and security in networksDatabase security and security in networks
Database security and security in networksG Prachi
 
Database security
Database securityDatabase security
Database securityCAS
 
Data base security
Data base securityData base security
Data base securitySara Nazir
 
Database security
Database securityDatabase security
Database securityBirju Tank
 
security and privacy in dbms and in sql database
security and privacy in dbms and in sql databasesecurity and privacy in dbms and in sql database
security and privacy in dbms and in sql databasegourav kottawar
 
01 database security ent-db
01  database security ent-db01  database security ent-db
01 database security ent-dbuncleRhyme
 
Backup and Disaster Recovery for Business Owners and Directors
Backup and Disaster Recovery for Business Owners and DirectorsBackup and Disaster Recovery for Business Owners and Directors
Backup and Disaster Recovery for Business Owners and DirectorsLucy Denver
 
Dbms ii mca-ch12-security-2013
Dbms ii mca-ch12-security-2013Dbms ii mca-ch12-security-2013
Dbms ii mca-ch12-security-2013Prosanta Ghosh
 
Black Box Backup System
Black Box Backup SystemBlack Box Backup System
Black Box Backup SystemCSCJournals
 

What's hot (20)

Securing data
Securing dataSecuring data
Securing data
 
DB security
 DB security DB security
DB security
 
Chapter 5 database security
Chapter 5   database securityChapter 5   database security
Chapter 5 database security
 
Database security
Database securityDatabase security
Database security
 
Security and Integrity of Data
Security and Integrity of DataSecurity and Integrity of Data
Security and Integrity of Data
 
Database security and security in networks
Database security and security in networksDatabase security and security in networks
Database security and security in networks
 
Database security
Database securityDatabase security
Database security
 
Database Security
Database SecurityDatabase Security
Database Security
 
Database security
Database securityDatabase security
Database security
 
Data base security
Data base securityData base security
Data base security
 
Securing data
Securing dataSecuring data
Securing data
 
Database security
Database securityDatabase security
Database security
 
Database security
Database securityDatabase security
Database security
 
Database Security
Database SecurityDatabase Security
Database Security
 
Database security
Database securityDatabase security
Database security
 
security and privacy in dbms and in sql database
security and privacy in dbms and in sql databasesecurity and privacy in dbms and in sql database
security and privacy in dbms and in sql database
 
01 database security ent-db
01  database security ent-db01  database security ent-db
01 database security ent-db
 
Backup and Disaster Recovery for Business Owners and Directors
Backup and Disaster Recovery for Business Owners and DirectorsBackup and Disaster Recovery for Business Owners and Directors
Backup and Disaster Recovery for Business Owners and Directors
 
Dbms ii mca-ch12-security-2013
Dbms ii mca-ch12-security-2013Dbms ii mca-ch12-security-2013
Dbms ii mca-ch12-security-2013
 
Black Box Backup System
Black Box Backup SystemBlack Box Backup System
Black Box Backup System
 

Similar to Chap05

Advantages And Disadvantages Of Database System
Advantages And Disadvantages Of Database SystemAdvantages And Disadvantages Of Database System
Advantages And Disadvantages Of Database SystemMarisela Stone
 
5db-security.pdf
5db-security.pdf5db-security.pdf
5db-security.pdfHODCA1
 
Database administration
Database administrationDatabase administration
Database administrationAnish Gupta
 
Chapter 1 Database Systems.pptx
Chapter 1 Database Systems.pptxChapter 1 Database Systems.pptx
Chapter 1 Database Systems.pptxMaxamedAbiib1
 
An Overview of Security in Distributed Database Management System
An Overview of Security in Distributed Database Management SystemAn Overview of Security in Distributed Database Management System
An Overview of Security in Distributed Database Management SystemIJSRD
 
A critique on traditional file system vs databases
A critique on traditional file system vs databasesA critique on traditional file system vs databases
A critique on traditional file system vs databasesShallote Dsouza
 
DATA BASE.docx
DATA BASE.docxDATA BASE.docx
DATA BASE.docxwrite31
 
database chap 1 and 2.pptx
database chap 1 and 2.pptxdatabase chap 1 and 2.pptx
database chap 1 and 2.pptxEliasasefa
 
Locking Down Your Data: Best Practices for Database Security
Locking Down Your Data: Best Practices for Database SecurityLocking Down Your Data: Best Practices for Database Security
Locking Down Your Data: Best Practices for Database SecurityFredReynolds2
 
Bba ii cam u ii-introduction to dbms
Bba ii cam  u ii-introduction to dbmsBba ii cam  u ii-introduction to dbms
Bba ii cam u ii-introduction to dbmsRai University
 
Database Computer presentation file .pptx
Database Computer presentation file .pptxDatabase Computer presentation file .pptx
Database Computer presentation file .pptxMisqalezara
 
Introduction to DBMS_VP.pptx
Introduction to DBMS_VP.pptxIntroduction to DBMS_VP.pptx
Introduction to DBMS_VP.pptxvishnupriyapm4
 
Enterprise data protection meeting
Enterprise data protection meetingEnterprise data protection meeting
Enterprise data protection meetingcsandit
 
Introduction to files and db systems 1.0
Introduction to files and db systems 1.0Introduction to files and db systems 1.0
Introduction to files and db systems 1.0Dr. C.V. Suresh Babu
 

Similar to Chap05 (20)

Database Security - IK
Database Security - IKDatabase Security - IK
Database Security - IK
 
Advantages And Disadvantages Of Database System
Advantages And Disadvantages Of Database SystemAdvantages And Disadvantages Of Database System
Advantages And Disadvantages Of Database System
 
Dstca
DstcaDstca
Dstca
 
5db-security.pdf
5db-security.pdf5db-security.pdf
5db-security.pdf
 
Intro to dbms
Intro to dbmsIntro to dbms
Intro to dbms
 
11 Database Concepts
11 Database Concepts11 Database Concepts
11 Database Concepts
 
Database administration
Database administrationDatabase administration
Database administration
 
Chapter 1 Database Systems.pptx
Chapter 1 Database Systems.pptxChapter 1 Database Systems.pptx
Chapter 1 Database Systems.pptx
 
An Overview of Security in Distributed Database Management System
An Overview of Security in Distributed Database Management SystemAn Overview of Security in Distributed Database Management System
An Overview of Security in Distributed Database Management System
 
A critique on traditional file system vs databases
A critique on traditional file system vs databasesA critique on traditional file system vs databases
A critique on traditional file system vs databases
 
DATA BASE.docx
DATA BASE.docxDATA BASE.docx
DATA BASE.docx
 
database chap 1 and 2.pptx
database chap 1 and 2.pptxdatabase chap 1 and 2.pptx
database chap 1 and 2.pptx
 
Database security
Database securityDatabase security
Database security
 
Locking Down Your Data: Best Practices for Database Security
Locking Down Your Data: Best Practices for Database SecurityLocking Down Your Data: Best Practices for Database Security
Locking Down Your Data: Best Practices for Database Security
 
Bba ii cam u ii-introduction to dbms
Bba ii cam  u ii-introduction to dbmsBba ii cam  u ii-introduction to dbms
Bba ii cam u ii-introduction to dbms
 
Database Computer presentation file .pptx
Database Computer presentation file .pptxDatabase Computer presentation file .pptx
Database Computer presentation file .pptx
 
Introduction to DBMS_VP.pptx
Introduction to DBMS_VP.pptxIntroduction to DBMS_VP.pptx
Introduction to DBMS_VP.pptx
 
Ch 13 D B Admin
Ch 13  D B  AdminCh 13  D B  Admin
Ch 13 D B Admin
 
Enterprise data protection meeting
Enterprise data protection meetingEnterprise data protection meeting
Enterprise data protection meeting
 
Introduction to files and db systems 1.0
Introduction to files and db systems 1.0Introduction to files and db systems 1.0
Introduction to files and db systems 1.0
 

More from sumit621

142230 633685297550892500
142230 633685297550892500142230 633685297550892500
142230 633685297550892500sumit621
 
Datawarehousing
DatawarehousingDatawarehousing
Datawarehousingsumit621
 
Datamining
DataminingDatamining
Dataminingsumit621
 
Cssu dw dm
Cssu dw dmCssu dw dm
Cssu dw dmsumit621
 
Chapter 13 data warehousing
Chapter 13   data warehousingChapter 13   data warehousing
Chapter 13 data warehousingsumit621
 
90300 633579030311875000
90300 63357903031187500090300 633579030311875000
90300 633579030311875000sumit621
 

More from sumit621 (13)

142230 633685297550892500
142230 633685297550892500142230 633685297550892500
142230 633685297550892500
 
Part1
Part1Part1
Part1
 
Lecture1
Lecture1Lecture1
Lecture1
 
Lect4
Lect4Lect4
Lect4
 
Datawarehousing
DatawarehousingDatawarehousing
Datawarehousing
 
Datamining
DataminingDatamining
Datamining
 
Database
DatabaseDatabase
Database
 
Cssu dw dm
Cssu dw dmCssu dw dm
Cssu dw dm
 
Chapter 13 data warehousing
Chapter 13   data warehousingChapter 13   data warehousing
Chapter 13 data warehousing
 
Chapter16
Chapter16Chapter16
Chapter16
 
90300 633579030311875000
90300 63357903031187500090300 633579030311875000
90300 633579030311875000
 
01 intro
01 intro01 intro
01 intro
 
Talk
TalkTalk
Talk
 

Chap05