Chapter 7
Chapter 7
Chapter 7
Data Recovery
As with almost all complex forms of computer hardware and
software, there is always the possibility of failure in database
systems
Therefore, it becomes crucial for data administrators to have
system recovery features in place to be able to recover
database contents that are damaged or lost when problems
occur
Performing an actual recovery can be a difficult task
In all likelihood, it may not be possible to completely and
Chapter 7
Data Protection
7.2. Concurrency
Concurrency is the ability of a database to allow multiple users
to affect multiple transactions
This is one of the main properties that separate a database from
other forms of data storage like spreadsheets
A transaction is a logical unit of database processing that
includes one or more access operations (read -retrieval, write insert or update, delete)
A transaction (set of operations) may be stand-alone specified
in a high level language like SQL submitted interactively, or
may be embedded within a program
Transaction boundaries: Begin and End transaction
An application program may contain several transactions
separated by the Begin and End transaction boundaries
10
11
12
Examples of threats:
Using another persons means of access
Unauthorized amendment/modification or copying of data
Program alteration
Inadequate policies and procedures that allow a mix of
confidential and normal out put
Wire-tapping
Illegal entry by hacker
Blackmail
Creating trapdoor into system
Theft of data, programs, and equipment
Failure of security mechanisms, giving greater access than
normal
16
17
18
19
20
Views
A view is the dynamic result of one or more
relational operations operation on the base relations
to produce another relation
A view is a virtual relation that does not actually
exist in the database, but is produced upon request
by a particular user
The view mechanism provides a powerful and
flexible security mechanism by hiding parts of the
database from certain users
Using a view is more restrictive than simply having
certain privileges granted to a user on the base
relation (s)
22
Integrity
Integrity constraints contribute to maintaining a
secure database system by preventing data from
becoming invalid and hence giving misleading or
incorrect results
Domain Integrity
Entity integrity
Referential integrity
Key constraints
23
24
26