Professional Documents
Culture Documents
Micro-Project Report
On
Submitted by Group no 9
1
Certificate
This is to certify that the Micro Project titled
“DATABASE SECURITY, BACKUP AND
RESTORE”
Submitted By Group no 9
Name of Student Enrollment No.
1. PRANAV B WAGH 1912420309
2. RUPALI KATRE 1912420308
3. SWAPNIL PUSTODE 1912420310
4. PRACHI KHOBRAGADE 1912420311
2
INDEX
Sr
Title Page no.
No.
1 Rationale 4
2 Aim of Micro- Project 4
3 Course Outcome Achieved 4
4 Literature Review 4-10
5 Actual Methodology Followed 10-11
6 Actual Resources Used 12
7 Outputs of the Micro-Project 12
8 Skill Developed / learning out of this Micro-Project 12
9 Applications of this Micro-Project 13
3
Micro-Project Report
1.0 Rationale
DATABASE SECURITY: Database security concerns the use of a broad range
of information security controls to protect databases against compromises of their
confidentiality, integrity and availability. It involves various types or categories of
controls, such as technical.
Database Backup: Database backup is the process of backing up the
operational state, architecture and stored data of database software. It enables the
creation of a duplicate instance or copy of a database in case the primary database
crashes, is corrupted or is lost.
Database Recovery: Data recovery is the process of restoring data that has
been lost, accidentally deleted, corrupted or made inaccessible.
From this microproject we will know about the database security, backup
and restore. Various threats for database security. We will come to know
about how to protect or secure the data. Updated knowledge about the
threats of data security and how to maintain it.The ACID and CIA what
roles are played by them w will come to know in this project.
https://www.tutorialspoint.com › distributed_dbms )
Database security is the technique that protects and secures the database against
intentional or accidental threats. Security concerns will be relevant not only to the
data resides in an organization's database: the breaking of security may harm other
parts of the system which may ultimately affect the database structure.
Consequently, database security includes hardware part, software part, human
resource, and data. To efficiently do the uses of security needs appropriate
controls, which are distinct in a specific mission and purpose for the system. The
requirement for getting proper security while often having been neglected or
overlooked in the past days; is now more and more thoroughly checked by the
different organizations.
4
We consider database security about the following situations:
What is a threat? (
https://www.techopedia.com › definition › backup-and-recovery)
: - Any situation or event, whether intentionally or incidentally, can cause
damage which can reflect an adverse effect on the database structure and
consequently the organization. A threat may occur by a situation or event
involving a person, or the action or situations that is probably to bring harm to an
organization and its database. The degree that an organization undergoes as a
result of a threat's following which depends upon some aspects, such as the
existence of countermeasures and contingency plans. Let us take an example
where you have a hardware failure occurs corrupting secondary storage; all
processing activity must cease until the problem is resolved.
For ex: - only account department can change financial details of company.
c) Availability: - Authorized users can be able to accesses data any time he wants.
: - Database security is more than just important: it is essential to any company with any
online component. Sufficient database security prevents data bring lost or compromised,
which may have serious ramifications for the company both in terms of finances and
reputation. Database security helps:
5
As you will see, database security places an obligation on you and your business to
keep sensitive data stored correctly, and used appropriately. Complying with
regulations and the applicable law not only reduces the risk of information being
mishandled, but it protects you from both costly legal ramifications and lost customer
confidence. Investment in Database security will ensure you have done your due
diligence in terms of data protection.
Data protection
Personal data shall be held only for one or more specified and lawful purposes.
Personal data held for any purpose or purposes shall not be used or disclosed
in any manner incompatible with that purpose or those purposes.
Personal data held for any purpose or purposes shall be adequately relevant
and not excessive in relation to that purpose or those purposes.
Access authorization.
Access controls.
Views.
Backup and recovery of data.
Data integrity.
Encryption of data.
RAID technology.
Database Backup
Database Backup is storage of data that means the copy of the data.
It is a safeguard against unexpected data loss and application errors.
It protects the database against data loss.
If the original data is lost, then using the backup it can reconstructed.
Types of backup:-
6
a) Normal or Full Backups
Normal backups are the fastest source to restore lost data because all the data
on a drive is saved in one location. The downside of normal backups is that they take
a very long time to run, and in some cases this is more time than a company can
allow. Drives that hold a lot of data may not be capable of a full backup, even if they
run overnight. In these cases, incremental and differential backups can be added to the
backup schedule to save time.
b) Incremental Backups
A common way to deal with the long running times required for full backups is to run
them only on weekends. Many businesses then run incremental backups throughout
the week since they take far less time. An incremental backup will grab only the files
that have been updated since the last normal backup. Once the incremental
backup has run, that file will not be backed up again unless it changes or during the
next full backup.
c) Differential Backups
An alternative to incremental database backups that has a less complicated
restore process is a differential backup. Differential backups and recovery are similar
to incremental in that these backups grab only files that have been updated since the
last normal backup. However, differential backups do not clear the archive bit. So a
file that is updated after a normal backup will be archived every time a differential
backup is run until the next normal backup runs and clears the archive bit.
What is recovery? (
: - It is the method of restoring the database to its correct state in the event of a failure
at the time of the transaction or after the end of a process. Earlier you have been given
the concept of database recovery as a service which should be provided by all the
DBMS for ensuring that the database is dependable and remains in a consistent state
in the presence of failures. In this context, dependability refers to both the flexibility
of the DBMS to various kinds of failure and its ability to recover from those failures.
In this chapter, you will gather a brief knowledge of how this service can be provided.
To gain a better understanding of the possible problems you may encounter in
providing a consistent system, you will first learn about the need for recovery and its
types of failure which usually occurs in a database environment.
7
What is need for recovery of data?
: - The storage of data usually includes four types of media with an increasing amount
of reliability: the main memory, the magnetic disk, the magnetic tape, and the optical
disk. There are many different forms of failure that can have an effect on database
processing and/or transaction and each of them has to be dealt with differently. Some
data failures can affect main memory only, while others involve non-volatile or
secondary storage also. Among the sources of failure are:
Due to hardware or software errors, the system crashes which ultimately resulting in
loss of main memory.
Failures of media, such as head crashes or unreadable media that results in the loss of
portions of secondary storage.
There can be application software errors, such as logical errors which are accessing
the database that can cause one or more transactions to abort or fail.
Natural physical disasters can also occur such as fires, floods, earthquakes, or power
failures.
Carelessness or unintentional destruction of data or directories by operators or users.
Damage or intentional corruption or hampering of data (using malicious software or
files) hardware or software facilities.
There are two methods that are primarily used for database recovery. These are:
1. Log based recovery - In log-based recovery, logs of all database transactions are
stored in a secure area so that in case of a system failure, the database can recover
the data. All log information, such as the time of the transaction, its data etc.
should be stored before the transaction is executed.
2. Shadow paging - In shadow paging, after the transaction is completed its data is
automatically stored for safekeeping. So, if the system crashes in the middle of a
transaction, changes made by it will not be reflected in the database.
Transaction (
ORACLE:
Oracle Database (commonly referred to as Oracle RDBMS or simply as Oracle) is a
proprietary multi-model database management system produced and marketed
by Oracle Corporation. It is a database commonly used for running online
transaction processing (OLTP), data warehousing (DW) and mixed (OLTP & DW)
database workloads.
COMPUTER SYSTEM:
We have used HP, i7 9th generation WITH INBUILT WINDOWS 10 Operating
system of 3.20 GHz INTEL Pentium Core processor (Laptop).
Dell Inspiron desktops and all-in-one PCs are designed with innovative technology and
latest features.
9
OFFICE SOFTWARE PACKAGES:
We have used MS word 2013 for creating our report to show about how we
created this website. For performing of this project we have used MICROSOFT
WORD OFFICE OF 2013 version. Microsoft Office 2013 is a version
of Microsoft Office, a productivity suite for Microsoft Windows.
System: This includes permissions for creating session, table, etc and all types of
other system privileges.
Object: This includes permissions for any command or query to perform any
operation on the database tables.
GRANT :It provides the user's access privileges to the database. In the MySQL
database offers both the administrator and user a great extent of the control options.
By the administration side of the process includes the possibility for the
administrators to control certain user privileges over the MySQL server by restricting
their access to an entire the database or ust limiting permissions for a specific table.It
Creates an entry in the security system that
allows a user in the current database to work with data in the current database or
execute specific statements.
10
Syntax:
GRANT privileges ON object TO user;
REVOKE : The REVOKE statement enables system administrators and to revoke the
privileges from MySQL accounts.
Syntax:
REVOKE privileges ON object FROM user;
1 WEBSITES https://www.c-sharpcorner.com/ -
UploadFile/65fc13/ddldml-and-dcl-in-
mysql/
https://www.c-sharpcorner.com/
UploadFile/65fc13/ddldml-and-dcl-in-
mysql/
11
https://www.tutorialspoint.com ›
Database-Backup-and-Recovery
1.
Grant
Revoke
12
8.0 Skill Developed / learning out of this Micro-Project
13
**************
14