This conversion or “processing” is carried out using a predefined sequence of operations either manually or automatically. Most of the data processing is done by using computers and thus done automatically. The output or “processed” data can be obtained in different forms like image, graph, table, vector file, audio, charts or any other desired format depending on the software or method of data processing used. In initial days, the records were stored in the form of files. The way we stored in files is similar to papers, in the form of flat files – to be simpler, in notepad. All the files were grouped based on their categories; file used to have only related informations and each file is named properly. Separated and isolated data High data redundancy Program data interdependence Data inflexibility Atomicity problem Concurrent access problem Security problems Collection of similar kinds of data. To overcome the problems of flat file processing system, database concept was developed. For ex: Attendance Register, telephone directory, Mark Ledger etc. Software used to input, edit, store, update, process and manage database is called as DBMS. Ex: Ms-Access, fox pro, My SQL etc. Redundancy can be minimized Inconsistency can be avoided Data can be shared Secure Integrity can be maintained Provides multiple user interface Provides backup and recovery High initial investment cost Overhead for security, integrity and recovery. Regular Hardware and software maintenance cost Cost for backup and recovery Entity Relationship Diagram, also known as ERD, ER Diagram or ER model, is a type of structural diagram for use in database design. An ERD contains different symbols and connectors that visualize two important information: The major entities within the system scope, and the inter-relationships among these entities. An ER Diagram contains entity attribute and relationship. Entity is a definable thing or concept within a system. It is an object or concept about which we want to store information. It is represented by rectangles. Actions, which are represented by diamond shapes show how two entities share information in the database. Attributes are represented by ovals. A key attribute is the unique, distinguishing characteristic of the entity. For example, an employee's social security number might be the employee's key attribute. Solidlines that connect attributes to show the relationships of entities in the diagram. Alsoknown as PK a primary key is a special kind of entity attribute that uniquely defines a record in a database table Also known as FK a foreign key is a reference to a primary key in table. It is used to identify the relationships between entities. Stands for "Relational Database Management System. An RDBMS is a DBMS designed specifically for relational databases. A relational database refers to a database that stores data in a structured format, using rows and columns . It is "relational" because the values within each table are related to each other. The relational structure makes it possible to run queries across multiple tables at once. Examples: Oracle Database, MySQL, Microsoft SQL Server, Ms-Access Form(To enter records) Table(To store records) Query( To retrieve information) Report(Formatted output) Text Number Auto Number Memo Yes/No Hyperlink Date/Time OLE object Lookup Wizard currency Hierarchical – relationships between records form a hierarchy or treelike structure
Network – data can be accessed by one of
several paths because any data element or record can be related to any number of other data elements
RelationalDatabase Structure- All data
elements within the database are viewed as being stored in the form of simple tables Multidimensional Database Structure- Variation of the relational model that uses multidimensional structures to organize data and express the relationships between data Object-Oriented Database Structure- Can accommodate more complex data types including graphics, pictures, voice and text Data security refers to the process of protecting data from unauthorized access and data corruption throughout its lifecycle Organizations around the globe are investing heavily in information technology (IT) cyber security capabilities to protect their critical assets. Whether an enterprise needs to protect a brand, intellectual capital, and customer information or provide controls for critical infrastructure, the means for incident detection and response to protecting organizational interests have three common elements: people, processes, and technology. Cloud data security – Protection platform that allows you to move to the cloud securely while protecting data in cloud applications. Data encryption – Data-centric and tokenization security solutions that protect data across enterprise, cloud, mobile and big data environments. Hardware security module -- Hardware security module that guards financial data and meets industry security and compliance requirements. Key management -- Solution that protects data and enables industry regulation compliance. Enterprise Data Protection – Solution that provides an end-to-end data-centric approach to enterprise data protection. Mobile App Security- Protecting sensitive data in native mobile apps while safeguarding the data end-to-end. Web Browser Security- Protects sensitive data captured at the browser, from the point the customer enters cardholder or personal data, and keeps it protected through the ecosystem to the trusted host destination. eMail Security– Solution that provides end-to- end encryption for email and mobile messaging, keeping Personally Identifiable Information and Personal Health Information secure and private. Authentication Access control Backups & recovery Encryption Data Tokenization Deletions & erasure