Professional Documents
Culture Documents
Security violations and attacks are increasing globally at an annual average rate of 20%.
SECURITY
Database security: degree to which data is fully protected from tampering or unauthorized acts
INFORMATION SYSTEM
◦ Data
◦ Procedures
◦ Hardware
◦ Software
◦ Network
◦ People
DBMS functionalities:
◦ Organize data
◦ Store and retrieve data efficiently
◦ Manipulate data (update and delete)
◦ Enforce referential integrity and consistency
◦ Enforce and implement data security policies and procedures
◦ Back up, recover, and restore data
INFORMATION SECURITY
o It is accurate
o It has not been tampered with
Two security violations:
◦ Confidential data is disclosed inappropriately
◦ An application to modify data was access inappropriately.
AVAILABILITY
Systems must be always available to authorized users
Systems determines what a user can do with the information
INFORMATION SECURITY ARCHITECTURE
MENACES TO DATABASES
A function is a database object in SQL Server. Basically, it is also a set of SQL statements that
accept only input parameters and produce output in a single value form or tabular form.
SQL functions are categorized into the following two categories:
1. Aggregate Functions
2. Scalar Functions
The Aggregate Functions in SQL perform calculations on a group of values and then return a
single value. Following are a few of the most commonly used Aggregate Functions:
The Scalar Functions in SQL are used to return a single value from the given input value.
Following are a few of the most commonly used Aggregate Functions:
A trigger is a set of actions that are run automatically when a specified change operation (SQL
INSERT, UPDATE, or DELETE statement) is performed on a specified table.
Database Administration
Database administration refers to the whole set of activities performed by a database
administrator to ensure that a database is always available as needed.
Access Privileges
Users should access the database only in ways in which they are entitled
Security
o Access restrictions ensure that the database is secure.
o Passwords, encryption, and views implement security.
o Effective password protection is critical
Planning for Disaster
o Databases can be harmed from hardware and software malfunctions, and outside forces
like floods and power outages.
Archives
o An archive is a place where corporate data is kept.
Training
o DBA gives training on the DBMS and how to access the database
DBMS Support
o The DBA is charged with all aspects of a DBMS, including selection and management
Database Design
o DBA is responsible for tuning the design and making changes that improve system
performance
DBA Responsibilities:
o Database Security
o Database Tuning
o Backup and Recovery
o Producing Reports from Queries
Types of DBA
o Development
o DBA
o Administrative DBA
o Data Warehouse DBA
o Data Architect
Administrative DBA
Works on building SQL queries, stored procedures, and so on, that meet the business needs.
Data Architect
This is a relatively newer role, responsible for merging data from multiple sources into a data
warehouse.
INTRODUCTION TO MYSQLDUMP TOOL
The mysqldump tool allows you to make a backup of one or more databases by generating a text
file that contains SQL statements which can re-create the databases from scratch.
The mysql tool is located in the root/bin directory of the MySQL installation directory.
Common Mysqldump options:
Add-drop-table
Add-locks
all-databases
Create-options
Databases
disable-keys
extended-insert
Flush-logs
Lock-tables
No-data
Opt
Quick
result-file
set-charset
Tables
Where