You are on page 1of 22

SSC, Rail and Other Central

Government Exams
Teacher Name:- Partha Sarathi Chatterjee
Table of Content

• DBMS & RDBMS Concepts


• Computer Virus
What is a Database

A Database is a collection of related data organized in a


way that data can be easily accessed, managed and
updated. Any piece of information can be a data, for
example name of your school. Actually Database is a
computerized record keeping system or software.
DBMS

•A DBMS is a software that allows creation, definition and


manipulation of database.

•DBMS is actually a tool used to perform any kind of operation on


data in database.

•DBMS also provides protection and security to database.

Users in DBMS

Users may be of various type such as DB administrator, System


developer and End users.
Database Application

Database application may be Personal, Departmental, Enterprise and


Internal.
Ex: MySQL, Oracle etc.

Advantages of Database systems


•Minimal Data Redundancy
•Data Consistency
•Data Integration
•Data Sharing
•Better Controls
•Data Independence
•Reduced Maintenance
Entity

•A real-world thing either animate or inanimate that can be easily


identifiable and distinguishable. For example, in a school
database, student, teacher, class and course offered can be
considered as entities.

•All entities have some attributes or properties that give them


their identity.

•An entity set is a collection of similar types of entities.

•Entity set may contain entities with attribute sharing similar


values.
Attributes:
• Entities are represented by means of their properties,
called attributes.
• In general, an attribute is a characteristic. In a database
management system (DBMS), an attribute refers to a
database component, such as a table. It also may refer to a
database field. Attributes describe the instances in the
column of a database.
ER Model
Entity relationship model defines the conceptual view of
database. It works around real world entity and association
among them. At view level, ER model is considered well for
designing databases.
For example, The entity ‘Student’ has properties like Name, Address,
Roll_ no, Mobile_ no, Age, DOB, Class, Section, etc. So, when we
make an E-R diagram then Name, Address, Roll_ no, Mobile_ no,
Age, DOB, Section and Class are represented as the attributes of
the entity type ‘Student’.
Relationship

A relationship in a DBMS, is primarily the way two or


more data sets are linked. Relationships allow the
datasets to share and store the data in separate tables.
They also help link disparate data with each other.

Three types of relationship exist among entities.


These are:
•One-to-one
•One-to-many
•Many-to-many
Different types of Keys

Primary Key: Primary Key uniquely identify each record in a table. No two
records have same value in the relation. Doesn't accept null value.

Foreign Key: Foreign Key references the primary key of another table. Also
called as referential integrity constraints.

Candidate Key: It can chose as primary key in a table. More than one key
can be candidate in a same table. It is preferred to select a candidate key
which have a minimal number of attributes.

Composite Key: The Primary key compared of more than one field is known
as Composite Key. It is also called concentrated or structured key.

Unique Key: It Acts like a primary key. It can accept null also.
RDBMS
•RDBMS stands for Relational Database Management System.

•RDBMS is the basis for SQL, and for all modern database systems like MS SQL
Server, IBM DB2, Oracle, MySQL, and Microsoft Access.

•A Relational database management system (RDBMS) is a database management


system (DBMS) that is based on the relational model as introduced by E. F. Codd.
Structured Query Language: SQL is a programming language for
Relational Databases. It is designed over relational algebra and
tuple relational calculus. SQL comes as a package with all major
distributions of RDBMS.

Database Normalization: Database normalization is the process of


restructuring a relational database in accordance with a series of
so-called normal forms in order to reduce data redundancy and
eliminates undesirable characteristics like insertion, update and
deletion anomalies and improve data integrity. It was first proposed
by Edgar F. Codd as an integral part of his relational model.
Types of DBMS languages:
•Data Definition Language (DDL)
•Data Manipulation Language (DML)
•Data Control Language (DCL)
•Transaction Control Language (TCL)

Query:
•A database query is a piece of code that is sent to a database in
order to get Information back from the database.
•It is used as the way of retrieving the information from the
database.
•A database query is basically a question that you ask the
database.
Different types of Malware:
Spyware: It is a type of malware that function by
spying on user activity without their knowledge.
These spying capabilities can include activity
monitoring, collecting keystroke, data harvesting and
more.
Virus: A virus is a contagious program or code that
attached itself to another piece of software then
reproduces itself when that software is run.
Worm: Programs that replicates itself and destroy
data and files on the computer. Worms work to ‘eat’
the system operating files and data files until the
drive is empty.
Trojan: it is the most dangerous malware. Trojan are written with
the purpose of discovering your financial information, taking over
your computer system resource, and in the large systems creating
“denial- of service attack”.

Rootkit: A rootkit is a collection of computer software, typically


malicious, designed to enable access to a computer or an area of
its software that is not otherwise allowed and often masks its
existence or the existence of other software.

Backdoor: Backdoors are much the same as Trojans or worms


except that they open a “backdoor” onto a computer.

Ransomware: If you see this screen that warns you that you have
been locked out of your computer until you pay.
Adware: - The least dangerous and most lucrative malware. Adware
displays ads on your computer.

Zombie: - A zombie is a program that secretly takes over another


internet- attached computer and then uses that computer to launch
attacks.

Computer Hoax: - A computer virus hoax is a message warning the


recipients of a non-existent computer virus threat. The message is
usually a chain e-mail that tells the recipients to forward it to everyone
they know, but it can also be in the form of a pop-up window.
Types of Viruses
• Parasitic Virus
• Polymorphic Virus
• Boot-Sector Virus
• Stealth Virus
• Macro Virus

Windows Defender: Microsoft Defender Antivirus is an


anti-malware component of Microsoft Windows. It was
first released as a downloadable free anti-spyware
program for Windows XP, and was later shipped with
Windows Vista and Windows 7.
Computer security:
Computer security, also known as cyber security or IT
security, is the protection of computer systems from
the theft or damage of the Hardware, software or the
information as well as from disruption or misdirection
and harm that may come via network access, data and
code injection.
Cyber Forensics:
Computer forensics is the application of investigation
and analysis techniques to gather and preserve
evidence from a particular computing device in a way
that is suitable for presentation in a court of law.
Theft:
The crime occurs when a person’s violet copyright
and download movies, music, games and software.

Identity theft:
Cash transaction and Banking Transaction through
Internet face this type of problem. A criminal access
data about persons account such as debit card and
credit card details to siphon money or to buy things
online in the victim’s name.
Cybercrime
Any crime that involves a network and computers
is called cybercrime. When any crime committed
over the Internet is referred to as cybercrime.
There are many types of cyber crime:-
Hacking
This type of crime where in a person’s computer is
broken so that is personal or sensitive information
can be accessed. This is different from ethical
Hacking, which many organization use to check
their Internet security protection.
Phishing
It is an act of acquiring private or
sensitive information or data from
personal computers or individual details
like debit card and credit card details.
login details for using fraudulent
activities. Phishing is usually done by
sending emails that seem to appear to
come from credible sources which
require users to put in personal data
such as debit card, credit card number or
social security number.
Technological solutions for attacks:

Firewall: Firewall is a software or hardware based network security that controls


the incoming and outgoing network traffic based on the applied rule set.

Authentication: The process of identifying usually based on a user name and


password. In security system authentication is distinct from authorization, which
is the process of giving individuals access to the system based on their Identity.

Patches: It is also called the service patch, affix to a problem bug. A patch is an
actual piece of object code that is inserted into an executable file.

Hardware cryptography: This operation can be very expensive when performed


in software. This operation is performed by a hardware accelerator to improve
performance. It is the use of hardware to perform cryptographic operation is fast
as they performed in software.
Thank You
See you next day

You might also like