You are on page 1of 3

INTRODUCTION TO SQL It is suitable when handling large databases.

Clauses are a
part of the SQL statement.
QUERY 3. EXPRESSIONS – represent a formula typically written in a
- a request for data or information from a database table or query format. It combines one or more values, operators,
a combination table. and SQL functions that evaluate a specific value. Moreover,
- a request for information from a database management SQL expressions are broadly divided into three types,
system (DBMS), which is the software program that namely, Boolean, numeric, and date.
maintains data. 4. PREDICATES – refer to keywords that reveal a relationship
- Users can make a query to retrieve data or change between two expressions and result in a true or false
information in a database, such as adding or removing value. It is just another term for an expression that is used
data. to determine an unknown or TRUE/FALSE condition.
5. QUERIES – SQL queries refer to statements used to request
STRUCTURE QUERY LANGUAGE or retrieve data from a database. For example, let’s say you
want to retrieve the first name and customer number of all
- the standard query format used by many database customers whose last name is ‘Lobo’.
management systems (DBMS).
- Is a language used to communicate with the database. SQL COMMAND
- SQL statements are used to perform various operations or
tasks such updating or retrieving data from a database. 1. DATA DEFINITION LANGUAGE (DDL) Commands – It
- is to store, retrieve, manage and manipulate data within a defines the database schema and is used to create modify
database management system. the structure database objects in the database by creating,
altering, and dropping tables and views.
2. DATA MANIPULATION LANGUAGE (DML) commands – It
is used to perform data maintenance, such as inserting,
updating, modifying, and querying in the database.
3. DATA CONTROL LANGUAGE (DCL) COMMANDS – It is
used by the database administrator to protect the
database corruption and security by controlling the rights
and permission such as to grant or to revoke privileges for
accessing the database.

SQL SERVER MANAGEMENT STUDIO (SSMS)


SCHEMA
- A tool that presents a graphical interface for managing,
- a collection of related objects created by the user, such as configuring, monitoring, and administering instances of
tables, views, domains, constraints, and triggers among the SQL Server.
others. - The Object Explorer is the central feature of SSMS which
- It is everything you create as it relates to a particular allows users to browse, select, and manage any of the
database. objects within the server

CHARACTERISTICS OF SQL TO LAUNCH AND LEARN THE PARTS OF SSMS:

1. It can execute queries against database. 1. Click the start button.


2. It can retrieve data from the database 2. Go to all Apps
3. It can insert records in a database. 3. Look for the Microsoft SQL Server folder and the choose
4. It can update records in a database. Microsoft SLQ Server Management Studio. Then
5. It can delete records from a database. Connect to Server dialog box will appear.
6. It can create a new database.
7. It can create tables in a database. Server Type – the default instance of the SQL Server.
8. It can create stored procedures in a database. Server name – the default name or instance of the SQL
9. It can create views in a database. Server. This was added as an instance during the
10. It can set permissions on tables, procedures, and views. installation process.
Authentication – a Windows authentication to
SQL LANGUAGE ELEMENTS
establish a connection with the SQL Server.
1. KEYWORDS – refer to a set of words that allow you to
perform operations on your database. Consider the 4. Click Connect. The SQL Management Studio will appear.
example of the keyword ‘LIKE ‘; it searches for a specific
data pattern in the database. Window is divided into 2 parts:
2. CLAUSES – refer to the inbuilt functions that filter out data 1. Object Explorer – It consist of SQL objects that
and retrieve the required data from the database or table. you can alter or view. It is a three structured
view of all database objects in a server. DATA TYPES – indicate the type of data that a column can contain
Includes: SQL, Server Database Engine, and the maximum number of characters and digits that it can hold.
Analysis Services, Reporting Services, and
Integration Services. The following are the importance of designing data type fields:
2. Document Window – It consist of components 1. Fields needs data type in order to perform its functions in
or contents of SQL objects in the left side. The a correct manner.
document window can contain query editors 2. Using the wrong data type can cause large performance
and browser windows. degradation in the database and might lead to data
corruption.
3. Using the wrong data might lead to large memory
CREATING TABLES allocation, which causes slow transformation or processing
of data.
In a Relational Database:
GENERAL DATA TYPES USED IN SQL:
Table – a collection of data elements organized in terms of rows and
columns. It is the simplest form of data storage. It organizes 1. Exact Numbers
information about a single topic into rows and columns. 2. Approximate Numeric
3. Datetime and Small date time
➢ Field – refers to every single piece of data in the table 4. Character Strings
➢ Record – a row in database with the data 5. Text
➢ File – the interaction of rows, columns, fields, and records 6. Binary Strings

DATABASE SECURITY

- deals with the ways and means of protecting a database


from the illegitimate use of malicious threats attacks.
- focuses on protecting data, preventing it from being
corrupted and being accessed by an authorized user.

MALICIOUS THREATS ATTACKS – A malware attack is a common


cyberattack where malware (normally malicious software) executes
unauthorized actions on the victim's system. Malicious software
(a.k.a. virus) encompasses many specific types of attacks such as
ransomware, spyware, command and control, and more.

BASIC DATABASE SECURITY OBJECTIVE:

1. Confidentially - prevents/detects/deters improper


disclosure of information.
2. Integrity – prevents/detects/deters improper denial of
STEPS TO CREATE A TABLE: access to services
3. Availability – Prevents/detects/deters improper denial of
1. Right-click the Tables and select the Table.
access to services
2. Under the Table Designer window, type field name, field
type, and width. The database administrator should carefully plan, implement,
and maintain database security. Activities in database include:
DATA
1. Control in accessing the database
- a collection of facts such as numbers, words, measurements,
2. Monitoring database performance to ensure non-crash
observations, or just a description of things.
of data handling;
- pertains to the raw materials that you will enter in a table
3. Backup and restoration of the database;
which will turn into information whenever it is extracted from
4. Database mapping for proper determination of
the database. unknown and known risks that might hamper server
STEPS TO ENTER DATA: operation.
1. Right-click your table.
2. Select Edit Top 200 Rows. MECHANISM OF PROVIDING DATA SECURITY:
3. Encode the data. You can shift from one column to
1. Data Encryption – Is a way to translate data into a coded
another column by pressing the tab key. Encoded
form, making it readable only to those who have a passkey
data are automatically saved.
or password.
2. User Identification - It is the ability to uniquely identify a soldiers hidden inside a wooden horse that was given to the
user of a system or an application that is running in the enemy city of Troy
system.
3. Authentication - It is a mechanism that verifies a user or VIRUS MALWARE
application claiming who or what they really are. - Programs that copy themselves throughout a computer or
4. Authorization - It is a mechanism that limits access only to network. Malware viruses piggyback on existing programs and
authorized individuals or applications to protect critical can only be activated when a user opens the program. At their
resources in a system. worst, viruses can corrupt or delete data, use the user’s email
5. Auditing – It is the ability of the system to record all to spread, or erase everything on a hard disk.
activities and have a process in place to review them to
check if there is unusual activity or any attempted or WORM MALWARE
successful unauthorized activity in the system
6. Backup solutions – allows you to back up or save a copy. - Self-replicating viruses that exploit security vulnerabilities to
automatically spread themselves across computers and
networks. Unlike many viruses, malware worms do not attach
to existing programs or alter files. They typically go unnoticed
COMMON TYPES OF CYBER ATTACKS: - until replication reaches a scale that consumes significant
CYBERATTACKS – unwelcome attempts to steal, expose, alter, disable system resources or network bandwidth.
or destroy information through unauthorized access to computer
systems.

CYBERCRIMINALS – individuals or teams of people who use


technology to commit malicious activities on digital systems or
networks with the intention of stealing sensitive company
information or personal data, and generating profit.

DIFFERENCE BETWEEN HACKERS AND CYBER CRIMINALS:

➢ Hackers – computer programmers who use their skills to


breach digital systems
➢ Cybercriminals - people who use computers to commit
crimes.

COMMON CYBER ATTACKS:

MALWARE

- As software designed to interfere with a computer's normal


functioning, malware is a blanket term for viruses, trojans, and
other destructive computer programs threat actors use to
infect systems and networks in order to gain access to
sensitive information.
- is a file or code, typically delivered over a network, that
infects, explores, steals or conducts virtually any behavior an
attacker wants. And because malware comes in so many
variants, there are numerous methods to infect computer
systems.

RANSOMWARE

- a criminal business model that uses malicious software to hold


valuable files, data or information for ransom. Victims of a
ransomware attack may have their operations severely
degraded or shut down entirely

TROJANS MALWARE

- Malware disguised in what appears to be legitimate software.


Once activated, malware Trojans will conduct whatever action
they have been programmed to carry out. Unlike viruses and
worms, Trojans do not replicate or reproduce through
infection. “Trojan” alludes to the mythological story of Greek

You might also like