Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Merits and demerits of database management system
Database management system in terms of its purpose and use
Database management system in terms of its purpose and use
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Merits and demerits of database management system
2014
Laksmana College
Ak Mohd Noralimin Bin Pg Hj Rakit
[DATABASE DESIGN]
TASK 1
Introduction
A database is a collection of data which is organized and easy for users to find data. Database can record massive amount of data, it can be use for business and organization’s purpose. Every organization should have database security to secure the information of the organization.
Database Security
Database security is to prevent unauthorized users to access the company's database. This will increase the difficulty to access through it, for example security software features are:-
• Authorization rules o This authorization rules is to monitor every deal in the database. It is also part of the database management system. Data access is restricted for authorized users only.
• Encryption o Encryption means data that is encoded into a code, this is mainly effective for data security. In other words, not any user can access through the database but only authorized users with password may access through the database.
• Authentication o Authentication is a mechanism which can verify ...
What is encryption? Encryption is a technological technique that protects and secures the transfer of plain text information between two sources through the use of the internet. This is done by rearranging the text using a mathematical algorithm that renovates the message into an indecipherable form, which can only be unlocked and translated with a use of a key. The strength of the encryption key is measured by its length, which is determined by the number of bits and by the type of encryption program.
Encryption is a strategy for changing data on a computer in a manner that it gets to be distinctly incomprehensible regardless of the possibility that somebody can access a PC with individual information on it.
This prevents unauthorized access, modification, or disclosure of system data. The chance of fraud, or embellishment is reduced by limiting access to non-conflicting job duties, e.g. individuals who set up approved vendors cannot initiate purchasing transactions, and individuals who have access to claims processing should not be able to set up or amend a policy
There are many terms which have been introduced by the field of encryption. Each of these terms are need to understand this discussion. Plaintext is the original document to be transmitted or stored on a computer system. Ciphertext is the encrypted document. ...
Confidentiality: It is about protecting the information from accessing to unauthorized parties. The key component of protecting the information would be encryption. The encryption ensures that only the authorized people can access the information. The encryption is widespread in today’s world and can be found in almost every protocol in use. Good example will be SSL/TLS, security protocol for communications over the internet that has been used in conjunction
Implement physical security: - “Physical security protects people, data, equipment, systems, facilities and company assets” (Harris,
How important or confidential is your data? Do you have network connections with trading partners that have even more sensitive data? Implement security measures in accordance with your needs. Stick with the standards of the company. Standards not only ensure others have tested the waters, but protect your investment for future changes and expansion.
Data encryption refers to the process of transforming electronic information into a scrambled form that can only be read by someone who knows how to translate the code. In nowadays business world, it’s the easiest and most practical way to secure the information that we stored and processed, and it’s significant for our sensitive information. For example, as electronic commerce is popular now, the vendors and retailers must protect the customers’ personal information from hackers or competitors. They also have many business files or contracts that need to be strictly protected. Without data encryption, these important information may fall into wrong hands and be misused by others. Besides, data encryption may be used to secure sensitive information that exists on company networks, or create digital signatures, and help to authorize in business. No one should underestimate the importance of encryption. A little mistake in encryption may make sensitive information revealing, or even result in illegal and criminal accuse.
Inconsistently storing organization data creates a lot of issues, a poor database design can cause security, integrity and normalization related issues. Majority of these issues are due to redundancy and weak data integrity and irregular storage, it is an ongoing challenge for every organization and it is important for organization and DBA to build logical, conceptual and efficient design for database. In today’s complex database systems Normalization, Data Integrity and security plays a key role. Normalization as design approach helps to minimize data redundancy and optimizes data structure by systematically and properly placing data in to appropriate groupings, a successful normalize designed follows “First Normalization Flow”, “Second Normalization Flow” and “Third Normalization flow”. Data integrity helps to increase accuracy and consistency of data over its entire life cycle, it also help keep track of database objects and ensure that each object is created, formatted and maintained properly. It is critical aspect of database design which involves “Database Structure Integrity” and “Semantic data Integrity”. Database Security is another high priority and critical issue for every organization, data breaches continue to dominate business and IT, building a secure system is as much important like Normalization and Data Integrity. Secure system helps to protect data from unauthorized users, data masking and data encryption are preferred technology used by DBA to protect data.
Despite the numerous advantages offered by cloud computing, security is a big issue concerned with cloud computing. There are various security issues and concerns associated with cloud computing, among them being phishing, data loss and data privacy. There are different mitigation measures that cloud pioneers are currently using to ensure data stored in the cloud remain secure and confidential as intended. Encryption is one mitigation method used to ensure security in cloud computing. According to Krutz and Vines (2010), encryption involves coding of the data stored in the computing cloud such that hackers cannot gain access to the data. Data encryption seems to be the most effective method of ensuring security in computing (Krutz and Vines, 2010). However, it is of paramount importance to note that encrypted data is usually difficult to search or perform various calculations on it.
Data encryption refers to the transformation of data into a structure that makes it unreadable by anyone without a secret decryption key. It ensures that messages can be read only by the planned recipient. Encryption is the procedure of obscuring information to create it unreadable without special information. Only organizations and individuals with an abnormal need for secrecy have actually made good use of it. Nowadays, encryption is one of the most important technologies for maintaining your privacy and the security of important information. This helps out greatly especially when E-Commerce is being used.
A database is a structured collection of data. Data refers to the characteristics of people, things, and events. Oracle stores each data item in its own field. For example, a person's first name, date of birth, and their postal code are each stored in separate fields. The name of a field usually reflects...
In the past, most of the databases were centralized, protected, and kept in a one location using a complicated database system known as centralized database. Nowadays, with the new technology of personal computers and cell phones, a new sort of database has appeared, and it seems that majority of people are pleasant with it, even if their private data is split everywhere. Many enterprises had changed their databases from the centralized databases, into the distributed database system, since it meets the demand of accessing and processing the data in the organization. Distributed database technology is considered as one of the most remarkable developments in this century (Ozsu, 1991; Rahimi & Haug, 2010; Cain, 2012). Distributed databases are basically a collection of databases that are divided on multiple computers which are connected logically but located in different physical locations, and each site manages its own local data. In contrast, centralized database is a database that is located in a one location and it is considered as a big single database (Connolly & Begg, 2010).
The length of the key for the encryption can vary from being very short to extremely long, and the length of the message being encrypted. The protection of data being transferred between ATMs and the bank, and the use of cell phones, is the most common everyday encounter with encryption. To encrypt and decrypt information, a cipher is used. In a cipher, there is a set of well-defined steps that can be followed to encrypt and decrypt messages.
conference using a PowerPoint file. The database management system allows a company to run more efficient, smoothly, and be more productive. Database management systems also allow a business to be more secure. The database administrator can create the user permissions, which allows each employee access to different things. This is usually done by assigning different usernames and passwords. It can prevent employees from viewing certain documents that are meant only for cooperate, or preventing them from accidentally deleting