MGAD30H3 Chapter Notes - Chapter 4: Data Corruption, Concurrency Control, Encryption

436 views4 pages
Published on 9 Jul 2013
School
Course
Professor
Chapter 4 Security Part II Auditing
Database Systems
Overview:
Operational problems re flat-file approach to data management
3 database models
Operational features and risk with centralized, partitioned, and replicated database
models in a DDP
Data management approaches
Two models: flat-file and database model
Flat-file
o Data files that contain records with no structured relationships to other files
o Promotes single-user view approach to data management, where end users
own the data
o Issues: data redundancy, data storage, data updating, currency of
information, and task-data dependency
Storage: costs more money to store same data
Updating: instead of updating one, may need to update multiple
Currency: one user may have outdated information
Task-data dependency: people will need additional info if their needs
change
Database approach
o Resources are controlled by database management system (DBMS)
Knows which data elements each user is allowed access
Users sends request for data, DBMS validates authorization
Centralizes all information
Key elements of the database environment
Database management system
o 4 key objectives: program development, backup and recovery, database
usage reporting (audit trail), database access (granting access)
Database definition language
o Internal/physical view
Physical arrangement of records, linkage between files, structure of
data records, sequence
o Conceptual view
Database logically and abstractly
o External view
The portion that a user is authorized to access
The database administrator (DBA)
Unlock document

This preview shows page 1 of the document.
Unlock all 4 pages and 3 million more documents.

Already have an account? Log in

Document Summary

Chapter 4 security part ii auditing. Operational problems re flat-file approach to data management. Operational features and risk with centralized, partitioned, and replicated database models in a ddp. Storage: costs more money to store same data. Updating: instead of updating one, may need to update multiple. Currency: one user may have outdated information. Task-data dependency: people will need additional info if their needs. Database approach change: resources are controlled by database management system (dbms) Knows which data elements each user is allowed access. Users sends request for data, dbms validates authorization. Database management system: 4 key objectives: program development, backup and recovery, database usage reporting (audit trail), database access (granting access) Physical arrangement of records, linkage between files, structure of data records, sequence: conceptual view. Database logically and abstractly: external view. The portion that a user is authorized to access.

Get OneClass Grade+

Unlimited access to all notes and study guides.

YearlyMost Popular
75% OFF
$9.98/m
Monthly
$39.98/m
Single doc
$39.98

or

You will be charged $119.76 upfront and auto renewed at the end of each cycle. You may cancel anytime under Payment Settings. For more information, see our Terms and Privacy.
Payments are encrypted using 256-bit SSL. Powered by Stripe.