CS 3630 Database Design and Implementation

Slides:



Advertisements
Similar presentations
Introduction to Databases
Advertisements

Database Administration and Security Transparencies 1.
Introduction to Databases
Introduction to Databases Transparencies
Chapter 1 INTRODUCTION TO DATABASE.
Chapter 8 Security Transparencies © Pearson Education Limited 1995, 2005.
INTRODUCTION TO DATABASES
Chapter 1 Introduction to Databases
Introduction to Databases
Introduction to Database Systems 1.  Assignments – 3 – 9%  Marked Lab – 5 – 10% + 2% (Bonus)  Marked Quiz – 3 – 6%  Mid term exams – 2 – (30%) 15%
Introduction to Database
CS1430: Programming in C++ Section 2 Instructor: Qi Yang 213 Ullrich
© Pearson Education Limited, Chapter 5 Database Administration and Security Transparencies.
ISOM MIS3150 Data and Info Mgmt Database Security Arijit Sengupta.
DBMS By Narinder Singh Computer Sc. Deptt. Topics What is DBMS What is DBMS File System Approach: its limitations File System Approach: its limitations.
Sistem Basis Data (DATABASE) Siauw Yohanes Darmawan
Chapter 1 Introduction to Databases Pearson Education ©
Database Architecture Introduction to Databases. The Nature of Data Un-structured Semi-structured Structured.
CS461: Principles and Internals of Database Systems Instructor: Ying Cai Department of Computer Science Iowa State University Office:
CS 3630 Database Design and Implementation Dr. Qi Yang 213 Ullrich My Home Page: The Class Page:
1 Chapter 1 Introduction to Databases Transparencies Last Updated: Pebruari 2010 By M. Arief Updated by RSO Feb 2011
Chapter 1 Introduction to Databases © Pearson Education Limited 1995, 2005.
Module 1: Database System
Introduction to Database AIT632 Chapter 1 Sungchul Hong.
MSIS 635 DATABASE MANAGEMNT Database Systems Thomas Connolly and Carolyn Begg Third Edition – 2002 – ©Addison Wesley.
1 Chapter 1 Introduction to Databases Transparencies.
1 CS1430: Programming in C++ Section 2 Instructor: Qi Yang 213 Ullrich
1 TOPIC 6 DATABASE 6.1 Introduction to Database 6.2 Basic Concept of Database 6.3 Database Object DATABASE.
Introduction to Databases Transparencies © Pearson Education Limited 1995, 2005.
Introduction to Databases Dr. Osama AL Rababah. Objectives In this capture you will learn: Some common uses of database systems. The characteristics of.
Control of data redundancy Data consistency More information from the same amount of data Sharing of data Improved data integrity Improved security Enforcement.
What is Database Administration ?
Introduction to Databases Transparencies
Introduction to Databases
Introduction to Databases
Introduction to Databases Transparencies
Introduction to Databases
Normalized bubble chart for Data in the Instructor’s View
Database Management.
Client/Server Databases and the Oracle 10g Relational Database
By Oscar Suciadi CS 157B Prof. Sin-Min Lee
Database Management System
Introduction to Databases
Introduction to Databases Transparencies
Introduction to Databases
Course Information Mark Stanovich Principles of Operating Systems
Introduction to Databases Connolly and Begg
Introduction to Databases
Managing Multi-user Databases
By Oscar Suciadi CS 157B Prof. Sin-Min Lee
Database Management Systems
LM 8 Data Administration & Database Administration
What is a Database and Why Use One?
Data Base System Lecture 2: Introduction to Database
Andy Wang Operating Systems COP 4610 / CGS 5765
Introduction to Databases
Introduction to Databases Transparencies
Andy Wang Operating Systems COP 4610 / CGS 5765
Database Security &Threats
DATABASE SECURITY For CSCL (BIM).
By Oscar Suciadi CS 157B Prof. Sin-Min Lee
Database Administration
Introduction to Databases
Introduction to Databases
Implementation of security elements in database
Introduction to Databases Transparencies
Lecture 1: Overview of CSCI 485 Notes: I presented parts of this lecture as a keynote at Educator’s Symposium of OOPSLA Shahram Ghandeharizadeh Director.
Lecture 1: Overview of CSCI 485 Notes: I presented parts of this lecture as a keynote at Educator’s Symposium of OOPSLA Shahram Ghandeharizadeh Associate.
MIS 385/MBA 664 Systems Implementation with DBMS/ Database Management
CHAPTER 5 THE DATA RESOURCE
Presentation transcript:

CS 3630 Database Design and Implementation Dr. Qi Yang 213 Ullrich My Home Page: http://people.uwplatt.edu/~yangq/ The Class Page: http://people.uwplatt.edu/~yangq/CS363/

CS 3630 Database Design and Implementation Prerequisites: CS 2430 and MATH1630 or MATH 2730 Oracle Programming Not a programming course Basic theory and concepts Required for CS and SE

Course Work Assignments 100 Quizzes 100 Tests 120 Project 80 Final 100 Total 500

Grading Grade Total Points Percentage Grade Points A 460 - 500 92% 4.0 B + 435 - 444 87% 3.3 B 410 - 434 82% 3.0 B - 395 - 409 79% 2.7 C + 385 - 394 77% 2.3 C 360 - 384 72% 2.0 C - 345 - 359 69% 1.7 D + 335 - 344 67% 1.3 D 300 - 334 60% 1.0 F Below 300 0.0

Final Exam Group #10 Thursday, May 18 7:00 – 8:50 PM

Notes Attend class Check UWP email Academic misconduct Class pace could be too slow or too fast to you Check UWP email Academic misconduct The right to miss class for religious observances Disability

Let me know when you have any issues! Any Questions? Let me know when you have any issues!

What is a computer? Network CPU Output Input MEMORY Storage

File Systems Files Users Programs

Issues in File Systems Information is stored in separate files Program-Data Dependence Physical structure is defined in application code Separation and Isolation of Data Information is stored in separate files Duplication of Data and Data Inconsistency The same data may be stored in different departments Incompatible File Formats Files from C++ and COBOL may be different

Issues in File Systems Fixed Queries New queries requires new/modified programs Access Control and Security Who can and cannot access files, fields… Access different portions of a file Recovery …

Database Systems DBMS: Database Management system D B M Files S Users Programs

Advantages of Database Data Independence Physical structure is unknown to application code Data Relationship Primary key and Foreign key Limited Duplication of Data and Data Consistency Query Processing Access Control Security Recovery

Disadvantages of Database Complexity Cost Performance Higher Impact of Failure

Database: Underlying Framework of CIS Most IS are based on databases Fundamentally changed the way many organizations operate Business without database?

Database: One Important Development in Software Engineering Query Processing Access Control Transactions Distributed computing Networking …

Roles in Database Environment (People) DA (Data Administrator) DBA (Database Administrator) Database Designers Application Developers End-Users

Database Management Systems First generation Hierarchical Network Second generation Relational Third generation OODB GIS Fuzzy DB … Post-Relational Google’s BigTable Amazon's Dynamo

Database Security The mechanisms to protect the database against unauthorized access, either intentional or accidental.

Threats to Database Systems Any event or situation , whether intentional or accidental, that may adversely affect a database system and consequently the organization.

Threats to Database Systems Using another person’s means of access Inadequate policies and procedures that allow a mix of confidential and normal output Giving greater access than normal Inadequate staff training Viewing or disclosing unauthorized data Fire (electrical fault, lighting strike, arson) . . .

Database Security: Related Issues Theft and fraud Loss of confidentiality Loss of privacy Loss of integrity Loss of availability Confidentiality: data critical to organization; loss of competitiveness Privacy: data about individuals; legal actions against organizations

Database Security DA DBA

Highest Academic Award in Computer Science? Turing Award Nobel Prize of Computing http://en.wikipedia.org/wiki/Turing_Award 1981: Dr. E.F. Codd Relational Database Model

What is a computer? Turing Machine Network CPU Output Input MEMORY Storage

Chapter 1