CS 3630 Database Design and Implementation Dr. Qi Yang 213 Ullrich My Home Page: http://people.uwplatt.edu/~yangq/ The Class Page: http://people.uwplatt.edu/~yangq/CS363/
CS 3630 Database Design and Implementation Prerequisites: CS 2430 and MATH1630 or MATH 2730 Oracle Programming Not a programming course Basic theory and concepts Required for CS and SE
Course Work Assignments 100 Quizzes 100 Tests 120 Project 80 Final 100 Total 500
Grading Grade Total Points Percentage Grade Points A 460 - 500 92% 4.0 B + 435 - 444 87% 3.3 B 410 - 434 82% 3.0 B - 395 - 409 79% 2.7 C + 385 - 394 77% 2.3 C 360 - 384 72% 2.0 C - 345 - 359 69% 1.7 D + 335 - 344 67% 1.3 D 300 - 334 60% 1.0 F Below 300 0.0
Final Exam Group #10 Thursday, May 18 7:00 – 8:50 PM
Notes Attend class Check UWP email Academic misconduct Class pace could be too slow or too fast to you Check UWP email Academic misconduct The right to miss class for religious observances Disability
Let me know when you have any issues! Any Questions? Let me know when you have any issues!
What is a computer? Network CPU Output Input MEMORY Storage
File Systems Files Users Programs
Issues in File Systems Information is stored in separate files Program-Data Dependence Physical structure is defined in application code Separation and Isolation of Data Information is stored in separate files Duplication of Data and Data Inconsistency The same data may be stored in different departments Incompatible File Formats Files from C++ and COBOL may be different
Issues in File Systems Fixed Queries New queries requires new/modified programs Access Control and Security Who can and cannot access files, fields… Access different portions of a file Recovery …
Database Systems DBMS: Database Management system D B M Files S Users Programs
Advantages of Database Data Independence Physical structure is unknown to application code Data Relationship Primary key and Foreign key Limited Duplication of Data and Data Consistency Query Processing Access Control Security Recovery
Disadvantages of Database Complexity Cost Performance Higher Impact of Failure
Database: Underlying Framework of CIS Most IS are based on databases Fundamentally changed the way many organizations operate Business without database?
Database: One Important Development in Software Engineering Query Processing Access Control Transactions Distributed computing Networking …
Roles in Database Environment (People) DA (Data Administrator) DBA (Database Administrator) Database Designers Application Developers End-Users
Database Management Systems First generation Hierarchical Network Second generation Relational Third generation OODB GIS Fuzzy DB … Post-Relational Google’s BigTable Amazon's Dynamo
Database Security The mechanisms to protect the database against unauthorized access, either intentional or accidental.
Threats to Database Systems Any event or situation , whether intentional or accidental, that may adversely affect a database system and consequently the organization.
Threats to Database Systems Using another person’s means of access Inadequate policies and procedures that allow a mix of confidential and normal output Giving greater access than normal Inadequate staff training Viewing or disclosing unauthorized data Fire (electrical fault, lighting strike, arson) . . .
Database Security: Related Issues Theft and fraud Loss of confidentiality Loss of privacy Loss of integrity Loss of availability Confidentiality: data critical to organization; loss of competitiveness Privacy: data about individuals; legal actions against organizations
Database Security DA DBA
Highest Academic Award in Computer Science? Turing Award Nobel Prize of Computing http://en.wikipedia.org/wiki/Turing_Award 1981: Dr. E.F. Codd Relational Database Model
What is a computer? Turing Machine Network CPU Output Input MEMORY Storage
Chapter 1