{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

Object oriented databases do not support queries

Info iconThis preview shows pages 5–6. Sign up to view the full content.

View Full Document Right Arrow Icon
Object oriented databases do not support queries Relational Database n Data structures called tables (relations) n Integrity Rules on allowable values n Operators on the data in tables Persistency – preservation of integrity through the use of nonvolatile storage media Schema n Description of the database n Defined by Data Description Layer (DDL) Database Management System (DBMS) n provides access to the database n Allows restriction of access Relational Database n Relation (table) is the basis of a relational database – relation is represented by a table n Rows = Records (tuples) n Column = Attributes Attribute-1 Attribute-2 Attribute-3 Record-1 Record-2 Primary Key n Unambiguously identifies a record. Points to a record (tuple) n Every row (record, tuple) must contain the primary key of the relation (table) Cardinality - # of rows in a relationship (table) Degree - # of columns in a relationship (table) Candidate key - any identifier that is a unique to the record Foreign Key – any value that matches the primary key of another relation (table) Relational Database – best suited for text Relational Database Operations n Select – based on criteria i.e. all items with value > $300.00 n Join - join tables based on a common value n Union – forms a new relation (table) from two other relations n View – (virtual table) uses join, project, select - Views can be used to restrict access (least privileges) n Query plan n Comprised of implementation procedures, lowest cost plan based on “cost” n Costs are CPU time, Disk Access n Bind – used to create plan
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Data Normalization Ensures that attributes in a table rely only on the primary key n Eliminates repeating groups n Eliminates redundant data n Eliminates attributes not dependent on the primary key SQL – Structured Query Language n Select n Update n Delete n Insert n Grant – Access Privileges n Revoke – Access Privileges Object Oriented Databases - OODB n Best suited for multi-media, graphics n Steep learning curve n High overhead Intrusion Detection Network Based n Real Time n Passive Host Based n System and event logs n Limited by log capabilities Signature Based – (Knowledge Based) n Signatures of an attack are stored and referenced n Failure to recognize slow attacks n Must have signature stored to identify Statistical Anomaly Based (Behavior Based) n IDS determines “normal” usage profile using statistical samples n Detects anomaly from the normal profile Access Control Issues n Confidentiality n Integrity n Availability n Accountability of users Measures for compensating for both internal and external access violations n Backups n RAID – Redundant Array of Inexpensive Disks n Fault Tolerance n Business Continuity Planning n Insurance
Background image of page 6
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}