中国高校课件下载中心 》 教学资源 》 大学文库

河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第05章 数据库 Databases

文档信息
资源类别:文库
文档格式:PDF
文档页数:19
文件大小:427.22KB
团购合买:点击进入团购
内容简介
• Basic database terminology and concepts • Security requirements for databases • Implementing access controls in databases • Protecting sensitive data • Data mining and big data
刷新页面文档预览

SECURITY IN COMPUTING FIETH EDITION Chapter 5: Databases 授课教师:高海波 可南中医药大学 信息管理与信息系统教研室 From Security in Computing, Fifth Edition, by Charles P Pfleeger, et al. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved

SECURITY IN COMPUTING, FIFTH EDITION Chapter 5: Databases From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved. 1 授课教师:高海波 河南中医药大学 信息管理与信息系统教研室

2 Objectives for Chapter 7 Basic database terminology and concepts Security requirements for databases Implementing access controls in databases Protecting sensitive data Data mining and big data From Security in Computing, Fifth Edition, by Charles P Pfleeger, et al. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved

Objectives for Chapter 7 • Basic database terminology and concepts • Security requirements for databases • Implementing access controls in databases • Protecting sensitive data • Data mining and big data 2 From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved

3 Database Terms Database administrator Database management system(DBMS) Record Field/element Schema Subschema Attribute Relation From Security in Computing, Fifth Edition, by Charles P Pfleeger, et al. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved

Database Terms • Database administrator • Database management system (DBMS) • Record • Field/element • Schema • Subschema • Attribute • Relation 3 From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved

Database EXample ADAMS 212 Markct St Columbus OH 43210 BENCHLY 501 Union St Chicago IL 60603 CARTER 411 Elm st Colum bus OH 43210 ADAMS Charles ADAMS Edward BENCHLY Ckc 43210 CMH CARTER Marlene 60603 ORD CARTER Beth CARTER B CARTER Lisabeth CARTER Mary From Security in Computing, Fifth Edition, by Charles P Pfleeger, et al. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved

Database Example 4 From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved

5 Schema Example Name First Address City State Zip Airp。rt ADAMs Charles 212 Market St. ColumbusOH 43210 CMH ADAMS Edward 212 Market St. ColumbusOH43210CMH BENCHLY Zeke 501 Union St. Chicago IL 60603ORD CARTER Marlene 411 Elm St Columbus OH 43210CMH CARTER Beth 411 Elm st Columbus OH 43210CMH CARTER Ben 411 Elm St Columbus 43210 CMH CARTER Lisabeth 411 Elm St Columbus OH 43210CMH CARTER Mary 411 Elm St Columbus OH 43210 CMH From Security in Computing, Fifth Edition, by Charles P Pfleeger, et al. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved

Schema Example 5 From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved

6 Queries A query is a command that tells the database to retrieve, modify, add, or delete a field or record The most common database query language is sQl From Security in Computing, Fifth Edition, by Charles P Pfleeger, et al. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved

Queries •A query is a command that tells the database to retrieve, modify, add, or delete a field or record •The most common database query language is SQL 6 From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved

7 Example SQL Query SELECT Z工P=V43210 Name First Address City State Zip Airport ADAMS Charles 212 Market St. ColumbusOH43210 CMH ADAMs Edward 212 Market St. Columbus OH 43210CMH CARTER Marlene 411 Elm St Columbus OH 43210 CMH CARTER Beth 411 Elm St Columbus OH 43210 CMH CARTER Ben 411 Elm st Columbus OH 43210CMH CARTER Lisabeth 411 Elm St Columbus OH 43210CMH CARTER Mary 411 Elm st Columbus OH 43210CMH From Security in Computing, Fifth Edition, by Charles P Pfleeger, et al. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved

Example SQL Query • SELECT ZIP=‘43210’ 7 From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved

8 Database Security Requirements Physical integrity Logical integrity Element integrity Auditability Access control User authentication Availability From Security in Computing, Fifth Edition, by Charles P Pfleeger, et al. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved

Database Security Requirements • Physical integrity • Logical integrity • Element integrity • Auditability • Access control • User authentication • Availability 8 From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved

9 Reliability and Integrity Reliability: in the context of databases, reliability is the ability to run for long periods without failing Database integrity: concern that the database as a whole is protected against damage Element integrity concern that the value of a specific data element is written or changed only by authorized users Element accuracy: concern that only correct values are written into the elements of a database From Security in Computing, Fifth Edition, by Charles P Pfleeger, et al. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved

Reliability and Integrity • Reliability: in the context of databases, reliability is the ability to run for long periods without failing • Database integrity: concern that the database as a whole is protected against damage • Element integrity: concern that the value of a specific data element is written or changed only by authorized users • Element accuracy: concern that only correct values are written into the elements of a database 9 From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved

TWO-Phase Update Phase 1: Intent DBMS does everything it can, other than making changes to the database, to prepare for the update Collects records, opens files, locks out users, makes calculations DBMS commits by writing a commit flag to the database Phase 2: Write DBMS completes all write operations DBMS removes the commit flag If the dBms fails during either phase 1 or phase 2, it can be restarted and repeat that phase without causing harm From Security in Computing, Fifth Edition, by Charles P Pfleeger, et al. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved

Two-Phase Update • Phase 1: Intent • DBMS does everything it can, other than making changes to the database, to prepare for the update • Collects records, opens files, locks out users, makes calculations • DBMS commits by writing a commit flag to the database • Phase 2: Write • DBMS completes all write operations • DBMS removes the commit flag • If the DBMS fails during either phase 1 or phase 2, it can be restarted and repeat that phase without causing harm 10 From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved

共19页,试读已结束,阅读完整版请下载
刷新页面下载完整文档
VIP每日下载上限内不扣除下载券和下载次数;
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
相关文档