Database recovery and security, Database Management System

Assignment Help:

Database Recovery And Security

Introduction

In this part we will introduce two main issues relating to database management systems.

A computer system suffers from dissimilar types of failures. A DBMS controls very critical data of an organisation and thus must be reliable. Though, the reliability of the database system is related to the reliability of the computer system on which it runs.  In this part we will talk about recovery of the data having in a database system following failure of several types and present the dissimilar approaches to database recovery.  The types of failures that the computer system is likely to be subjected to contain failures of components or subsystems, power outages, software failures, accidents, unforeseen situations and natural or man-made disasters.  Database recovery methods are techniques of making the database consistent till the last possible consistent state. The aim of recovery scheme is to permit database operations to be resumed after a failure with minimum loss of information at an economically justifiable cost.

The second important issue that is being discussed in this unit is Database security. "Database security" is protection of the information included in the database against unauthorised access, destruction or modification. The first condition for security is to have Database integrity. "Database integrity" is the mechanism that is applied to ensure that the data in the database is consistent.


Related Discussions:- Database recovery and security

Data models, why older data models are being replaced by new data models....

why older data models are being replaced by new data models.

Explain what is aggregation, Explain what is Aggregation ? Aggregation...

Explain what is Aggregation ? Aggregation: This is used whenever we intend to show a relationship between an entity and the relationship. There is no provision for this in th

Explain alternate key, Explain Alternate key? Alternate Key - All the...

Explain Alternate key? Alternate Key - All the candidate keys except primary key are known as alternate keys.

Explain the togaf framework for enterprise architectures, Question: (a)...

Question: (a) With the help of a diagram, explain the TOGAF framework for enterprise architectures. (b) Where would you position enterprise architectures in an enterpri

Define sequence, Define Sequence A sequence is a set of integers 1, 2, ...

Define Sequence A sequence is a set of integers 1, 2, 3 that are generated in order on demand. Sequences are regularly used in databases because lots of applications require ev

What are domain constraints, What are domain constraints?  A  domain is...

What are domain constraints?  A  domain is  a  set  of  values  that  might  be  assigned to an attribute  .all  values that appear in a  column of a relation must be taken fro

Normalization, Process of normalization is the integral part of designing a...

Process of normalization is the integral part of designing a database. Justify this statement with suitable database design

What is a hash index, What is a hash index? A hash index organizes the ...

What is a hash index? A hash index organizes the search keys, with their associated pointers, into a hash file structure.

What is cross product, What is Cross Product? Simply Cross product is B...

What is Cross Product? Simply Cross product is Binary Operator

What are the different approaches for database design, What are the differe...

What are the different approaches for database design? There are two basic approaches for database design which are as follows: Attribute driven: It compiles a list of att

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd