0% found this document useful (0 votes)
33 views

Data Protection: Presented by Deepali Upadhyay Dipika Ghosh Priya Verma Priyanka Agarwal Sheeuli Chakraborty

This document discusses data protection and database security. It outlines several threats like human error, software/hardware failures, theft and fraud. Improper data access can lead to loss of privacy, confidentiality and data integrity. Database management software uses features like access control, encryption, authentication, backup facilities and checkpoint facilities to secure data. Concurrency control techniques like locking mechanisms at different levels are used to control simultaneous access to databases and maintain data integrity.

Uploaded by

2dipikaghosh
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views

Data Protection: Presented by Deepali Upadhyay Dipika Ghosh Priya Verma Priyanka Agarwal Sheeuli Chakraborty

This document discusses data protection and database security. It outlines several threats like human error, software/hardware failures, theft and fraud. Improper data access can lead to loss of privacy, confidentiality and data integrity. Database management software uses features like access control, encryption, authentication, backup facilities and checkpoint facilities to secure data. Concurrency control techniques like locking mechanisms at different levels are used to control simultaneous access to databases and maintain data integrity.

Uploaded by

2dipikaghosh
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 15

DATA PROTECTION

Presented By

Deepali Upadhyay
Dipika Ghosh
Priya Verma
Priyanka Agarwal
Sheeuli Chakraborty
DATABASE SECURITY
Database security is the system, processes, and
procedures that protect a database from unintended
activity.

Database security can begin with the process of


creation and publishing of appropriate security
standards for the database environment.
NEED FOR DATA PROTECTION
 Accidental losses attributable to:

1. Human error
2. Software failure
3. Hardware failure

 Theft and fraud


CONTD…
• Improper data access:

1.Loss of privacy
2.Loss of confidentiality
3.Loss of data integrity
DATA MANAGEMENT SOFTWARE
SECURITY
(FEATURES)

Access Control
Encryption
Authentication Schemes
Backup Facilities
Check Point Facilities
ACCESS CONTROL

Access control is a system which enables an


authority to control access to areas and resources in a
given computer-based information system.
ENCRYPTION

Encryption is the process of transforming


information referred to as plaintext) using an
algorithm (called cipher) to make it unreadable to
anyone except those possessing special knowledge,
usually referred to as a key. The result of the
process is encrypted information (in
cryptography, referred to as cipher text).
AUTHENTICATION SCHEMES
Task of verifying the identity of a person or software
connecting to an application
Example:
• Two Factor Authentication
• Biometrics
BACK UP FACILITIES

Making copies of data so that these additional copies


may be used to restore the original after a data loss
event.

Cold Back up
Hot Back up
CHECK POINT FACILITIES

Enables the intermediate state of a process to be saved


to a file preventing the loss of data generated by long-
running processes due to program or system failures.
RECOVERY AND RESTART
PROCEDURES
• Switch - Mirrored databases

• Restore/Rerun – Rebuild a damage or corrupted


transactions against the backup

• Transaction Integrity - Commit or abort all


transaction changes
CONTROLLING CONCURRENT ACCESS

The process of managing simultaneous operations


against a database so that Data integrity is maintained
and the Operations do not interface with each other in
a multiuser environment.
CONCURRENCY CONTROL TECHNIQUES

Locking Mechanism:

Any data that is retrieved by the user for updating


must be locked or denied by the other users until the
update is completed or aborted.
LOCKING MECHANISM

Locking Levels:

1.Database
2.Table
3.Page
4.Record level
5.Field level
LOCKING MECHANISM

Types of Locks
1.Shared locks -When a statement reads data without making any
modifications, its transaction obtains a shared lock on the data.
Another transaction that tries to read the same data is permitted
to read, but a transaction that tries to update the data will be
prevented from doing so until the shared lock is released.
2.Exclusive locks are used for the data modification operations,
such as UPDATE, INSERT, or DELETE
3.Deadlocks-Deadlock occurs when two users have locks on
separate objects and each user wants a lock on the other's
object.

You might also like