Advantages
Reduction of of data redundancy
Data redundancy could be defined as keeping the same piece of data in two separate places within a database or data storage technology. Traditional file-based systems stores the same information in more than one file through which space is wasted unnecessarily. But the DBMS ensure that multiple copies of the same data are not stored by integrating the files to eliminate the redundancy. Sometimes, it is necessary to duplicate key data items to model relationships. Moreover, it is desirable to duplicate some data items to improve performance. Due to above reasons DBMS does not eliminate redundancy entirely.
Maintaining data consistency
The risk of data inconsistency can be reduced by controlling data
…show more content…
In this way, more users share more of the data.
Advanced data integrity
Database integrity means the validity and consistency of stored data. Integrity usually engages with rules of consistency that the database is not allowed to violate which is known as constraints. Those constraints are applied to data items and relationships between records as well. Integration permits the Database Administrator to define, and the DBMS to impose, integrity constraints.
Upgraded security
The protection of the database from unauthorized users is the maintenance of database security. This controls come in the form of user names and passwords to identify people who have the authority to use the database. The accessibility of an authorized person can be limited by the operation types such as retrieval, insert, update, delete. For instance, the DBA has access to all the data in the database, a branch manager may have access to all data that relates to his or her branch office and a sales assistant may have right to access with related to properties but no access to sensitive data such as staff salary details.
Execution of
Each distributed DB perform some procedures to protect the data from any threats may occur through transactions. First is access control methodology which prevent unauthorized access to data. Second, inference control which prohibit users from inferring confidential data of other individuals using queries. Finally, flow control to prevent information from flowing to unauthorized persons in a way that violates organization policies.
1. Least privilege: SQL accounts will have least privilege. Each SQL account can do a unique task. Some dummy accounts with no privileges will be created. So, if the system is compromised then the database is still protected. Only 2 accounts will have full access (What Is the Principle of Least Privilege (POLP)? A Best Practice for Information Security and Compliance).
Integrity is a concept of consistency of actions, values, methods, measures, principles, expectations and outcomes.
The organization has a security objective of protecting the database from being altered. Since the data is held in the system, there are regulations that have been set to the users, and there are also limits to the functions that each user performs. In this case, there are three categories of users each with clearly defined responsibilities. For instance, the administration team has been given full control of the application in that they can even alter codes and perform any variations to the database objects. The other groups of users are the executives; these have the ability to access all the information
It is every company mandatory requirement to make sure sensitive data is protected from public access at all times. In large organization sensitive information such as employee salary and performance should be kept confidential from most of the DBA users. For this DBMS uses database security and authorization subsystems that is responsible for security to the portions of database or to restrict the access to the sensitive information.
Integrity: is to make sure that the content of the information has not been properly adjusted or tampered with.
Data Redundancy: Data redundancy is where a duplicate of information is sorted into different tables/databases. Sometimes data redundancy is done on purpose as a backup of data as a precaution just in case something happens and the data gets deleted. Data redundancy creates a new piece of data so that any modifications, addition of new data or deletion of data will be done on a new piece so that you will always have the
Integrity means that data is protected from being altered or changed while in transit or at rest. In this scenario integrity, would apply to the protection of data related to which hospital already got grants. This is very important information since this data is used to determine how much grants were given, the
According to unabridged dictionary the term integrity is derived from the Latin words integrates and integer, which means an entire, untouched state of a thing. Integrity basically involves keeping the measurements of reliability, correctness and trustworthiness of documents along its whole existence circle. These moderations basically include record authorization and user access controls. Variant control checks maybe used to preclude inaccurate replacement or accidental deletion via legal shoppers becoming an obstacle. Similarly a few method have to be in vicinity to find any changes in information that might come up due to non-human-brought about events similar to an electromagnetic pulse or server crash.
“A database is a structured collection of records or data that is stored in a computer system. In order for a database to be truly functional, it must not only store large amounts of record, but also be able to access those records fast and efficiently. In addition, new information and changes should also be easy to input.” (tech-faq.com) To be useful over a long term the database should be able to store all the records necessary for the business to function as well as be able to get all of this information back in case of a system failure or a crash. If all the information is loss a business could go bankrupt so the database is a fail
Databases allow us to easily store and retrieve data in a purely digital format. The strength of this is that large amounts of data can be stored and retrieved with minimal effort on the part of the user. Opposed to manually flipping through files, one can quickly pull up the requested data through a computer program. Many systems that were conventionally paper and file based have been converted to a digital format which are now stored in one or more databases.
Availability Authorized requests for objects must be granted to subjects within a reasonable amount of
Redundancy: This is a legal term that arises where an individual is either dismissed, put on short term or lay – off (Grimes and Horgan, 1988), although this is done because of the legal implications and employers don’t like to be sued by employees for such reasons because of the lump sum accrued to it as damages or penalty. There are identifiable reasons for such act which could be either the employer has intended to cease to carry on business or the reason for employment of the individual no longer exists (fewer persons are required). Nonetheless, the employee (provided he has satisfied the Social Welfare Act of 1952 (as amended) – must be employed by the employer for minimum of 2 years and must be insured under the Social Welfare Act) is able to establish a ground of redundancy, and it behoves the employer to justify the selection of redundancy is genuine and in a fair manner(Faulkner, 2008), if not, the damages paid is a sum payment to the employee, calculated by reference to the length of the employee’s service and normal weekly wages at the date of dismissal as stipulated in the Irish Redundancy Payments
Access control has been in use before the growth of the technology world. It could involve a simple action as locking a door. A person locks a door to prevent entry to those who are not allowed or authorize to do so. The same can be said about the security involving databases and the controlling of who can have access and what can be accessed. As far as database security is concerned, there are various categories that are involved in access control. The four main categories of access control include: Discretionary, Mandatory, Role-based, and Rule-based access control.
With advances in technology constantly happening, it can be hard to keep up with all of the latest trends. If organizations cannot keep up with the latest trends, it can lead to flaws in their security. Any flaws in security can have a detrimental effect on an organization’s database. Almost every organization has some sort of database, whether it is for maintaining customers, inventory, or vital information.