Database recovery and security, Database Management System

Database Recovery And Security

Introduction

In this part we will introduce two main issues relating to database management systems.

A computer system suffers from dissimilar types of failures. A DBMS controls very critical data of an organisation and thus must be reliable. Though, the reliability of the database system is related to the reliability of the computer system on which it runs.  In this part we will talk about recovery of the data having in a database system following failure of several types and present the dissimilar approaches to database recovery.  The types of failures that the computer system is likely to be subjected to contain failures of components or subsystems, power outages, software failures, accidents, unforeseen situations and natural or man-made disasters.  Database recovery methods are techniques of making the database consistent till the last possible consistent state. The aim of recovery scheme is to permit database operations to be resumed after a failure with minimum loss of information at an economically justifiable cost.

The second important issue that is being discussed in this unit is Database security. "Database security" is protection of the information included in the database against unauthorised access, destruction or modification. The first condition for security is to have Database integrity. "Database integrity" is the mechanism that is applied to ensure that the data in the database is consistent.

Posted Date: 3/12/2013 3:16:54 AM | Location : United States







Related Discussions:- Database recovery and security, Assignment Help, Ask Question on Database recovery and security, Get Answer, Expert's Help, Database recovery and security Discussions

Write discussion on Database recovery and security
Your posts are moderated
Related Questions
The database application project (DAP) for this assignment consists of the creation of a fully functional Microsoft Access database application for a real client. I recommend you s

What is E-R model? This data model is based on real world that having of basic objects called entities and of relationship between these objects. Entities are explained in a da

Smart Alex Catering Sevice (SACS) is a company offering top class catering staff  for prestigious events.  The company employs approximately 200 hourly paid contact staff - chefs,

Give an example of enforcement in Typing. You can understand the idea of enforcement as it makes sure objects of dissimilar classes may not be interchanged as below:  Exampl

Explain Superkey Ans: A superkey is described in the relational model of database organization like a set of attributes of a relation variable for which it holds that in all re

Describe sequential file organization.  Explain the rules for (i)  Inserting a new record. (ii)  Deleting an existing record.          Ans:A sequential f

What do you mean through integrity constraints? Integrity Constraints -An integrity constraint is a condition specified on a database schema and restricts the data in which

Differentiate OO development from structured development. Structured approach of problem solving is based upon the idea of decomposition of system into subsystem. In this appro

A file manipulation command that extracts some of the records from a file is called ? A file manipulation command that extracts some of the records from a file is called SELECT

Waterfall model is the linear model. The process is completed by step by step. We couldn't stop in between of the process. Prototype model: after get the model by low cost budget o