Database recovery and security, Database Management System

Database Recovery And Security

Introduction

In this part we will introduce two main issues relating to database management systems.

A computer system suffers from dissimilar types of failures. A DBMS controls very critical data of an organisation and thus must be reliable. Though, the reliability of the database system is related to the reliability of the computer system on which it runs.  In this part we will talk about recovery of the data having in a database system following failure of several types and present the dissimilar approaches to database recovery.  The types of failures that the computer system is likely to be subjected to contain failures of components or subsystems, power outages, software failures, accidents, unforeseen situations and natural or man-made disasters.  Database recovery methods are techniques of making the database consistent till the last possible consistent state. The aim of recovery scheme is to permit database operations to be resumed after a failure with minimum loss of information at an economically justifiable cost.

The second important issue that is being discussed in this unit is Database security. "Database security" is protection of the information included in the database against unauthorised access, destruction or modification. The first condition for security is to have Database integrity. "Database integrity" is the mechanism that is applied to ensure that the data in the database is consistent.

Posted Date: 3/12/2013 3:16:54 AM | Location : United States







Related Discussions:- Database recovery and security, Assignment Help, Ask Question on Database recovery and security, Get Answer, Expert's Help, Database recovery and security Discussions

Write discussion on Database recovery and security
Your posts are moderated
Related Questions
A set of possible data values is called? A set of possible data values is called as domain.

What is catalog in DBMS? Catalog - A relational DBMS maintains information about every table and index in which it contains. A catalog is a collection of special tables that st

What are the Constituents of File? Also elaborates all the possible file operations? A file is organised logically as sequence of record. These records are mapped onto disk blo

Give an example of Object Representation  For illustration, consider the implementation of a social security number within an employee object that is shown in Figure. The soci

Define canonical cover? A canonical cover Fc for F is a set of dependencies like F logically implies all dependencies in FC and Fc logically shows all dependencies in F.

What is nested relational model? The nested relational model is an extension of relational model in which domains might be either atomic or relation valued.

The State of NewYork certifies firefighters throughout state and keep track all of them, as well as of the state’s fire departments. Each fire department has unique department numb

Explain the Deferred Update The deferred update methods do not physically update the database on disk till after a transaction reaches its commit point; after that the updates

Define What are the desirable properties of a decomposition Ans: What are the desirable properties of decomposition - dependency preserving.  Because Lossless join and dependen

Need an expert in ER database theoretical and modeling database system Project Description: Need an expert in ER database theoretical and modeling database systems? Skills