Importance of Database
Management System
and Data Security in
today’s world
Dr Romit Beed
Head, Dept. of Computer Sc.
St. Xavier’s College (Autonomous),
Kolkata
Database Management System
DBMS contains information about a particular enterprise
• Collection of interrelated data
• Set of programs to access the data
• An environment that is both convenient and efficient to use
DATABASE + PROGRAMS = DBMS
2
Why DBMS?
As the volume of data increases, so does the need for a
DBMS
DBMS is a computerized system that helps organize large
volume of information.
DBMS increases the business value of an organization’s data
assets, freeing users across the organization from repetitive
and time-consuming data processing tasks.
The result….
A more productive workforce, better compliance with data
regulations and better decisions.
3
Definition
A database management system is a software tool used to create
and manage one or more databases, offering an easy way to
• Create a database
• Store data
• Update/modify tables
• Retrieve/ Access information
A database management system also provides tools to administer
the database schema – the structure of the database itself.
4
Database Applications
▪ Banking: all transactions
▪ Airlines: reservations, schedules
▪ Universities: registration, grades
▪ Sales: customers, products, purchases
▪ Online retailers: order tracking, customized recommendations
▪ Manufacturing: production, inventory, orders, supply chain
▪ Human resources: employee records, salaries, tax deductions
Databases touch all aspects of our lives
5
Since quality data management implies a centralized view of data,
teams need a solution that allows them to coordinate everything,
including monitoring who is accessing the system and where
they’re accessing it from.
A database management system helps improve
• organizational security
• integration
• compliance
• performance
Benefits of DBMS
6
Benefits of DBMS
1. Improved data sharing and data security
Database management systems help users share data quickly, effectively,
and securely across an organization. By providing quick solutions to
database queries, a data management system enables faster access to more
accurate data. [End users, like sales people, are able to speed up sales cycles
and get more accurate in their sales prospecting.]
2. Effective data integration
Implementing DBMS promotes a more integrated picture of your operations
by easily illustrating how processes in one segment of the organization
affect other segments. What once was done completely manually now can
be fully automated and more accurate. DBMS includes flexible integration
options to standardize data across multiple sources and remove duplicates.
7
Benefits of DBMS
3. Consistent, reliable data
Data inconsistency occurs when different versions of matching data exist
in different places in an organization. For example, one group has a
client’s correct email, another the correct phone number. By using a
DBMS, you can be sure that consistent data is shared throughout the
organization.
4. Data that complies with privacy regulations
DBMS provide a better framework for the enforcement of privacy and
security policies. By orchestrating data in a unified manner, companies
can manage privacy and data security centrally and lower the risk of
regulatory violations.
8
Benefits of DBMS
5. Increased productivity
Deploying a DBMS typically results in increased productivity because a good
DBMS empowers people to spend more time on high-value activities and
strategic initiatives and less time cleaning data manually.
6. Better decision-making
Better data management procedures generate higher-quality information,
which leads to better decision-making across an organization.
9
Pros and Cons of DBMS
10
name address age pin Phone
(10) → ( 24 )→ (2) → (6) → (8) →
a Park St 21 700016 234
b Russel St 32 700015 324
c Camac St 42 700017 345
a Park St 21 700016 367
c Camac St 42 700017 657
Total size is 50x5=250
Name Address age pin Name phone
(10) (24) (2) (6) (10) (8)
a Park St 21 700016 a 234
b 324
b Russel St 32 700015
c 345
c Camac St 42 700017
a 367
Total size= 42x3=126+90=216 c 657
Pros and Cons of DBMS
11
name address age pin Phone
(10) → ( 24 )→ (2) → (6) → (8) →
a Park St 21 700016 234
b Russel St 32 700015 324
c Camac St 42 700017 345
a Park St 21 700016 367
c Camac St 42 700017 657
Total size is 50x5=250
Cust Name Address age pin Cust Code phone
Code (1) (8)
(1) (10) (24) (2) (6) 1 234
1 a Park St 21 700016 2 324
2 b Russel St 32 700015 3 345
1 367
3 c Camac St 42 700017
3 657
Total size= 43x3 + 9x5 = 129+45 = 174
Pros and Cons of DBMS
12
name address age pin Phone
(10) → ( 24 )→ (2) → (6) → (8) →
a Park St 21 700016 234
b Russel St 32 700015 324
c Camac St 42 700017 345
a Park St 21 700016 367
c Camac St 42 700017 657
Redundant Data
name address age pin Phone
(10) → ( 24 )→ (2) → (6) → (8) →
a Park St 21 700016 234
b Russel St 32 700015 324
c Camac St Short St 42 700017 345
a Park St 21 700016 367
c Camac St 42 700017 657
Inconsistent Data
Pros and Cons of DBMS
13
ACID Properties of DBMS
Transfer 50 rupees from A to B
A=1000, B=2000, sum = 3000 – CONSISTENT
Read A
A = A - 50
Write A
A=950, B=2000, Sum=2950 – INCONSISTENT
Read B
B = B + 50
Write B
A=950, B=2050, sum=3000 – CONSISTENT
14
A transaction is a unit of program execution that accesses and possibly
updates various data items. To preserve the integrity of data the
database system must ensure:
• Atomicity. Either all operations of the transaction are properly
reflected in the database or none are.
• Consistency. Execution of a transaction preserves the consistency of
the database.
• Isolation. Although multiple transactions may execute concurrently,
each transaction must be unaware of other concurrently executing
transactions. Intermediate transaction results must be hidden from
other concurrently executed transactions.
• Durability. After a transaction completes successfully, the changes it
has made to the database persist, even if there are system failures.
ACID Properties of DBMS
15
Time A B
10:00 Start
10:01
10:02 Starts
10:03
10:04 End
10:05 end
10:06
Concurrent Executions in DBMS
16
Time A B
10:00 Start
10:01 Starts
10:02 Lock
10:03 Lock Time A B
10:04 End 10:00 Start
10:05 end 10:01 Starts
10:02 Lock
10:03 Lock
10:04 End
10:05 end
Concurrent Executions in DBMS
17
Rows, Columns and Cells
18
Tables and Database
19
Database Software
database
Platform Ease of use Cloud Version
software
MySQL Windows, Linux, Easy Yes
Mac.
Oracle Windows, Linux Medium Yes
SQL Server Windows, Linux. Very Easy No
Firebird Windows, Linux, -- No
and Mac.
PostgreSQL Windows, Linux, Easy for No.
and Mac developers.
Altibase Linux Very Easy Yes
20
Interfaces of Popular Database Software
21
Schema and Instance
Schema – the logical structure of the database
Instance – the actual content of the database at a
particular point in time
Field name Type Size Constraint
Student id number 5 not null
Student name character 15 not null
Student address character 20
Phone character 10
Age number 3 non-negative
Cmsa 2020 | Cmsa 2021
22
Database Abstraction
• Physical level: describes how a record (e.g., customer) is stored.
• Logical level: describes data stored in database, and the
relationships among the data.
• View level: What the end user sees.
23
Data
Security
24
Computer data often travels from one computer to another,
leaving the safety of the host computer. Once the data is out of
hand, people with bad intention could modify or forge your data,
either for amusement or for their own benefit.
Cryptography encrypts the data, making it safer on its trip
between computers. The technology is based on the essentials of
secret codes, augmented by modern mathematics that protects
our data in powerful ways.
• Network Security - measures to protect data during
transmission
• Internet Security - measures to protect data during
transmission over a collection of interconnected networks
• Data Security - Data security is the practice of protecting digital
information from unauthorized access, corruption, or theft.
Introduction
25
Data Security is a concept that encompasses every aspect of
information security from the physical security of hardware and
storage devices to administrative and access controls, as well as
the security of software applications.
It also includes organizational policies and procedures.
When properly implemented, robust data security strategies will
not only protect an organization’s information assets against
cybercriminal activities, but also guard against insider threats
and human error, which remains among the leading causes of
data breaches today.
Data security involves deploying tools and technologies that
enhance the organization’s control over its critical data and how
it is used.
Data Security
26
Confidentiality: Ensures that the information in a computer system and
transmitted information are accessible only for reading by authorized
parties.
Authentication: Ensures that the origin of a message or electronic
document is correctly identified, with an assurance that the identity is
not false.
Integrity: Ensures that only authorized parties are able to modify
computer system assets and transmitted information.
Non-repudiation: Requires that neither the sender nor the receiver of a
message be able to deny the transmission.
Access control: Which resource may be used and by whom
Availability: Requires that computer system assets be available to
authorized parties when needed.
Principles of Security
27
Cryptography The art or science encompassing the principles and
methods of transforming an understandable message into one
that is incomprehensible, and then retransforming that message
back to its original form.
Cryptanalysis The study of principles and methods of
transforming an unintelligible message back into an intelligible
message without knowledge of the secret key.
Plain text The original understandable message
Cipher text The transformed message
Cryptography
28
Cipher An algorithm for transforming an understandable
message into one that is jumbled by transposition and/or
substitution methods
Key The secret information used by the cipher to encrypt/decrypt
and known only to the sender & receiver
Encrypt/ Encipher (encode) The process of converting plaintext
to cipher text using a cipher and a key
Decrypt/ Decipher (decode) the process of converting cipher text
back into plaintext using a cipher and a key
Cryptography
29
Questions and Answers
30