INTRODUCTION
This assignment is an attempt to present a position paper about the pros and cons of a database management system (DBMS) for a new a newly established multi-campus Mpokeleshi University library in Muchinga province of Zambia. It further gives sufficiently clear arguments to enable the vice-chancellor make an informed decision on the way forward.
The paper will first define the major concepts under review before outlining the pros and cons of a database management system (DBMS) and finally give sufficiently clear arguments to enable the vice-chancellor make an informed decision on the way forward.
DEFINITIONS OF MAJOR CONCEPTS
To begin with are the definitions of major concepts under review and these are pros and cons, and
…show more content…
DISADVANTAGES OF DATABASE MANAGEMENT SYSTEMS
Despite the various advantages of database management systems (DBMS), it is worth pointing out that it has its own shortcomings or disadvantages or rather challenges, and some of them include confidentiality, privacy and security: It is worth noting that when information is centralized and is accessed by a huge number of users remotely, the possibility of abuse are often more, as opposed to a conventional data processing system, thereby compromising the levels of confidentiality, privacy and security. Therefore, to reduce the chance of unauthorized users from accessing and abusing sensitive information, it is necessary to take technical, administrative, and possibly legal measures to curb such abuse if a database management system (DBMS) is to continue to serve its intended purpose of informing, entertaining and indeed educating the masses (Laudon, 2004:223).
Similarly, since the database is accessible to many users remotely, adequate controls are needed to control unauthorized users
A database administration framework (DBMS) is a PC programming application that connects with the client, different applications, and the database itself to catch and dissect information. A universally useful DBMS is intended to permit the definition, creation, questioning, upgrade, and organization of databases.
Databases today are essential to every business. Whenever you visit a major Web site – Google, Yahoo!, Amazon.com, or thousands of smaller sites that provide information – there is a database behind the scenes serving up the information you request (Hector, Ullman, & Widom 2008). Database systems are becoming as common in the workplace as the essential one that it can easily be searched, categorized and recalled in different means that can be easily read and understood by the end user.
* Describe the role of databases and database management systems in managing organizational data and information.
Each distributed DB perform some procedures to protect the data from any threats may occur through transactions. First is access control methodology which prevent unauthorized access to data. Second, inference control which prohibit users from inferring confidential data of other individuals using queries. Finally, flow control to prevent information from flowing to unauthorized persons in a way that violates organization policies.
A Database Management System or (DBMS) is an essential tool for any organization or company in today’s modern world. A DBMS is “a group of programs that manipulate the database and provide an interface between the database and its users and other application programs” (Stair & Reynolds, 2011, p. 189). So in choosing the right DBMS there are many factoring issues with choosing the right one for the company or organization. When choosing a DBMS one has to think about how the system will ultimately help the company or organization with day to day processes and the goals of the company or organization.
What is a database? According to our book, it’s an organized collection of logically related data. The information collected in a database can be effortlessly administered and accessed. However, with each database there is a concern of security. According to our book, the goal of database security is to protect and prevent data from unintentional or deliberate threats to its integrity and accessibility. The database environment has grown more complex, with distributed databases located on client/server architectures and personal computers as well as mainframes. Access to data has become more open through the Internet and corporate intranets and from mobile computing devices. As a result, managing data security has become more difficult and time-consuming.
Our data is never at rest. Even when organizations depend on their database for storage, there is always copies of data somewhere else to be found. To service our men and women in the Army Reserves, data has to be manipulated at the local computer and then sent back to be stored back on the database. The very moment that data is moved and stored on a local machine for it to be manipulated is also the moment that the data is most vulnerable. Despite the concerted efforts to ensure data confidentiality the overall security depends efforts put forth by the weakest link. The insider threat is one of the hardest risk to mitigate, mainly due to their initial need to legitimately data access.
With the quick advancement of Internet, system database security has turned into the center of system security. The exploration of database security innovation against SQL assaults has turned out to be exceptionally earnest. In this paper, we investigate standards of SQL assaults, contemplate a database insurance framework which is utilized between the Web application and the database. The framework gives distinctive defensive measures to customary clients and directors to adequately ensure the security of the database. the part of a Web application and database in the database between the security framework for customary clients and directors
This paper has been compiled as the final project for the course: Boston University, MET CS 674 – Database Security. This paper contains all relevant material which aligns with the mission of this course – to teach students the tools and techniques required to secure and audit a database system in the information technology era.
Connolly and Carolyn (2004) define a database as a structureordesign that consists of theclient’s data as well as metadata. It is also a persistent, logicallycoherentrepository of inherentlymeaningful data that is relevant to someaspects of therealworld. The database consists of data organized in a systematicway, anditallowseasy retrieval of information, analysis, updating andoutput of data. Thatdata can be in theform of graphics, scripts, reports, text, tables, andsoon. Most of thecomputerapplications are databases at their core. Manycompaniesusuallyhave a lot of data, andsotheyhavebig databases that can handlethatlargeamount of data. It is wherenothe database administratorcomes into playtopensurepropermanagement of the database sothatthe organizational data is safe from anyintrudersor data corruption (Jones, 2014). The database is whatcontrolsthedata of theentireorganization, andany tampering of the databases can culminate to the stoppage of businessoperations.
This paper will compare and contrast five different database management systems on six criteria. The database management systems (DBMS) that will be discussed are SQL Server 2000, Access, MySQL, DB2, and Oracle. The criteria that will be compared are the systems’ functionality, the requirements that must be met to run the DBMS, the expansion capabilities – if it is able to expand to handle more data over time, the types of companies that typically use each one, the normal usage of the DBMS, and the costs associated with implementing the DBMS.
The protection of the database from unauthorized users is the maintenance of database security. This controls come in the form of user names and passwords to identify people who have the authority to use the database. The accessibility of an authorized person can be limited by the operation types such as retrieval, insert, update, delete. For instance, the DBA has access to all the data in the database, a branch manager may have access to all data that relates to his or her branch office and a sales assistant may have right to access with related to properties but no access to sensitive data such as staff salary details.
Databases are a core component of many web applications. The number of web applications that use databases continues to increase each year, and the rate at which malicious users are hacking into databases is growing at an alarming rate. The hacker’s intent is to destroy data or steal sensitive information such as credit card numbers, social security numbers, and passwords. This produces a strong need to ensure the integrity of the data and secure the data from unintended access. As a web developer, there are many techniques that can be used to program security into a web application to lessen the likelihood of a malicious user being able to access confidential information. It is
As databases and technology have evolved, Elmasri and Navathe point out that increasingly complex data structures for modeling to meet the needs of the more advanced and larger databases that were also beginning to include newer data types (2016). As stated before, with more complex databases, there are more vulnerabilities in security that need to be planned for and mitigated wherever possible. A DBMS is responsible for designing the methods in which data recovery and security is handled, while tools are used within database modeling that facilitate modeling, system design, and improve performance (Elmasri & Navathe, 2016). When applying these tools to database creation, security should always be considered in each step of modeling and creating the database. The DBMS provides a security and authorization subsystem to the DBA so that they can use it to create accounts and specify account restrictions (Elmasri & Navathe, 2016).
A database management system in the main software tool of the database management approach because it controls the creation, maintenance, and use of the database of an organization and its users. The three major functions of a database management system are first to create new database and database application. Second to maintain the quality of the data in an organized database. And last to use the database of an organization to provide the information that its end users need. An example of a database management approach in a banking information system. Note how the savings, checking and installment loan programs use a