SlideShare a Scribd company logo
DBMS &
CYBERCRIME
Database Management System
Database
• Organized collection of logically related data is called Database.
• In a relational database, a data item is called a column or attribute, a
record is called a row or tuple, and a file is called a table.
DBMS
Database management system (DBMS) is a software system that enables the use of a
database approach.
The primary purpose of a DBMS is
– It provides a systematic method of creating, updating, storing, and retrieving the
data stored in a database.
– It enables end users and application programmers to share data, and
– it enables data to be shared among multiple applications.
Components
Components of DBMS
– A database management system (DBMS) consists of several components. Each
component plays very important role in the database management system
environment. The major components of database management system are:
– Software
– Hardware
– Data
– Procedures
– Database Access Language
Components
Software
– The main component of a DBMS is the software. It is the set of programs used to
handle the database and to control and manage the overall computerized database.
Hardware
• Hardware consists of a set of physical electronic devices such as computers with
associated I/O devices, storage devices that make interface between computers and
the real world systems etc and so on. It is impossible to implement the DBMS
without the hardware devices, In a network, a powerful computer with high data
processing speed and a storage device with large storage capacity is required as
database server.
Components
Data
– Data is the most important component of the DBMS. The main purpose of
DBMS is to process the data. In DBMS, databases are defined, constructed and
then data is stored, updated and retrieved to and from the databases. The
database contains both the actual (or operational) data and the metadata (data
about data or description about data).
Procedures
– Procedures refer to the instructions and rules that help to design the database
and to use the DBMS.
Components
Database Access Language
– The database access language is used to access the data to and from the
database. The users use the database access language to enter new data,
change the existing data in database and to retrieve required data from
databases.
– The most popular database access language is SQL (Structured Query
Language).
Users
– The users are the people who manage the databases and perform different
operations on the databases in the database system.
Keywords
– word or identifier that has a particular meaning. Database keywords are the
words that have unique meaning in Database . Example of some keywords(SQL)
are:
– DDL: Create, Alter, Drop, Truncate etc.
– DCL: Grant, Revoke etc.
– DML: Insert, Delete, Update etc.
Example of DB
Cyber Crime and Terrorism
Definition
– Cybercrime is defined as a crime in which a computer is the object of the crime
(hacking, phishing, spamming) or is used as a tool to commit an offense (child
pornography, hate crimes). Cybercriminals may use computer technology to
access personal information, business trade secrets, or use the Internet for
exploitive or malicious purposes. Criminals can also use computers for
communication and document or data storage. Criminals who perform these
illegal activities are often referred to as hackers.
– Cyberterrorism is a cyber attack using or exploiting computer or
communication networks to cause sufficient destruction to generate fear or
intimidate a society into an ideological goal.
Hacking
– Using a computer to enter another network
– Cost users $1.3 trillion in 2003
– Hackers motivation
– Recreational hacking
– Financial hackers
– Hacking methods
– Sniffing(Insecure data)
– Social engineering
– Spoofing(masquerades)
Online Spying Tool
– Cookies
– Files delivered from a web site
– Originally improved a site’s function
– Cookies now track history and passwords
– Browsers include cookie blocking tools
Online Spying Tool
– Spyware
– Software downloaded to a computer
– Designed to record personal information
– Typically undesired software
– Hides from users
– Several programs exist to eliminate
Online Spying Tool
– Web bugs
– Small programs embedded in gif images
– Gets around cookie blocking tools
– Companies use to track usage
– Blocked with spyware killers
Online Spying Tool
– Spam
– Unsolicited commercial email
– Networks and PCs need a spam blocker
– Stop spam before reaching the inbox
– Spammers acquire addresses using many methods
– CAN-SPAM Act passed in 2003

More Related Content

PDF
samudrik shastra.pdf
DOCX
ROLE OF MEDIA IN DISASTER MANAGEMENT
PPTX
Multimedia Skills-The Team-Project manager
PPTX
Digital Audio in Multimedia
PPTX
Digital image processing
PDF
Countries and regions of the world m A to Z
PDF
Role of ICT (information communication technology) in disaster management.pdf
PDF
Chapter 10 - Multimedia Over Atm
samudrik shastra.pdf
ROLE OF MEDIA IN DISASTER MANAGEMENT
Multimedia Skills-The Team-Project manager
Digital Audio in Multimedia
Digital image processing
Countries and regions of the world m A to Z
Role of ICT (information communication technology) in disaster management.pdf
Chapter 10 - Multimedia Over Atm

Similar to database management system and cybercrime (20)

PPTX
Internet, Database, Cyber Crime
PPSX
Ict lecture11b,12,13
PPTX
fundamentals of Databases
PPTX
Ch 2-introduction to dbms
PPTX
Patents and trademarks.pptx
PPTX
Database technology
PPTX
Database (DB- A database is an electronically stored, systematic collection o...
PPTX
Structured Query Language (SQL)- standard Database language
PDF
History Of Database Technology
PPTX
Data,information and database
PPTX
Database assignment
PPTX
Database management systems
DOC
Master Thesis Security in Distributed Databases- Ian Lee
PPTX
Jsjsjskdndidjndndnjdjdjdndjsijsjdndjdudj
PPTX
Cybercrime and Security
PDF
Advantages And Disadvantages Of Database System
PPTX
data and information
PPTX
MIS-3rd Unit.pptx
PPTX
MIS-3rd Unit.pptx
Internet, Database, Cyber Crime
Ict lecture11b,12,13
fundamentals of Databases
Ch 2-introduction to dbms
Patents and trademarks.pptx
Database technology
Database (DB- A database is an electronically stored, systematic collection o...
Structured Query Language (SQL)- standard Database language
History Of Database Technology
Data,information and database
Database assignment
Database management systems
Master Thesis Security in Distributed Databases- Ian Lee
Jsjsjskdndidjndndnjdjdjdndjsijsjdndjdudj
Cybercrime and Security
Advantages And Disadvantages Of Database System
data and information
MIS-3rd Unit.pptx
MIS-3rd Unit.pptx
Ad

More from Jubayer Alam Shoikat (20)

PPTX
Fundamentals of Quantitative Analysis
PDF
Five methods for managing conflict
DOCX
Human Capital Trends 2017- 2020
PPT
Conflict in Organizations
PPT
Managing Conflict, Politics, and Negotiation
PPT
Introductory class of conflict management
DOCX
Differences between legal compliances and managing diversity
PPT
Capital budgeting
PPTX
Database Management System and CYBERCRIME
PPTX
Basic organization of computer
PPTX
Number Systems
PPTX
Operating System
PPTX
Data Communications and Computer Networks
PPTX
Fundamentals of Computer
PPTX
Marketing Strategy
PPTX
Fundamental of Management
PPTX
International Business
PPT
Accounting Cycle (Work Sheet)
DOCX
An assignment on annual reprot gp
PPTX
10 years annual report of Grameenphone
Fundamentals of Quantitative Analysis
Five methods for managing conflict
Human Capital Trends 2017- 2020
Conflict in Organizations
Managing Conflict, Politics, and Negotiation
Introductory class of conflict management
Differences between legal compliances and managing diversity
Capital budgeting
Database Management System and CYBERCRIME
Basic organization of computer
Number Systems
Operating System
Data Communications and Computer Networks
Fundamentals of Computer
Marketing Strategy
Fundamental of Management
International Business
Accounting Cycle (Work Sheet)
An assignment on annual reprot gp
10 years annual report of Grameenphone
Ad

Recently uploaded (20)

PPTX
Global journeys: estimating international migration
PDF
22.Patil - Early prediction of Alzheimer’s disease using convolutional neural...
PDF
TRAFFIC-MANAGEMENT-AND-ACCIDENT-INVESTIGATION-WITH-DRIVING-PDF-FILE.pdf
PPT
Quality review (1)_presentation of this 21
PPTX
advance b rammar.pptxfdgdfgdfsgdfgsdgfdfgdfgsdfgdfgdfg
PPTX
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
PPTX
Business Acumen Training GuidePresentation.pptx
PPTX
Business Ppt On Nestle.pptx huunnnhhgfvu
PPTX
Supervised vs unsupervised machine learning algorithms
PPTX
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
PPTX
iec ppt-1 pptx icmr ppt on rehabilitation.pptx
PPTX
Introduction to Knowledge Engineering Part 1
PPT
Chapter 2 METAL FORMINGhhhhhhhjjjjmmmmmmmmm
PPTX
Introduction to Basics of Ethical Hacking and Penetration Testing -Unit No. 1...
PPTX
Database Infoormation System (DBIS).pptx
PPTX
STUDY DESIGN details- Lt Col Maksud (21).pptx
PDF
Introduction to Business Data Analytics.
PPTX
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
PPTX
DISORDERS OF THE LIVER, GALLBLADDER AND PANCREASE (1).pptx
PDF
Launch Your Data Science Career in Kochi – 2025
Global journeys: estimating international migration
22.Patil - Early prediction of Alzheimer’s disease using convolutional neural...
TRAFFIC-MANAGEMENT-AND-ACCIDENT-INVESTIGATION-WITH-DRIVING-PDF-FILE.pdf
Quality review (1)_presentation of this 21
advance b rammar.pptxfdgdfgdfsgdfgsdgfdfgdfgsdfgdfgdfg
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
Business Acumen Training GuidePresentation.pptx
Business Ppt On Nestle.pptx huunnnhhgfvu
Supervised vs unsupervised machine learning algorithms
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
iec ppt-1 pptx icmr ppt on rehabilitation.pptx
Introduction to Knowledge Engineering Part 1
Chapter 2 METAL FORMINGhhhhhhhjjjjmmmmmmmmm
Introduction to Basics of Ethical Hacking and Penetration Testing -Unit No. 1...
Database Infoormation System (DBIS).pptx
STUDY DESIGN details- Lt Col Maksud (21).pptx
Introduction to Business Data Analytics.
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
DISORDERS OF THE LIVER, GALLBLADDER AND PANCREASE (1).pptx
Launch Your Data Science Career in Kochi – 2025

database management system and cybercrime

  • 3. Database • Organized collection of logically related data is called Database. • In a relational database, a data item is called a column or attribute, a record is called a row or tuple, and a file is called a table.
  • 4. DBMS Database management system (DBMS) is a software system that enables the use of a database approach. The primary purpose of a DBMS is – It provides a systematic method of creating, updating, storing, and retrieving the data stored in a database. – It enables end users and application programmers to share data, and – it enables data to be shared among multiple applications.
  • 5. Components Components of DBMS – A database management system (DBMS) consists of several components. Each component plays very important role in the database management system environment. The major components of database management system are: – Software – Hardware – Data – Procedures – Database Access Language
  • 6. Components Software – The main component of a DBMS is the software. It is the set of programs used to handle the database and to control and manage the overall computerized database. Hardware • Hardware consists of a set of physical electronic devices such as computers with associated I/O devices, storage devices that make interface between computers and the real world systems etc and so on. It is impossible to implement the DBMS without the hardware devices, In a network, a powerful computer with high data processing speed and a storage device with large storage capacity is required as database server.
  • 7. Components Data – Data is the most important component of the DBMS. The main purpose of DBMS is to process the data. In DBMS, databases are defined, constructed and then data is stored, updated and retrieved to and from the databases. The database contains both the actual (or operational) data and the metadata (data about data or description about data). Procedures – Procedures refer to the instructions and rules that help to design the database and to use the DBMS.
  • 8. Components Database Access Language – The database access language is used to access the data to and from the database. The users use the database access language to enter new data, change the existing data in database and to retrieve required data from databases. – The most popular database access language is SQL (Structured Query Language). Users – The users are the people who manage the databases and perform different operations on the databases in the database system.
  • 9. Keywords – word or identifier that has a particular meaning. Database keywords are the words that have unique meaning in Database . Example of some keywords(SQL) are: – DDL: Create, Alter, Drop, Truncate etc. – DCL: Grant, Revoke etc. – DML: Insert, Delete, Update etc.
  • 11. Cyber Crime and Terrorism
  • 12. Definition – Cybercrime is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming) or is used as a tool to commit an offense (child pornography, hate crimes). Cybercriminals may use computer technology to access personal information, business trade secrets, or use the Internet for exploitive or malicious purposes. Criminals can also use computers for communication and document or data storage. Criminals who perform these illegal activities are often referred to as hackers. – Cyberterrorism is a cyber attack using or exploiting computer or communication networks to cause sufficient destruction to generate fear or intimidate a society into an ideological goal.
  • 13. Hacking – Using a computer to enter another network – Cost users $1.3 trillion in 2003 – Hackers motivation – Recreational hacking – Financial hackers – Hacking methods – Sniffing(Insecure data) – Social engineering – Spoofing(masquerades)
  • 14. Online Spying Tool – Cookies – Files delivered from a web site – Originally improved a site’s function – Cookies now track history and passwords – Browsers include cookie blocking tools
  • 15. Online Spying Tool – Spyware – Software downloaded to a computer – Designed to record personal information – Typically undesired software – Hides from users – Several programs exist to eliminate
  • 16. Online Spying Tool – Web bugs – Small programs embedded in gif images – Gets around cookie blocking tools – Companies use to track usage – Blocked with spyware killers
  • 17. Online Spying Tool – Spam – Unsolicited commercial email – Networks and PCs need a spam blocker – Stop spam before reaching the inbox – Spammers acquire addresses using many methods – CAN-SPAM Act passed in 2003