SlideShare a Scribd company logo
DBMS &
CYBERCRIME
Database Management System
Database
• Organized collection of logically related data is called Database.
• In a relational database, a data item is called a column or attribute, a
record is called a row or tuple, and a file is called a table.
DBMS
Database management system (DBMS) is a software system that enables the use of a
database approach.
The primary purpose of a DBMS is
– It provides a systematic method of creating, updating, storing, and retrieving the
data stored in a database.
– It enables end users and application programmers to share data, and
– it enables data to be shared among multiple applications.
Components
Components of DBMS
– A database management system (DBMS) consists of several components. Each
component plays very important role in the database management system
environment. The major components of database management system are:
– Software
– Hardware
– Data
– Procedures
– Database Access Language
Components
Software
– The main component of a DBMS is the software. It is the set of programs used to
handle the database and to control and manage the overall computerized database.
Hardware
• Hardware consists of a set of physical electronic devices such as computers with
associated I/O devices, storage devices that make interface between computers and
the real world systems etc and so on. It is impossible to implement the DBMS
without the hardware devices, In a network, a powerful computer with high data
processing speed and a storage device with large storage capacity is required as
database server.
Components
Data
– Data is the most important component of the DBMS. The main purpose of
DBMS is to process the data. In DBMS, databases are defined, constructed and
then data is stored, updated and retrieved to and from the databases. The
database contains both the actual (or operational) data and the metadata (data
about data or description about data).
Procedures
– Procedures refer to the instructions and rules that help to design the database
and to use the DBMS.
Components
Database Access Language
– The database access language is used to access the data to and from the
database. The users use the database access language to enter new data,
change the existing data in database and to retrieve required data from
databases.
– The most popular database access language is SQL (Structured Query
Language).
Users
– The users are the people who manage the databases and perform different
operations on the databases in the database system.
Keywords
– word or identifier that has a particular meaning. Database keywords are the
words that have unique meaning in Database . Example of some keywords(SQL)
are:
– DDL: Create, Alter, Drop, Truncate etc.
– DCL: Grant, Revoke etc.
– DML: Insert, Delete, Update etc.
Example of DB
Cyber Crime and Terrorism
Definition
– Cybercrime is defined as a crime in which a computer is the object of the crime
(hacking, phishing, spamming) or is used as a tool to commit an offense (child
pornography, hate crimes). Cybercriminals may use computer technology to
access personal information, business trade secrets, or use the Internet for
exploitive or malicious purposes. Criminals can also use computers for
communication and document or data storage. Criminals who perform these
illegal activities are often referred to as hackers.
– Cyberterrorism is a cyber attack using or exploiting computer or
communication networks to cause sufficient destruction to generate fear or
intimidate a society into an ideological goal.
Hacking
– Using a computer to enter another network
– Cost users $1.3 trillion in 2003
– Hackers motivation
– Recreational hacking
– Financial hackers
– Hacking methods
– Sniffing(Insecure data)
– Social engineering
– Spoofing(masquerades)
Online Spying Tool
– Cookies
– Files delivered from a web site
– Originally improved a site’s function
– Cookies now track history and passwords
– Browsers include cookie blocking tools
Online Spying Tool
– Spyware
– Software downloaded to a computer
– Designed to record personal information
– Typically undesired software
– Hides from users
– Several programs exist to eliminate
Online Spying Tool
– Web bugs
– Small programs embedded in gif images
– Gets around cookie blocking tools
– Companies use to track usage
– Blocked with spyware killers
Online Spying Tool
– Spam
– Unsolicited commercial email
– Networks and PCs need a spam blocker
– Stop spam before reaching the inbox
– Spammers acquire addresses using many methods
– CAN-SPAM Act passed in 2003

More Related Content

PPTX
Database assignment
PPTX
Database ms priyanka
DOCX
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
DOCX
Database Management System users
PPTX
Database management system -DBMS -All
PDF
DBMS 1 | Introduction to DBMS
PDF
Database & Database Users
Database assignment
Database ms priyanka
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
Database Management System users
Database management system -DBMS -All
DBMS 1 | Introduction to DBMS
Database & Database Users

What's hot (18)

PDF
01 dbms-introduction
PPTX
Slide 4 dbms users
PPTX
Fundamentals of Database system - Databases and Database Users
PPTX
Complete first chapter rdbm 17332
PPTX
Multimedia Database
PPTX
Week 9
PPTX
Data security
PPTX
Multimedia Database
PPTX
Multimedia Database
PPT
Database
PPTX
History of database processing module 1 (2)
PPTX
Introduction to database
PPT
Fs 5.1 information technology_kc
PPTX
MultiMedia dbms
PPT
Multimedia Database
PPTX
Chapter one
01 dbms-introduction
Slide 4 dbms users
Fundamentals of Database system - Databases and Database Users
Complete first chapter rdbm 17332
Multimedia Database
Week 9
Data security
Multimedia Database
Multimedia Database
Database
History of database processing module 1 (2)
Introduction to database
Fs 5.1 information technology_kc
MultiMedia dbms
Multimedia Database
Chapter one
Ad

Similar to Database Management System and CYBERCRIME (20)

PPTX
Internet, Database, Cyber Crime
PPSX
Ict lecture11b,12,13
PPTX
fundamentals of Databases
PPTX
Ch 2-introduction to dbms
PPTX
Patents and trademarks.pptx
PPTX
Database technology
PPTX
Database (DB- A database is an electronically stored, systematic collection o...
PPTX
Structured Query Language (SQL)- standard Database language
PDF
History Of Database Technology
PPTX
Data,information and database
PPTX
Database management systems
DOC
Master Thesis Security in Distributed Databases- Ian Lee
PPTX
Jsjsjskdndidjndndnjdjdjdndjsijsjdndjdudj
PPTX
Cybercrime and Security
PDF
Advantages And Disadvantages Of Database System
PPTX
data and information
PPTX
MIS-3rd Unit.pptx
PPTX
MIS-3rd Unit.pptx
PPTX
MS-CIT Unit 9.pptx
Internet, Database, Cyber Crime
Ict lecture11b,12,13
fundamentals of Databases
Ch 2-introduction to dbms
Patents and trademarks.pptx
Database technology
Database (DB- A database is an electronically stored, systematic collection o...
Structured Query Language (SQL)- standard Database language
History Of Database Technology
Data,information and database
Database management systems
Master Thesis Security in Distributed Databases- Ian Lee
Jsjsjskdndidjndndnjdjdjdndjsijsjdndjdudj
Cybercrime and Security
Advantages And Disadvantages Of Database System
data and information
MIS-3rd Unit.pptx
MIS-3rd Unit.pptx
MS-CIT Unit 9.pptx
Ad

More from Jubayer Alam Shoikat (20)

PPTX
Fundamentals of Quantitative Analysis
PDF
Five methods for managing conflict
DOCX
Human Capital Trends 2017- 2020
PPT
Conflict in Organizations
PPT
Managing Conflict, Politics, and Negotiation
PPT
Introductory class of conflict management
DOCX
Differences between legal compliances and managing diversity
PPT
Capital budgeting
PPTX
database management system and cybercrime
PPTX
Basic organization of computer
PPTX
Number Systems
PPTX
Operating System
PPTX
Data Communications and Computer Networks
PPTX
Fundamentals of Computer
PPTX
Marketing Strategy
PPTX
Fundamental of Management
PPTX
International Business
PPT
Accounting Cycle (Work Sheet)
DOCX
An assignment on annual reprot gp
PPTX
10 years annual report of Grameenphone
Fundamentals of Quantitative Analysis
Five methods for managing conflict
Human Capital Trends 2017- 2020
Conflict in Organizations
Managing Conflict, Politics, and Negotiation
Introductory class of conflict management
Differences between legal compliances and managing diversity
Capital budgeting
database management system and cybercrime
Basic organization of computer
Number Systems
Operating System
Data Communications and Computer Networks
Fundamentals of Computer
Marketing Strategy
Fundamental of Management
International Business
Accounting Cycle (Work Sheet)
An assignment on annual reprot gp
10 years annual report of Grameenphone

Recently uploaded (20)

PDF
Launch Your Data Science Career in Kochi – 2025
PPTX
IBA_Chapter_11_Slides_Final_Accessible.pptx
PDF
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
PPTX
Computer network topology notes for revision
PPTX
climate analysis of Dhaka ,Banglades.pptx
PPT
Chapter 3 METAL JOINING.pptnnnnnnnnnnnnn
PDF
Clinical guidelines as a resource for EBP(1).pdf
PPTX
Global journeys: estimating international migration
PDF
.pdf is not working space design for the following data for the following dat...
PPTX
Supervised vs unsupervised machine learning algorithms
PPTX
05. PRACTICAL GUIDE TO MICROSOFT EXCEL.pptx
PDF
Introduction to Business Data Analytics.
PPTX
Business Acumen Training GuidePresentation.pptx
PPTX
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
PDF
“Getting Started with Data Analytics Using R – Concepts, Tools & Case Studies”
PPTX
Introduction-to-Cloud-ComputingFinal.pptx
PDF
Mega Projects Data Mega Projects Data
PDF
Recruitment and Placement PPT.pdfbjfibjdfbjfobj
PPT
Miokarditis (Inflamasi pada Otot Jantung)
PPT
Quality review (1)_presentation of this 21
Launch Your Data Science Career in Kochi – 2025
IBA_Chapter_11_Slides_Final_Accessible.pptx
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
Computer network topology notes for revision
climate analysis of Dhaka ,Banglades.pptx
Chapter 3 METAL JOINING.pptnnnnnnnnnnnnn
Clinical guidelines as a resource for EBP(1).pdf
Global journeys: estimating international migration
.pdf is not working space design for the following data for the following dat...
Supervised vs unsupervised machine learning algorithms
05. PRACTICAL GUIDE TO MICROSOFT EXCEL.pptx
Introduction to Business Data Analytics.
Business Acumen Training GuidePresentation.pptx
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
“Getting Started with Data Analytics Using R – Concepts, Tools & Case Studies”
Introduction-to-Cloud-ComputingFinal.pptx
Mega Projects Data Mega Projects Data
Recruitment and Placement PPT.pdfbjfibjdfbjfobj
Miokarditis (Inflamasi pada Otot Jantung)
Quality review (1)_presentation of this 21

Database Management System and CYBERCRIME

  • 3. Database • Organized collection of logically related data is called Database. • In a relational database, a data item is called a column or attribute, a record is called a row or tuple, and a file is called a table.
  • 4. DBMS Database management system (DBMS) is a software system that enables the use of a database approach. The primary purpose of a DBMS is – It provides a systematic method of creating, updating, storing, and retrieving the data stored in a database. – It enables end users and application programmers to share data, and – it enables data to be shared among multiple applications.
  • 5. Components Components of DBMS – A database management system (DBMS) consists of several components. Each component plays very important role in the database management system environment. The major components of database management system are: – Software – Hardware – Data – Procedures – Database Access Language
  • 6. Components Software – The main component of a DBMS is the software. It is the set of programs used to handle the database and to control and manage the overall computerized database. Hardware • Hardware consists of a set of physical electronic devices such as computers with associated I/O devices, storage devices that make interface between computers and the real world systems etc and so on. It is impossible to implement the DBMS without the hardware devices, In a network, a powerful computer with high data processing speed and a storage device with large storage capacity is required as database server.
  • 7. Components Data – Data is the most important component of the DBMS. The main purpose of DBMS is to process the data. In DBMS, databases are defined, constructed and then data is stored, updated and retrieved to and from the databases. The database contains both the actual (or operational) data and the metadata (data about data or description about data). Procedures – Procedures refer to the instructions and rules that help to design the database and to use the DBMS.
  • 8. Components Database Access Language – The database access language is used to access the data to and from the database. The users use the database access language to enter new data, change the existing data in database and to retrieve required data from databases. – The most popular database access language is SQL (Structured Query Language). Users – The users are the people who manage the databases and perform different operations on the databases in the database system.
  • 9. Keywords – word or identifier that has a particular meaning. Database keywords are the words that have unique meaning in Database . Example of some keywords(SQL) are: – DDL: Create, Alter, Drop, Truncate etc. – DCL: Grant, Revoke etc. – DML: Insert, Delete, Update etc.
  • 11. Cyber Crime and Terrorism
  • 12. Definition – Cybercrime is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming) or is used as a tool to commit an offense (child pornography, hate crimes). Cybercriminals may use computer technology to access personal information, business trade secrets, or use the Internet for exploitive or malicious purposes. Criminals can also use computers for communication and document or data storage. Criminals who perform these illegal activities are often referred to as hackers. – Cyberterrorism is a cyber attack using or exploiting computer or communication networks to cause sufficient destruction to generate fear or intimidate a society into an ideological goal.
  • 13. Hacking – Using a computer to enter another network – Cost users $1.3 trillion in 2003 – Hackers motivation – Recreational hacking – Financial hackers – Hacking methods – Sniffing(Insecure data) – Social engineering – Spoofing(masquerades)
  • 14. Online Spying Tool – Cookies – Files delivered from a web site – Originally improved a site’s function – Cookies now track history and passwords – Browsers include cookie blocking tools
  • 15. Online Spying Tool – Spyware – Software downloaded to a computer – Designed to record personal information – Typically undesired software – Hides from users – Several programs exist to eliminate
  • 16. Online Spying Tool – Web bugs – Small programs embedded in gif images – Gets around cookie blocking tools – Companies use to track usage – Blocked with spyware killers
  • 17. Online Spying Tool – Spam – Unsolicited commercial email – Networks and PCs need a spam blocker – Stop spam before reaching the inbox – Spammers acquire addresses using many methods – CAN-SPAM Act passed in 2003