SlideShare a Scribd company logo
DB FOR RDBMS
RDBMS

 A relational database is a database that
 conforms to relational model theory. The
 software used to manage relational database
 is called a relational database management
 system.
RELATION, TUPLE AND ATTRIBUTE

   A relation is defined as
    a set of tuples that
    have the same
    attributes.
   An attribute is a
    specification that
    defines a property of
    an object.
   Collection of related
    attributes in a relation
    is a tuple.
DATABASE

 Database contains one or more relations.
 A database is an organized collection of
  data, today typically in digital form.
 Databases are usually too expensive. Thus
  at any point in time most of their content
  resides in nonvolatile storage. Even if for
  operational reason very large portions of
  them reside in volatile storage.
 The content resides in file which is non
  volatile which cannot be used for efficient
  retrieval and management.
 For efficient retrieval and management,
  databases may store data in many data
  structure such as B+ Trees, Hash Tables and
  Heaps.
NOT THE REAL VIEW

   This is a relation. This
    structure is not
    permanent. All the data
    are stored only in files,
    for user convenience a
    relation is created.
INTERNAL OF DB

   Linked lists form’s the basis for the internal
    design of database. The structure of the
    attributes differ from one to another to link all
    these we require Heterogeneous Linked Lists.
    Heterogeneous Linked List is a linked list data-
    structure that is capable of storing data of
    different structures. void pointer is basically used
    in these types of linked list as we are not sure of
    which type of data needs to be stored. Void
    pointer is capable of storing pointer to any type
    as it is a generic pointer type.
INVERTED FILE

   inverted index (inverted file) is an index
    data structure storing a mapping from
    content, such as words or numbers, to its
    locations in a database file, or in a document
    or a set of documents. The purpose of an
    inverted index is to allow fast searches,
    which is used in DBMS for query processing.
TYPES OF INVERTED FILES

Two types,
 Record level inverted index

 Word level inverted index
A SAMPLE DB DESIGN

   All the tables in a            Attributes can be
    database are stored in          dynamically included as
    files and it is loaded          well as deleted. So the
    into memory for                 tuple cannot be a node
    efficient manipulation          with multiple data. Each
    and retrieval. A relation       attributes forms a node.
    contains the set of
    tuples of same
    attributes.
NODE STRUCTURE FOR A DATABASE




      Database   Pointer to   Pointer to
                 Next         Relation
      Name       Database
NODE STRUCTURE FOR A ATTRIBUTE




                     Pointer to
        Value        next attribute
NODE STRUCTURE FOR A RELATION




        Pointer to   No of           Pointer to     Pointer to
Table
        next         attributes in   last attribute first attribute
Name    relation     a tuple         of last tuple of first tuple
NODE STRUCTURE FOR ROW-ID




             Pointer to next   Pointer to first
    Row-ID   Row-ID
                               attribute of the
                               tuple
NODE STRUCTURE FOR A RELATION THAT
POINTS TO ROW-ID




               Pointer to   Pointer    Pointer
       Table
               next         to first   to last
       Name    relation     Row-ID     Row-ID
DATABASE SECURITY

   Database Security - protection from
    malicious attempts to steal (view) or modify
    data.
LEVELS OF DATA SECURITY

 Human level: Corrupt/careless User
 Network/User Interface

 Database application program

 Database system

 Operating System
COMMON SECURITY IN RDBMS

   Authentication
                   User connects to the RDBMS

   Authorization
                   User gets access to the database or database
    schema objects to perform certain actions, based on the set
    of privileges assigned to the user.

   Auditing
                For monitoring suspicious (and otherwise)
    activity.
IDENTIFICATION AND AUTHENTICATION

 The first line of defense is authentication.
 Before accessing RDBMS we must submit
  sufficient information validated either by
  RDBMS itself, or by the operating system
  within which this database is installed.
 Once the identity is authenticated, we may
  proceed with the attempt to access the
  database resources, objects, and data.
AUTHORIZATION AND ACCESS CONTROL
 Once the user is authenticated and granted
 access to the database, RDBMS employs a
 complex, finely grained system of privileges
 (permissions) for the particular database
 objects.
 These privileges include permission to
 access, modify, destroy, or execute relevant
 database objects, as well as add, modify, and
 delete data.
ENCRYPTION


   Encryption provides an additional security
    layer, protecting the data from unauthorized
    viewing. Even if access to the database is
    obtained, it will not be easy to decipher
    encrypted data into a human readable form.
PHYSICAL/OS SECURITY

   Physical level
       Traditional lock-and-key security
       Solution
            Remote backup for disaster recovery
   Operating system level
       Protection from virus/worm attacks critical
SECURITY (CONT.)

     Network level: must use encryption to
      prevent
       Eavesdropping:     unauthorized reading of
        messages
       Masquerading:
          pretending  to be an authorized
           user or legitimate site, or
          sending messages supposedly
           from authorized users
NETWORK SECURITY
   All information must be encrypted to prevent
    eavesdropping
       Public/private key encryption widely used
       Handled by secure http - https://
   Must prevent person-in-the-middle attacks
        Encrypting messages alone doesn’t solve this
         problem
        More on this in next slide
INJECTION ATTACKS




Attacks targeting the database
servers through malicious SQL
queries is collectively known as
injection attacks
THANK U

More Related Content

DOCX
Database Concepts
PPT
Rdbms
PPTX
Database systems - Chapter 1
PPTX
Database model
PPT
Codds12 rules
PPTX
Relational Database Management System part II
PPTX
physical and logical data independence
PDF
Database Concepts
Rdbms
Database systems - Chapter 1
Database model
Codds12 rules
Relational Database Management System part II
physical and logical data independence

What's hot (12)

PDF
Dbms viva questions
PPTX
Dbms logical dependance
PPTX
Chapter 2 DBMS
PPTX
DBMS - Relational Model
PDF
Dn31766773
PPTX
Dbms schema & instance
PPT
Lecture 07 relational database management system
PPTX
PPTX
Data models
PPTX
SQL interview questions by jeetendra mandal - part 4
PPT
Ch1 Introduction
Dbms viva questions
Dbms logical dependance
Chapter 2 DBMS
DBMS - Relational Model
Dn31766773
Dbms schema & instance
Lecture 07 relational database management system
Data models
SQL interview questions by jeetendra mandal - part 4
Ch1 Introduction
Ad

Viewers also liked (13)

PPTX
Object type casting
PPTX
Deque and its applications
PPTX
Ajax
PPT
Ot ppt
PPTX
Inner Classes & Multi Threading in JAVA
PPTX
Ascii adjust & decimal adjust
PPTX
Parsing
PPTX
Comparison of pentium processor with 80386 and 80486
PPTX
MultiMedia dbms
PPTX
8237 dma controller
PPTX
Mobile dbms
PPTX
How to Draw an Effective ER diagram
PPTX
Virtual base class
Object type casting
Deque and its applications
Ajax
Ot ppt
Inner Classes & Multi Threading in JAVA
Ascii adjust & decimal adjust
Parsing
Comparison of pentium processor with 80386 and 80486
MultiMedia dbms
8237 dma controller
Mobile dbms
How to Draw an Effective ER diagram
Virtual base class
Ad

Similar to Db for rdbms (20)

PPTX
Database Management System (DBMS) | Computer Science
PPTX
9 rdbms of digital documentaion of class ix
PDF
Database systems Handbook by Muhammad sharif dba.pdf
PDF
Database systems Handbook by Muhammad Sharif dba.pdf
PDF
Database system Handbook.pdf
PDF
Database system Handbook.pdf
PDF
Database systems Handbook.pdf
PDF
Muhammad Sharif handbook dbms Database systems Handbook.pdf
PDF
Database systems Handbook database systems muhammad sharif.pdf
PDF
Database system Handbook.pdf
PDF
Database systems Handbook.pdf
PDF
Muhammad Sharif Database systems Handbook.pdf
PDF
Database systems Handbook.pdf
PDF
Muhammad Sharif Database systems Handbook.pdf
PDF
Database systems Handbook by Muhammad Sharif.pdf
PDF
Database systems Handbook by Muhammad Sharif.pdf
PDF
Database systems Handbook by Muhammad Sharif.pdf
PDF
Database systems Handbook by Muhammad Sharif.pdf
PDF
Database systems Handbook by Muhammad Sharif.pdf
PDF
Database systems Handbook.pdf
Database Management System (DBMS) | Computer Science
9 rdbms of digital documentaion of class ix
Database systems Handbook by Muhammad sharif dba.pdf
Database systems Handbook by Muhammad Sharif dba.pdf
Database system Handbook.pdf
Database system Handbook.pdf
Database systems Handbook.pdf
Muhammad Sharif handbook dbms Database systems Handbook.pdf
Database systems Handbook database systems muhammad sharif.pdf
Database system Handbook.pdf
Database systems Handbook.pdf
Muhammad Sharif Database systems Handbook.pdf
Database systems Handbook.pdf
Muhammad Sharif Database systems Handbook.pdf
Database systems Handbook by Muhammad Sharif.pdf
Database systems Handbook by Muhammad Sharif.pdf
Database systems Handbook by Muhammad Sharif.pdf
Database systems Handbook by Muhammad Sharif.pdf
Database systems Handbook by Muhammad Sharif.pdf
Database systems Handbook.pdf

More from Tech_MX (20)

PPTX
Uid
PPTX
Theory of estimation
PPTX
Templates in C++
PPT
String & its application
PPTX
Statistical quality__control_2
PPTX
Stack data structure
PPT
Stack Data Structure & It's Application
PPTX
Spss
PPTX
Spanning trees & applications
PPTX
Set data structure 2
PPTX
Set data structure
PPTX
Real time Operating System
PPTX
Mouse interrupts (Assembly Language & C)
PPT
Motherboard of a pc
PPTX
More on Lex
PPTX
Merging files (Data Structure)
PPTX
Memory dbms
PPTX
Linkers
PPTX
Linear regression
PPTX
Keyboard interrupt
Uid
Theory of estimation
Templates in C++
String & its application
Statistical quality__control_2
Stack data structure
Stack Data Structure & It's Application
Spss
Spanning trees & applications
Set data structure 2
Set data structure
Real time Operating System
Mouse interrupts (Assembly Language & C)
Motherboard of a pc
More on Lex
Merging files (Data Structure)
Memory dbms
Linkers
Linear regression
Keyboard interrupt

Recently uploaded (20)

PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Encapsulation_ Review paper, used for researhc scholars
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
A Presentation on Artificial Intelligence
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Encapsulation theory and applications.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Review of recent advances in non-invasive hemoglobin estimation
Encapsulation_ Review paper, used for researhc scholars
The AUB Centre for AI in Media Proposal.docx
A Presentation on Artificial Intelligence
Building Integrated photovoltaic BIPV_UPV.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Chapter 3 Spatial Domain Image Processing.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Encapsulation theory and applications.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Unlocking AI with Model Context Protocol (MCP)
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Understanding_Digital_Forensics_Presentation.pptx
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
NewMind AI Weekly Chronicles - August'25 Week I
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx

Db for rdbms

  • 2. RDBMS A relational database is a database that conforms to relational model theory. The software used to manage relational database is called a relational database management system.
  • 3. RELATION, TUPLE AND ATTRIBUTE  A relation is defined as a set of tuples that have the same attributes.  An attribute is a specification that defines a property of an object.  Collection of related attributes in a relation is a tuple.
  • 4. DATABASE  Database contains one or more relations.  A database is an organized collection of data, today typically in digital form.  Databases are usually too expensive. Thus at any point in time most of their content resides in nonvolatile storage. Even if for operational reason very large portions of them reside in volatile storage.
  • 5.  The content resides in file which is non volatile which cannot be used for efficient retrieval and management.  For efficient retrieval and management, databases may store data in many data structure such as B+ Trees, Hash Tables and Heaps.
  • 6. NOT THE REAL VIEW  This is a relation. This structure is not permanent. All the data are stored only in files, for user convenience a relation is created.
  • 7. INTERNAL OF DB  Linked lists form’s the basis for the internal design of database. The structure of the attributes differ from one to another to link all these we require Heterogeneous Linked Lists. Heterogeneous Linked List is a linked list data- structure that is capable of storing data of different structures. void pointer is basically used in these types of linked list as we are not sure of which type of data needs to be stored. Void pointer is capable of storing pointer to any type as it is a generic pointer type.
  • 8. INVERTED FILE  inverted index (inverted file) is an index data structure storing a mapping from content, such as words or numbers, to its locations in a database file, or in a document or a set of documents. The purpose of an inverted index is to allow fast searches, which is used in DBMS for query processing.
  • 9. TYPES OF INVERTED FILES Two types,  Record level inverted index  Word level inverted index
  • 10. A SAMPLE DB DESIGN  All the tables in a  Attributes can be database are stored in dynamically included as files and it is loaded well as deleted. So the into memory for tuple cannot be a node efficient manipulation with multiple data. Each and retrieval. A relation attributes forms a node. contains the set of tuples of same attributes.
  • 11. NODE STRUCTURE FOR A DATABASE Database Pointer to Pointer to Next Relation Name Database
  • 12. NODE STRUCTURE FOR A ATTRIBUTE Pointer to Value next attribute
  • 13. NODE STRUCTURE FOR A RELATION Pointer to No of Pointer to Pointer to Table next attributes in last attribute first attribute Name relation a tuple of last tuple of first tuple
  • 14. NODE STRUCTURE FOR ROW-ID Pointer to next Pointer to first Row-ID Row-ID attribute of the tuple
  • 15. NODE STRUCTURE FOR A RELATION THAT POINTS TO ROW-ID Pointer to Pointer Pointer Table next to first to last Name relation Row-ID Row-ID
  • 16. DATABASE SECURITY  Database Security - protection from malicious attempts to steal (view) or modify data.
  • 17. LEVELS OF DATA SECURITY  Human level: Corrupt/careless User  Network/User Interface  Database application program  Database system  Operating System
  • 18. COMMON SECURITY IN RDBMS  Authentication User connects to the RDBMS  Authorization User gets access to the database or database schema objects to perform certain actions, based on the set of privileges assigned to the user.  Auditing For monitoring suspicious (and otherwise) activity.
  • 19. IDENTIFICATION AND AUTHENTICATION  The first line of defense is authentication.  Before accessing RDBMS we must submit sufficient information validated either by RDBMS itself, or by the operating system within which this database is installed.  Once the identity is authenticated, we may proceed with the attempt to access the database resources, objects, and data.
  • 20. AUTHORIZATION AND ACCESS CONTROL Once the user is authenticated and granted access to the database, RDBMS employs a complex, finely grained system of privileges (permissions) for the particular database objects. These privileges include permission to access, modify, destroy, or execute relevant database objects, as well as add, modify, and delete data.
  • 21. ENCRYPTION  Encryption provides an additional security layer, protecting the data from unauthorized viewing. Even if access to the database is obtained, it will not be easy to decipher encrypted data into a human readable form.
  • 22. PHYSICAL/OS SECURITY  Physical level  Traditional lock-and-key security  Solution  Remote backup for disaster recovery  Operating system level  Protection from virus/worm attacks critical
  • 23. SECURITY (CONT.)  Network level: must use encryption to prevent  Eavesdropping: unauthorized reading of messages  Masquerading:  pretending to be an authorized user or legitimate site, or  sending messages supposedly from authorized users
  • 24. NETWORK SECURITY  All information must be encrypted to prevent eavesdropping  Public/private key encryption widely used  Handled by secure http - https://  Must prevent person-in-the-middle attacks  Encrypting messages alone doesn’t solve this problem  More on this in next slide
  • 25. INJECTION ATTACKS Attacks targeting the database servers through malicious SQL queries is collectively known as injection attacks