Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Introduction
We will be talking about...
● Security and control of organization
databases.
● The term database is used in a broad context to
include two general approaches:
1.Flat-file model
2.Database model
Introduction
We will be talking about...
● Common database models
1.Hierarchical
2.Network
3.Relational
● Role of database technology in the distributed
environment.
● Control and audit issues related to data
management.
Data Management Approach
1.The flat-file approach
2.The database approach
Data Management Approach
1.The flat-file approach
Flat files are data files that contain
records with no structured relationships
to other files.
The flat-file environment promotes a
single-user view approach to data
management whereby end users own
their data files rather than share them
with other users.
Data Management Approach
1.The flat-file approach
Data files are therefore structured,
formatted, and arranged to suit the
specific needs of the owner or primary
user of the data.
Such structuring, however, may exclude
data attributes that are useful to other
users, thus preventing successful
integration of data across the
organization.
Data Management Approach
1.The flat-file approach
When multiple users need the same data
for different purposes, they must obtain
separate data sets structured to their
specific needs.
This replication of essentially the same
data in multiple files is called data
redundancy.
Data Management Approach
1.The flat-file approach (problems)
Data Storage – to meet the needs of diverse
users, costs of multiple storage procedures
must be incurred.
Data Updating - any changes or additions
must be performed multiple times.
Currency of Information – has the potential
problem of failing to update all affected
files.
Task-Data Dependency - user unable to
obtain additional information as his or her
needs change.
Data Management Approach
2.The database approach
Access to the data resource is controlled
by a database management system
(DBMS).
The DBMS stands between the user and
the database per se.
Data Management Approach
2.The database approach
Thus, commercial DBMS’s (e.g., Access
or Oracle) actually consist of a database
plus software to manage the database,
especially controlling access and other
internal controls software to generate
reports, create data-entry forms, etc.
The DBMS is a special software system
that is programmed to know which data
elements each user is authorized to
access.
Data Management Approach
2.The database approach
Centralizes the organization's data into a
common database that is shared by
other users.
Data Management Approach
2.The database approach (advantages)
No data redundancy: Data is stored only once,
eliminating data redundancy and reducing
storage costs.
Single update: Because data is in only one place,
it requires only a single update, reducing the
time and cost of keeping the database current.
Current values: A change to the database made
by any user yields current data values for all
other users.
Task-data independence: As users’ information
needs expand, the new needs can be more
easily satisfied than under the flat-file.
Elements of the Database Environment
Elements of the Database Environment
2.Users
Users may access the database through a
formal application interfaces (formal
access). User programs, prepared by
systems professionals, send data access
requests (calls) to the DBMS, which
validates the requests and retrieves the
data for processing.
Elements of the Database Environment
2.Users
Users may use data manipulation
language (DML), which is the proprietary
programming language that a particular
DBMS uses to retrieve, process, and store
data (e.g., insert, update, delete).
Entire user programs may be written in the
DML, or, alternatively, selected DML
commands can be inserted into programs
that are written in universal languages such
as Java, C++, and PHP.
Database Manipulation Language
Database Manipulation Language
Elements of the Database Environment
2.Users
Users may access a database through the
informal method of queries (informal
access).
A query is an ad hoc access methodology
for extracting information from a database.
Users can access data via direct query,
which requires no formal user programs
using the DBMS's built-in query facility.
Elements of the Database Environment
2.Users
Users may use Structured Query
Language (SQL) to access and
manipulate databases. SQL has emerged
as the standard query language for both
mainframe and microcomputer DBMSs.
Can be an internal control issue since users
may be making an ‘end run’ around the
controls built into the conventional
programs.
Elements of the Database Environment
2.Users
SQL is a fourth-generation, nonprocedural
language (English-like commands) with
many commands that allow users to input,
retrieve, and modify data easily.
The SELECT command is a powerful tool for
retrieving data.
SQL Select Command
Elements of the Database Environment
5.DBMS Models
A data model is an abstract representation
of the data about entities. The purpose of
the data model is to represent entity
attributes in a way that is understandable to
users. Each DBMS is based on a particular
conceptual model.
Three common models are:
a)Hierarchical
b)Network
c)Relational
Elements of the Database Environment
5.DBMS Models
Database terminology
● Data Attribute/ Field: a single item of
data
● Entity: database representation of an
individual resource, event, or agent
about which we choose to collect data
● Record Type: table or file
5.DBMS Models
Association
● Represented by a line connecting two entities
● May be described by a verb, such as ships,
requests, or receives
Cardinality – the degree of association between two
entities
● The number of possible occurrences in one
table that are associated with a single
occurrence in a related table
● Used to determine primary keys and foreign
keys
Elements of the Database Environment
5.DBMS Models
The relational model
Portrays data in the form of two-
dimensional tables.
Across the top of the table are
attributes (data fields) forming
columns. Intersecting the columns
to form rows in the table are tuples.
Each row in the table must be unique
in at least one attribute (the
primary key).
Databases in a Distributed Environment