Você está na página 1de 22

Chapter 2

Database Management System


DBMS: a collection of general-purpose, application-
independent programs
providing services to
define the structure of a database, i.e., data types
and constraints that the data will have to satisfy
manage the storage of data, safely for long
periods of time, on some storage medium controled
by the DBMS
manipulate a database, with efficient user
interfaces to query the database to retrieve specific
data, update the database to reflect changes in the
world, generate reports from the data.
manage database usage: users with their
access rights, performance optimization,
sharing of data among several users, security
from accidents or
unauthorized use
monitor and analyze database usage
Example of Database
Important Functions on a Database
Structure definition: declare 5 files or relations + data types, e.g.
Student(StudName, StudentNo, Class, Dept)
Population: input data about specific students, courses,
prerequisites
Querying
Which are the prerequisites of the Database course ?
List students who got grade 14 or 16 for the Database course in
1993
Reporting: prepare diplomas, with standard text, interspersed with
name of student, courses taken, name of degree, grades, etc.
Modification, update of population
Create a new session for the Database course
Enter a grade 16 for Smith in the Database Session
Modification of structure, of schema
Create a new relation for instructors
Add Address attribute to relation Student
e-business security
Lock
Safe

Physical barriers Security forces

Seal

Fingerprint

Contract
Signature
Confidentiality
Authentication
Ability to verify the identity of
people/organizations
Data/Message Integrity
Ensuring communications were not modified in
transit/storage
Nonrepudiation
Parties cannot deny a communication. Proof
that the sender sent and proof that the receiver
received
Hasing
Another use of one way functions!
You can start from the same data and get the
same result, but it is nearly impossible to work
backwards
A hash forms a message digest of the data.
A smaller version
However, the values for the one way hash
function are not secret
Hasing Example
We could choose an algorithm Sum (mod
12)
123 222 143 212 (four 8 bit characters)
Sum = 700, mod 12 4
4 is the hash (or checksum)
message Hashing A value
Sender algorithm say X

message

X=Hash Value
message

Hashing
Y
message algorithm

Receiver X
If X = Y, message
X sent and received
are the same.
What kinds of security questions
arise?
From the users perspective
How can the user be sure that the Web
server is owned and operated by a
legitimate company?
How does the user know that the Web page
and form do not contain some malicious or
dangerous code or content?
How does the user know that the owner of
the Web site will not distribute the
information the user provides to some other
party?
From the companys perspective
How does the company know the user will
not attempt to break into the Web server or
alter the pages and content at the site?
How does the company know that the user
will not try to disrupt the server so that it is
not available to others?
From both parties perspectives
How do both parties know that the network
connection is free from eavesdropping by a third
Party on the line?
How do they know that the information sent back-
And forth between the server and the users
browserhas not been altered?
Threats and Attacks
virus
A piece of software code that inserts itself into
a host, including the operating systems, in order
to propagate; it requires that its host program
run to activate it

worm
A software program that runs independently,
consuming the resources of its host in order to
maintain itself, that is capable of propagating a
complete working version of itself onto another
machine
Online Payment Technology

Online payment refers to money that is


exchanged electronically. Typically, this
involves use of computer networks,
the internet and digital stored value systems
Types of Online Payments
1. Electronic Clearing System (ECS):
It transfers fund from one bank to another
bank via clearing house.
Clearing House: It is an agency or separate
corporation of a futures exchange responsible
for settling trading accounts, clearing trades,
collecting and maintaining margin monies,
regulating delivery, and reporting trading
data.
Types of ECS:
a) ECS Credit: It is ECS on Credit.
b) ECS Debit: It is ECS on Debit.
2. Electronic funds transfer (EFT):
It is the electronic transfer of money from
one bank account to another, either within a
single financial institution or across multiple
institutions, via computer-based systems,
without the direct intervention of bank staff.
3. E-Wallet
Electronic wallet, serves as one of the easiest
payment solutions and frankly one of the most
popular payment method. The idea behind it is
that service providers create virtual accounts that
can be loaded as pleased (like a pre-paid cell
phone). Finally, a customer can use this e-wallet's
virtual money to pay in every online store that
accepts such a payment method. Our service
providers role is to actually take the e-wallets
funds and transfer them to the web store's
account.
4. Cryptocurrency
A cryptocurrency (or crypto currency) is a digital
asset designed to work as a medium of exchange
using cryptography to secure the transactions
and to control the creation of additional units of
the currency. Cryptocurrencies are classified as a
subset of digital currencies and are also classified
as a subset of alternative currencies and virtual
currencies.
First Crypto Currency
BitCoin (BTC)
Satoshi Nakamoto invented it on 2009.

Você também pode gostar