260 likes | 418 Views
Learn the basics of databases, Oracle programming, and database security in this course. Understand database management systems and the roles within a database environment.
E N D
CS 3630 Database Design and Implementation Dr. Qi Yang 213 Ullrich My Home Page: http://people.uwplatt.edu/~yangq/
Course Materials in Canvas • Syllabus • Notes • Assignments • Schedule • . . .
CS 3630 Database Design and Implementation Prerequisites: CS 2430 and MATH1630 or MATH 2730 Oracle Programming Not a programming course Basic theory and concepts Required for CS and SE
Course Work • Assignments (10 * 10) 100 • Quizzes (4 * 25) 100 • Tests (2 * 60) 120 • Project 80 • Final 100 • Total 500
Grading Grade Total PointsPercentage Grade Points A 460 - 500 92% 4.0 A - 445 - 459 89% 3.7 B + 435 - 444 87% 3.3 B 410 - 434 82% 3.0 B - 395 - 409 79% 2.7 C + 385 - 394 77% 2.3 C 360 - 384 72% 2.0 C - 345 - 359 69% 1.7 D + 335 - 344 67% 1.3 D 300 - 334 60% 1.0 F Below 300 0.0
Final Exam • Group #10 • Thursday, May 16 • 7:00 – 8:50 PM
Notes • Attend class • Class pace could be too slow or too fast to you • Check UWP email • Academic misconduct • The right to miss class for religious observances • Disability
Any Questions? Let me know when you have any issues!
What is a computer? Network CPU Output Input MEMORY Storage
File Systems Files Users Programs
Issues in File Systems • Program-Data Dependence Physical structure is defined in application code • Separation and Isolation of Data Information is stored in separate files • Duplication of Data and Data Inconsistency The same data may be stored in different departments
Issues in File Systems • Fixed Queries New queries requires new/modified programs • Access Control and Security Who can and cannot access files, fields… Access different portions of a file • Recovery • …
Database Systems DBMS: Database Management system D B M S Files Users Programs
Advantages of Databases • Data Independence • Physical structure is unknown to application code • Data Relationship • Primary key and Foreign key • Limited Duplication of Data and Data Consistency • Query Processing • Access Control • Security • Recovery
Disadvantages of Databases • Complexity • Cost • Performance • Higher Impact of Failure
Database:Underlying Framework of CIS • Most IS are based on databases • Fundamentally changed the way many organizations operate • Business without database?
Databases:Important and Successful Development in Software Engineering • Query Processing • Access Control • Transactions • Distributed computing • Networking • …
Roles in Database Environment (People) • DA (Data Administrator) • DBA (Database Administrator) • Database Designers • Application Developers • End-Users
Database Management Systems • First generation Hierarchical Network • Second generation Relational • Third generation OODB GIS Fuzzy DB … • Post-Relational Google’s BigTable Amazon's Dynamo
Database Security The mechanisms to protect the database against unauthorized access, either intentional or accidental.
Threats to Database Systems Any event or situation , whether intentional or accidental, that may adversely affect a database system and consequently the organization.
Threats to Database Systems • Using another person’s means of access • Inadequate policies and procedures that allow a mix of confidential and normal output • Giving greater access than normal • Inadequate staff training • Viewing or disclosing unauthorized data • Fire (electrical fault, lighting strike, arson) • . . .
Database Security: Related Issues • Theft and fraud • Loss of confidentiality • Loss of privacy • Loss of integrity • Loss of availability
Database Security • DA • DBA
Highest Academic Award in Computer Science? • Turing Award • Nobel Prize of Computing • http://en.wikipedia.org/wiki/Turing_Award • 1981: Dr. E.F. Codd Relational Database Model
What is a computer? Turing Machine Network CPU Output Input MEMORY Storage