database management Flashcards
criteria for data integtrity
relevance (provides meaningful info)
accuracy (degree to which data measures against true value)
correctness (conforms to approved standard or agrees with logic)
currency (up to date)
completeness (all required essential data is known)
corruption of data
errors in computer data that occur during writing,reading,storage,transmission or processing which introduces unintended changes to og data
hard drive failure
failure of hard drive that stores data results in loss of data or data corruption
RAID 1 (mirroring) + RAID 5 (striping) :provides one or more hard drives in case of failure
backup: used to recover prev version of data
audit trails: identify change to data since corruption (if stored in place separate to faulty drive)
human error
data accidentally deleted or updated incorrectly
minimise edit privileges: only few trusted,experienced users have edit privileges
audit trail: record changes made, who made it and when
data validation: reject data that does not comply with validation rules
power outages
saving data, stopping applications and services process not executed - data loss/corruption
UPS- protects system by providing power
redundant power supply- second power supply will provide power
malware
corrupted data w viruses,ransomware pr users unintentionally download malware
firewall : prevent malware from entering
anti malware: detect malware + take action
education: educate users on network abt social engineering
sql injection
running maliciously intended sql queries to gain access to confidential data or destroy tables
data validation: validate user input to check for possible sql injections
gui components: restrict data input
limit website access to database : remove INSERT,UPDATE,DELETE rights to any website
don’t send db error messages to clients web browser: can be used to understand db structure and adapt their sql injection
outdated data
affects currency
add new records
change existing records
deleting records no longer needed
invalid data
can be exposed + corrected using validation checks required by scenario w gui components, exception handling and if statements to apply validation rules
file synchronisation
done through internet connectivity
having same data on more than 1 device using the same internet credentials
file synchronisation
done through internet connectivity
having same data on more than 1 device using the same internet credentials
SQL
Structured query language
programming language to perform CRUD (create,read,update,delete) operations on a relational database
w data structured into tables linked by primary and foreign keys
relationsl/SQL databases are not flexible, schema (tables) must be designed before data can be added
database schema
table design
highly structured and not flexible
column cannot be added or table deleted w/o altering schema
if deleted- may violate referential integrity
database schema
table design
highly structured and not flexible
column cannot be added or table deleted w/o altering schema
if deleted- may violate referential integrity
NoSQL
unstructured, flexible
store data in documents
ideal for storing massive amounts of unstructured data without predefined schema
can adapt to changing data
Types : Document NoSQL db- fileholder that collects data of many diff types
Key-Value NoSQL database
uses JSON files with key-value pairs