Database system can be defined as the collection of interrelated data. Uses of database system are that it maintains data security , data integrity, data can be easily accessed and shared too.
advantages of database : * data independence ( data and the program are independent , for example if the format of the data has been changed need not to change the file structure WHAT the data is re queried is enough no need to worry about HOW to retrieve the data). * data redundancy can be avoided ( in file for example take two file one is saving file and another is transaction file in both the customer address will be in both file it lead to replication of data his can be avoided in database using normalization (norm 1) * data security (database provide security for accessing of all data) * data integrity (data will be accessed my all user its centralized so accuracy(integrity) will be maintained.. disadvantage; vice versa
Recording
There are a number of functionalities that a database provides. Some of the functionalities that database provide are : security of data, reduced redundancy also ease of accessing data.
By restoring part of the backup
because employees use data in everyday activities to conduct the organization's business, their mistakes represent a serious threat to confidentiality, integrity, and availability of data and even threats from outside.
That is correct, HIPPA provides security that a provider or biller must protect against any reasonably anticipated threats or hazard to the security or integrity of the patient data.
threats to data security may be _____ threats to the database ?
there are more than 5 threats to database security. I mention only 5 of them 1.Excessive Privilege Abuse 2.Privilege Elevation 3.Platform Vulnerabilities 4. SQL Injection 5.Weak Audit Trail
Data integrity and data security
The security policies support a businessÃ?s objectives. It does this mainly by exposing threats like data breaches, out of date software, and hacker threats.
Physical threats are those which impact your body, mind, or solid goods. These would be anything from an unlocked door, to a stalker. Threats to data relate more specifically to informaton--things you cannot directly hold in your hand. These could be anything from a untrustworthy employee in a Social Securiy office, who may steal information about you, to an unprotected computer or server with information about you, which could be hacked.
The two primary types of threats to data security are external threats and internal threats. External threats typically originate from outside the organization, such as hackers, malware, and phishing attacks, aiming to exploit vulnerabilities to gain unauthorized access to data. Internal threats, on the other hand, come from within the organization, often involving employees or contractors who may intentionally or unintentionally compromise data security through negligence or malicious actions. Both types pose significant risks and require robust security measures to mitigate.
Automation of business procedures and automatically maintaining data integrity and consistency are trivial in a modern business environment.
If referential integrity is not enforced, this can lead to data anomalies. For example, if a row in table A contains a foreign key referencing a row in table B, deletion of that table B row would cause an anomaly in table A should RI not be enforced, since it would now be referencing a row that doesn't exist.
To achieve data security and integrity.
integrity