Introduction to Computer Science and Programming: Database systems and Cloud Computing.
Size: 250.21 KB
Language: en
Added: Sep 14, 2024
Slides: 34 pages
Slide Content
Database systems and Cloud computing Introduction to computer science and programming
What is a Database? 2 A collection of stored operational data used by the application systems of some particular enterprise .
What is a Database? 3 Enterprise generic term for any reasonably large-scale commercial, scientific, technical, or other application manufacturing financial medical university government
What is a Database? 4 Operational data data maintained about the operation of an enterprise products accounts patients students plans DOES NOT include input/output data
What is a DBMS? 5 A Database Management System (DBMS) a collection of programs that enables users to create and maintain a database a general-purpose software system that facilitates the processes for databases of Defining Constructing Manipulating Sharing
Defining a Database 6 For the data being stored in the database, defining the database specifies: the data types the structures the constraints
Constructing a Database 7 Is the process of storing the data itself on some storage device The storage device is controlled by a DBMS
Manipulating a Database 8 Includes functions that retrieve specific information in a query update the database to include changes generate reports from the data
Sharing a Database 9 Allows multiple users and programs to access the database at the same time Any conflicts between applications are handled by the DBMS Other important functions provided by a DBMS include Protection System protection Security protection
Advantages of a Database 10 Controlled redundancy Reduced inconsistency in the data Shared access to data Standards enforced Security restrictions maintained Easy to maintain data Integrity Providing Backup and recovery
Disadvantages of a Database 11 Increased complexity in concurrency control Increased complexity in centralized access control Security needed to allow the sharing of data Needed redundancies cause updating complexities
Database security
Every company needs places to store institutional knowledge and data. Frequently that data contains proprietary information Personally Identifiable Data Employee HR Data Financial Data The security and confidentiality of this data is of critical importance.
Definition Database Security is the mechanism that protect the database against intentional or accidental threats. We consider database security in relation to the following situations: Theft and Fraud Loss of confidentiality Loss of privacy Loss of integrity Loss of availability Threat is any intentional or accidental event that may adversely affect the system
There are 3 key issues in the security of databases just as with all security systems Availability Integrity Confidentiality
Data needs to be available at all necessary times Data needs to be available to only the appropriate users Need to be able to track who has access to and who has accessed what data
Need to verify that any external data has the correct formatting and other metadata Need to verify that all input data is accurate and verifiable Need to ensure that data is following the correct work flow rules for your institution/corporation Need to be able to report on all data changes and who authored them to ensure compliance with corporate rules and privacy laws.
Need to ensure that confidential data is only available to correct people Need to ensure that entire database is secure from external and internal system breaches Need to provide for reporting on who has accessed what data and what they have done with it Mission critical and Legal sensitive data must be highly secured at the potential risk of lost business and litigation
Threats Examples of threats: - Using another person’s log-in name to access data - Unauthorized copying of data - Program/Data alteration - Illegal entry by hacker - Viruses - Etc.
Cloud computing As a solution for companies Cloud computing has already made huge waves in the technology industry. Consumer cloud services such as iCloud, Google Drive and Dropbox have changed the way people think about digital content and how to use it. In the enterprise sector, cloud deployment is increasingly the preferred option, no longer the niche use case.
What do we mean by Cloud Computing? “Cloud Computing is a model for ubiquitous, convenient, on-demand network access to a shared pool of configurable resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.” National Institute of Standards and Technology (NIST)
Categories of cloud computing services Software as a Service(SaaS) Platform as a Service(PaaS) Infrastructure as a Service(IaaS)
SaaS Software offered by a third party provider Available on demand usually via the internet Configurable remotely Examples include word processing and spreadsheet tool, CRM tools, Google docs etc
PaaS Allows customers to develop new applications using APIs deployed and configurable remotely. Platforms offered include development tools and deployment platforms. e.g Microsoft Azure
IaaS A highly scaled redundant and shared computing infrastructure accessible using internet technologies. Consists of servers, storage , security , databases and other peripherals.
Cloud Computing: who should use it? If the security of ‘your’ organisation is weak, missing features or below average. You cant afford to buy high end servers.
If cloud computing is so great, why isn’t everyone doing it? The cloud acts as a big black box, nothing inside the cloud is visible to the clients Clients have no idea or control over what happens inside a cloud Even if the cloud provider is honest, it can have malicious system administrators who can tamper with the (virtual machine)VMs and violate confidentiality and integrity Clouds are still subject to traditional data confidentiality, integrity, availability, and privacy issues, plus some additional attacks
Causes of Problems Associated with Cloud Computing Most security problems stem from: Loss of control Lack of trust (mechanisms) Multi-tenancy These problems exist mainly in 3 rd party management models Self-managed clouds still have security issues, but not related to above
Loss of Control in the Cloud Consumer’s loss of control Data, applications, resources are located with provider User identity management is handled by the cloud User access control rules, security policies and enforcement are managed by the cloud provider Consumer relies on provider to ensure Data security and privacy Resource availability Monitoring and repairing of services/resources
Lack of Trust in the Cloud Trusting a third party requires taking risks Defining trust and risk Opposite sides of the same coin People only trust when it pays Need for trust arises only in risky situations
Multi-tenancy Issues in the Cloud Conflict between tenants’ opposing goals Tenants share a pool of resources and have opposing goals Cloud Computing brings new threats Multiple independent users share the same physical infrastructure Thus an attacker can legitimately be in the same physical machine as the target