Alvin W. Demore II
University of Maryland University College
Abstract
In this document we will be learning what reliability and integrity to databases and how company’s uses this technique to make sure that their company is strong and safe. Reliability plays a big part in databases because you need to make sure that everything can work without failing or crashing the system. The next big part is integrity because if you don’t have security in the databases then anyone can look at your company records or worst cases scenario a hacker can take all company money and they won’t even know. So this is why these two techniques go hand to hand and why every company that has a database always uses reliability and integrity.Introduction
Reliability and integrity are very important when using databases it is also important that the databases security is good too. This when reliability and integrity comes in to play; reliability is the measure of the success with the system conforms to some authoritative specification of its behavior. When behavior deviates from that when specified is then called a failure. Now integrity when the database as a whole is protected against damage, as from the failure of a disk drive or the corruption of the master database index. Another sign of integrity is called “Element Integrity” this means the value of a specific data element is written or changed only authorized users.
Data Integrity Data integrity ensures that all data within the database adhere to the guidelines or structure of the database. Each record in your database should have a unique identifier, such as a specific constituent number. (Peltier, (2002) Data integrity also refers to data being accurate and consistent. As with referential integrity, to achieve accuracy and consistency, certain rules must be built into a database. Now to keeps this safe data integrity has different methods to ensure security to
References: Layton, T. P. (2007). Information Security: Design, Implementation, Measurement, and Compliance. Peltier, T. R. ( (2002)). Information Security Policies, Procedures, and Standards: guidelines for effective information security management. Boca Raton, FL. Pfleeger, C. a. (2007). Secuirty in Computing. Prentice Hall. White, G. (2003). All-in-one Security+ Certification Exam Guide. Emeryville, CA: McGraw-Hill/Osborne.