T 2.39 Complexity of a DBMS

When planning the implementation of a database management system (DBMS), the requirements placed on the selection, configuration, operation, and possible future extension of the planned system must be specified.

The selection and use of a standard database software package requires careful planning, installation, and configuration of the database management system (DBMS) to guarantee trouble-free use. The wide range of potential threats posed will be illustrated in the following examples.

Selection of an unsuitable standard database software package

Faulty installation or configuration of the standard database software package

The recommended security safeguards are implemented incorrectly or incompletely, or are not implemented at all.

Examples:

The control files of a database system are not mirrored or the mirrored control files are not stored on a different hard disk. A hard disk crash in this case will most likely result in the destruction of the database.

Faulty database concept

In the database concept, the relationships between the tables are shown in addition to the individual tables and their columns and keys.

An element in a table may be related to one or more elements in another table, or to none of the elements in any of the other tables. These relationships lead to restrictions that need to be maintained when executing delete, update, or insert operations to maintain the integrity of the database.

Example:

In the database, such a relation is shown in an additional table that contains keys for each element in the relation (for the resident/place of residence relation in the example) that refer to the corresponding records in the individual tables. If a record is deleted from the table of residents or the table of places of residence, then there must not be any more references to this record in the table used to associate the residents to the places of residence. Such conditions can be defined in the database itself, using conditions in program statements, or using automatic procedures.

The interaction of such constructions can lead to cascading database operations, but such operations are limited in various DBMSs using various restrictions.

Missing relations between individual tables can lead to a loss of the referential database integrity when this functionality is not implemented in the application.

Examples: