Download Data administration

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Expense and cost recovery system (ECRS) wikipedia , lookup

Data Protection Act, 2012 wikipedia , lookup

Entity–attribute–value model wikipedia , lookup

Computer security wikipedia , lookup

Data center wikipedia , lookup

Data model wikipedia , lookup

Data analysis wikipedia , lookup

Versant Object Database wikipedia , lookup

Concurrency control wikipedia , lookup

Relational model wikipedia , lookup

3D optical data storage wikipedia , lookup

Data vault modeling wikipedia , lookup

Information privacy law wikipedia , lookup

Database wikipedia , lookup

Business intelligence wikipedia , lookup

Open data in the United Kingdom wikipedia , lookup

Clusterpoint wikipedia , lookup

Database model wikipedia , lookup

Transcript
Data and database
administration
KAROLINA MUSZYŃSKA
Based on: Hoffer J. A., Ramesh V., Topi H. (2011): Modern Database Management
(10th ed.). Prentice-Hall, Inc.
Agenda

Introduction

Traditional Data Administration

Traditional Database Administration

Trends in Database Administration

Threats to Data Security

Establishing client/server security
Introduction

Data and database administration activities have been developed
to help achieve organizations’ goals for the effective management
of data.

Good management of data involves managing data quality as well
as data security and availability.

Failure to take the proper steps in data and database administration
can greatly reduce an organization’s ability to operate effectively
and may even result in its going out of business.
Traditional data administration

Data administration is a high-level function that is responsible for the
overall management of data resources in an organization, including
maintaining corporate-wide data definitions and standards.

The data administrator must be a highly skilled manager capable of
eliciting the cooperation of users and resolving differences that
normally arise when significant change is introduced into an
organization. The data administrator should be a respected, seniorlevel manager selected from within the organization, rather than a
technical computer expert or a new individual hired for the position.
However he must have sufficient technical skills to interact
effectively with technical staff members such as database
administrators, system administrators, and programmers.
Core roles of traditional data
administration

Establishment and enforcement of data policies, procedures, and
standards for data protection and security

Planning of the organization’s information structure

Data conflict resolution, especially in terms of data ownership

Managing the information repository, which contains the metadata
and data processing resources

Internal marketing regarding the importance of following
established procedures and policies
Traditional Database Administration

Database administration is a technical function responsible for logical
and physical database design and for dealing with technical issues,
such as security enforcement, database performance, backup and
recovery, and database availability.

A database administrator must understand the data models built by
data administration and be capable of transforming them into efficient
and appropriate logical and physical database designs. He is
responsible for implementing the standards and procedures established
by the data administrator, including enforcing programming standards,
data standards, policies, and procedures.

Database administrator must have understanding of: current hardware
and software (operating system and networking) architectures and
capabilities, data processing, database development life cycle, design
and data modeling skills, managerial skills.
Core roles of traditional database
administration

Analyzing and designing the database – definition and creation of the
data dictionary repository

Selecting DBMS and related software tools – selection of hardware and
software

Installing and upgrading the DBMS – plus creating and maintaining users
accounts

Tuning database performance by modifying the database design,
rebuilding or reorganizing it

Improving database query processing performance by adding or
deleting indexes, relocating data, etc.

Managing data security, privacy, and integrity

Performing data backup and recovery
Trends in Database Administration

Increased use of procedural logic
Features such as triggers, stored procedures, and persistent stored modules provide the
ability to define business rules to the DBMS rather than in separate application programs.
Once developers begin to rely on the use of these objects, a database administrator
must address the issues of quality, maintainability, performance, and availability.

Proliferation of e-business applications
When a business goes online, database administrator must be capable of managing
applications and databases that are Internet enabled. Major priorities in this environment
include high data availability, integration of legacy data with Web-based applications,
tracking of Web activity, and performance engineering for the Internet.

Increase use of smartphones
A small amount of critical data is typically stored on a smartphone (personal database),
which then is periodically synchronized with data stored on the enterprise data servers.
Database administrator must know how to design these personal databases and how to
manage data synchronization from hundreds or thousands of such smartphones while
maintaining the data integrity and data availability requirements of the enterprise.
Managing Data Security

The goal of database security is to protect data from accidental or
intentional threats to their integrity and access.

Access to data has become more open through the Internet and
corporate intranets and from mobile computing devices. As a result,
managing data security effectively has become more difficult and
time-consuming.

Threats to data security may be direct threats to the database.

Focusing on database security alone will not ensure a secure
database. All parts of the system must be secure, including the
database, the network, the operating system, the building(s) in
which the database resides physically, and the personnel who have
any opportunity to access the system.
Threats to Data Security

Accidental losses, including human error, software, and hardwarecaused breaches

Theft and fraud – this requires taking care of physical security, using
firewalls

Loss of privacy or confidentiality – the first one meaning loss of
protection of data about individuals, the other one meaning loss of
protection of critical organizational data

Loss of data integrity – means that data is invalid and corrupted

Loss of availability – caused mainly by viruses, requires installing upto-date antivirus software
Establishing Client/Server Security
Database security is only as good as the security of the whole computing
environment. Physical security, logical security, and change control security must
be established across all components of the client/server environment, including
the servers, the client workstations, the network and its related components, and
the users.

Server security - logical access controls, including server and administrator
passwords, possibilities of the administrator to limit each user’s access and
activity permissions to tables within the database

Network security - encryption of data is an important part of network security,
also authentication of the client workstation that is attempting to access the
server

Application Security Issues in Three-Tier Client/Server Environments - in a threetier environment, the dynamic creation of a Web page from a database
requires access to the database, and if the database is not properly protected,
it is vulnerable to inappropriate access by any user. Establishing adequate
server security is critical to protecting the data. Access to data can also be
controlled through user-authentication security.