* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download DA & DBA lecture
Survey
Document related concepts
Transcript
COIS20026 Database Development & Management Week 10 – Data Administration Data Administration Objectives: discuss the difference between data administration and database administration describe the areas of responsibility of the data administrator within an organisation describe the areas of responsibility of a database administrator 2 Objectives (cont’d) list & describe threats to data security list & briefly describe the most important security features of data management software (eg views, encryption, authentication etc) 3 The Importance of Data Most of us will by now have recognised the importance of data to any organisation asset and resource needs to be competently & carefully managed technology has made effective data management achievable effective data administration can assist enormously in decision making 4 Ineffective Data Administration Poor data administration is characterised by:(see text p 484) multiple definitions of the same data entity and/or inconsistent representations of same data elements in separate databases missing key data elements low data quality levels inadequate familiarity with existing data 5 Data & database administration Many organisations use a data administrator and/or a database administrator to manage these problems. The data administrator takes responsibility for the overall management of data resources. The database administrator deals with the physical and technical issues of data management. 6 Data Administrator A data administrator is a high-level function that is responsible for the overall management of data resources in an organisation, including the maintenance of definitions and standards Must develop procedures & policy to protect organisation’s data resources 7 Data Administrator Duties of a data administrator typically include: establishment of data policies, procedures & standards to protect & control data resources planning information architecture that will meet an organisation’s diverse information needs resolution of data ownership conflicts when data is shared 8 Data Administrator Duties of a data administrator (cont’d): management of the information repositories internal marketing of importance of adherence to procedures & policies 9 Data Administrator (cont’d) Data administrator skills must include: be able to interact with top-level management, users & computing specialists be a highly skilled manager with good negotiation, conflict resolution and persuasion skills have a sufficient level of technical skills to interact with technical staff 10 Database Administration Database administration is a technical function that is responsible for physical database design and for dealing with technical issues such as security enforcement, database performance, backup & recovery. DBA implements standards and procedures developed by the DA 11 Database Administration Database administration involves : Selecting DBMS and related software Installing & upgrading DBMS Tuning database & query performance physical database design & implementation enforcement of security & integrity standards established by data administrator Data backup & recovery 12 Database Administrator Database administrator skills should include: Good data modelling skills Strong logical and physical design skills Strong technical knowledge of hardware, software, networking etc understanding of database development lifecycle 13 Database Administrator (cont’d) thorough understanding of data processing Good managerial skills since the DBA must manage other IS personnel 14 DA versus DBA The roles of DA and DBA aren’t always distinct essentially it could be said that the role of DA is more management oriented & role of DBA is more technically oriented many organisations may not be able to employ both a DA and a DBA, in which case the DBA is usually responsible for all the activities 15 DA versus DBA (cont’d) Organisations will also differ in allocations of responsibilities between DA & DBA today’s environment requires more rapid development & deployment of databases new databases more likely to be departmental & client/server prototyping often used in development blending of data administration & database administration (see figure 12-1 life-cycle phase functions & functions typically performed by DA & DBA) 16 Database Security Hoffer et al (2007,p 495) define database security as: ‘protection of the data against accidental or intentional loss, destruction or misuse’ Since data is vital to any organisation, it is important to ensure that it is protected 17 Data Security Threats Security policies & procedures need to be established, implemented & enforced to deal with possible data security threats Threats to data security can include accidental losses including human error, software & hardware breaches theft & fraud - usually by electronic access 18 Data Security Threats (cont’d) loss of privacy or confidentiality loss of data integrity loss of availability Data management software (incorporated in DBMS) provides security features that assist in reducing/minimising threats 19 Data Management Software Security Features Features include: views or subschemas authorisation rules to identify users & restrict actions that can be taken user-defined procedures - provide additional constraints or limitations encryption authentication schemes backup, journaling & checkpointing capabilities (covered in week 9) 20 Security – Views Views can provide some security by presenting only data which user requires user can be granted right to access view but not underlying base table not really considered to be a truly adequate security measure since unauthorised users may gain access to the view & experimentation may provide access to data 21 Security – Authorisation Rules Authorisation rules incorporated in data management system can restrict access to data and actions that can be taken by user figure 12-5 of the text illustrates the ways in which most current DBMS implement authorisation rules Does MS Access have this feature? 22 Security – User-defined Procedures Provision for creation of user-defined security procedures by system designers/user in addition to authorisation rules not offered by all DBMS products 23 Security – Encryption The process of encoding data so that it cannot be read a routine provided by the DBMS (some allow user defined routines) needs to be complemented by a decoding routine - care must be taken to secure this also 24 Security – Authentication Schemes Used to positively identify a person attempting to gain access to computer or resources: passwords have been used for quite a long time - not really good at identifying the individual person biometric devices are showing some promise of specifically identifying the individual attempting access (eg. Acer has released a laptop computer that uses fingerprint identification) 25 Summary Today we have: distinguished between data administration and database administration explored the areas of responsibility of the data administrator versus the database administrator 26 Summary (cont’d) explored possible threats to data security identified the most important security features of data management software 27