Data and database administration

Slides:



Advertisements
Similar presentations
Database Administration and Security Transparencies 1.
Advertisements

Prentice Hall, Database Systems Week 1 Introduction By Zekrullah Popal.
© Prentice Hall CHAPTER 14 Managing Technological Resources.
IS 4420 Database Fundamentals Chapter 12: Data and Database Administration Leon Chen.
Concepts of Database Management Seventh Edition
Factors to be taken into account when designing ICT Security Policies
Oracle Database Administration. Rana Almurshed 2 course objective After completing this course you should be able to: install, create and administrate.
Chapter 1 Introduction to Databases
Database Administration Chapter 16. Need for Databases  Data is used by different people, in different departments, for different reasons  Interpretation.
Business Intelligence: Data and Text Management Instructor: Bajuna Salehe Web:
10/5/1999Database Management -- R. Larson Data Administration and Database Administration University of California, Berkeley School of Information Management.
Data and Database Administration CISB514 Advanced Database  At the end of this chapter, you should be able to:  Define terms related to data & dbase.
Database Systems: Design, Implementation, and Management Ninth Edition
Chapter 1 Database Systems. Good decisions require good information derived from raw facts Data is managed most efficiently when stored in a database.
Data and Database Administration CISB344 Database 2  At the end of this chapter, you should be able to:  Define terms related to data & database administration.
IT – DBMS Concepts Relational Database Theory.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
© Pearson Education Limited, Chapter 5 Database Administration and Security Transparencies.
Data and Database Administration
© 2013 Pearson Education, Inc. Publishing as Prentice Hall 1 CHAPTER 11: DATA AND DATABASE ADMINISTRATION Modern Database Management 11 th Edition Jeffrey.
CHAPTER 1: THE DATABASE ENVIRONMENT AND DEVELOPMENT PROCESS Modern Database Management 11 th Edition Jeffrey A. Hoffer, V. Ramesh, Heikki Topi © 2013 Pearson.
Data Administration & Database Administration
Concepts of Database Management Sixth Edition
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
Concepts of Database Management, Fifth Edition Chapter 8: Database Administration.
DATABASE UTILITIES. D ATABASE S YSTEM U TILITIES In addition to possessing the software modules most DBMSs have database utilities that help the DBA in.
AL-MAAREFA COLLEGE FOR SCIENCE AND TECHNOLOGY INFO 232: DATABASE SYSTEMS CHAPTER 1 DATABASE SYSTEMS (Cont’d) Instructor Ms. Arwa Binsaleh.
Concepts of Database Management Eighth Edition
Patient Data Security and Privacy Lecture # 7 PHCL 498 Amar Hijazi, Majed Alameel, Mona AlMehaid.
Database Administration
© 2009 Pearson Education, Inc. Publishing as Prentice Hall 1 Chapter 1: The Database Environment Modern Database Management 9 th Edition Jeffrey A. Hoffer,
D ATABASE A DMINISTRATION L ECTURE N O 3 Muhammad Abrar.
Database Design and Management CPTG /23/2015Chapter 12 of 38 Functions of a Database Store data Store data School: student records, class schedules,
DA vs. DBA The University of California Berkeley Extension Copyright © 2011 Patrick McDermott.
Database Administration
ORGANIZING IT SERVICES AND PERSONNEL (PART 1) Lecture 7.
MBA 664 Database Management Dave Salisbury ( )
TM 13-1 Copyright © 1999 Addison Wesley Longman, Inc. Data and Database Administration.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 15 Database Administration and Security.
Features Of SQL Server 2000: 1. Internet Integration: SQL Server 2000 works with other products to form a stable and secure data store for internet and.
Chapter 1 © 2013 Pearson Education, Inc. Publishing as Prentice Hall Chapter 1: The Database Environment and Development Process Modern Database Management.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 1 Database Systems.
1 Data and Database Administration Data and Database Administration By Lec. Adeel Shahzad FromBook-B.
TEXT BOOK: DATABASE ADMINISTRATION: THE COMPLETE GUIDE TO PRACTICES AND PROCEDURES CRAIG S. MULLINS Database Administration(IS4511) Sana azzam
Database Administration Advanced Database Dr. AlaaEddin Almabhouh.
The Database Approach Muhammad Nasir
Copyright © 2016 Pearson Education, Inc. CHAPTER 12: DATA AND DATABASE ADMINISTRATION Modern Database Management 12 th Edition Jeff Hoffer, Ramesh Venkataraman,
Database Principles: Fundamentals of Design, Implementation, and Management Chapter 1 The Database Approach.
TM 13-1 Copyright © 1999 Addison Wesley Longman, Inc. Data and Database Administration.
Building a Data Warehouse
DBA 5/20/2018 Like a policeman or teacher
Oracle Database Administration
Database Systems: Design, Implementation, and Management Tenth Edition
The Client/Server Database Environment
Information Technology (IT) Department
Managing Multi-user Databases
Database Management System (DBMS)
LM 8 Data Administration & Database Administration
Chapter 1 Database Systems
IS4680 Security Auditing for Compliance
Database Systems Chapter 1
Chapter 1: The Database Environment
Database Systems Instructor Name: Lecture-2.
Database Security &Threats
Chapter 1 Database Systems
PLANNING A SECURE BASELINE INSTALLATION
The Database Environment
MIS 385/MBA 664 Systems Implementation with DBMS/ Database Management
CHAPTER 5 THE DATA RESOURCE
Presentation transcript:

Data and database administration Karolina muszyńska Based on: Hoffer J. A., Ramesh V., Topi H. (2011): Modern Database Management (10th ed.). Prentice-Hall, Inc.

Agenda Introduction Traditional Data Administration Traditional Database Administration Trends in Database Administration Threats to Data Security Establishing client/server security

Introduction Data and database administration activities have been developed to help achieve organizations’ goals for the effective management of data. Good management of data involves managing data quality as well as data security and availability. Failure to take the proper steps in data and database administration can greatly reduce an organization’s ability to operate effectively and may even result in its going out of business.

Traditional data administration Data administration is a high-level function that is responsible for the overall management of data resources in an organization, including maintaining corporate-wide data definitions and standards. The data administrator must be a highly skilled manager capable of eliciting the cooperation of users and resolving differences that normally arise when significant change is introduced into an organization. The data administrator should be a respected, senior- level manager selected from within the organization, rather than a technical computer expert or a new individual hired for the position. However he must have sufficient technical skills to interact effectively with technical staff members such as database administrators, system administrators, and programmers.

Core roles of traditional data administration Establishment and enforcement of data policies, procedures, and standards for data protection and security Planning of the organization’s information structure Data conflict resolution, especially in terms of data ownership Managing the information repository, which contains the metadata and data processing resources Internal marketing regarding the importance of following established procedures and policies

Traditional Database Administration Database administration is a technical function responsible for logical and physical database design and for dealing with technical issues, such as security enforcement, database performance, backup and recovery, and database availability. A database administrator must understand the data models built by data administration and be capable of transforming them into efficient and appropriate logical and physical database designs. He is responsible for implementing the standards and procedures established by the data administrator, including enforcing programming standards, data standards, policies, and procedures. Database administrator must have understanding of: current hardware and software (operating system and networking) architectures and capabilities, data processing, database development life cycle, design and data modeling skills, managerial skills.

Core roles of traditional database administration Analyzing and designing the database – definition and creation of the data dictionary repository Selecting DBMS and related software tools – selection of hardware and software Installing and upgrading the DBMS – plus creating and maintaining users accounts Tuning database performance by modifying the database design, rebuilding or reorganizing it Improving database query processing performance by adding or deleting indexes, relocating data, etc. Managing data security, privacy, and integrity Performing data backup and recovery

Trends in Database Administration Increased use of procedural logic Features such as triggers, stored procedures, and persistent stored modules provide the ability to define business rules to the DBMS rather than in separate application programs. Once developers begin to rely on the use of these objects, a database administrator must address the issues of quality, maintainability, performance, and availability. Proliferation of e-business applications When a business goes online, database administrator must be capable of managing applications and databases that are Internet enabled. Major priorities in this environment include high data availability, integration of legacy data with Web-based applications, tracking of Web activity, and performance engineering for the Internet. Increase use of smartphones A small amount of critical data is typically stored on a smartphone (personal database), which then is periodically synchronized with data stored on the enterprise data servers. Database administrator must know how to design these personal databases and how to manage data synchronization from hundreds or thousands of such smartphones while maintaining the data integrity and data availability requirements of the enterprise.

Managing Data Security The goal of database security is to protect data from accidental or intentional threats to their integrity and access. Access to data has become more open through the Internet and corporate intranets and from mobile computing devices. As a result, managing data security effectively has become more difficult and time-consuming. Threats to data security may be direct threats to the database. Focusing on database security alone will not ensure a secure database. All parts of the system must be secure, including the database, the network, the operating system, the building(s) in which the database resides physically, and the personnel who have any opportunity to access the system.

Threats to Data Security Accidental losses, including human error, software, and hardware- caused breaches Theft and fraud – this requires taking care of physical security, using firewalls Loss of privacy or confidentiality – the first one meaning loss of protection of data about individuals, the other one meaning loss of protection of critical organizational data Loss of data integrity – means that data is invalid and corrupted Loss of availability – caused mainly by viruses, requires installing up- to-date antivirus software

Establishing Client/Server Security Database security is only as good as the security of the whole computing environment. Physical security, logical security, and change control security must be established across all components of the client/server environment, including the servers, the client workstations, the network and its related components, and the users. Server security - logical access controls, including server and administrator passwords, possibilities of the administrator to limit each user’s access and activity permissions to tables within the database Network security - encryption of data is an important part of network security, also authentication of the client workstation that is attempting to access the server Application Security Issues in Three-Tier Client/Server Environments - in a three- tier environment, the dynamic creation of a Web page from a database requires access to the database, and if the database is not properly protected, it is vulnerable to inappropriate access by any user. Establishing adequate server security is critical to protecting the data. Access to data can also be controlled through user-authentication security.