Business Intelligence: Data and Text Management Instructor: Bajuna Salehe Web:

Slides:



Advertisements
Similar presentations
Distributed Data Processing
Advertisements

Auditing Computer-Based Information Systems
Database Administration and Security Transparencies 1.
Dr Gordon Russell, Napier University Unit Data Dictionary 1 Data Dictionary Unit 5.3.
Introduction to Database Management  Department of Computer Science Northern Illinois University January 2001.
System and Network Security Practices COEN 351 E-Commerce Security.
Monday, 08 June 2015Dr. Mohamed Osman1 What is Database Administration A high level function (technical Function) that is responsible for ► physical DB.
10/25/2001Database Management -- R. Larson Data Administration and Database Administration University of California, Berkeley School of Information Management.
Database Integrity, Security and Recovery Database integrity Database integrity Database security Database security Database recovery Database recovery.
1 8 Concepts of Database Management, 4 th Edition, Pratt & Adamski Chapter 8 Database Administration.
Web Site Security ISYS 512/812. Authentication Authentication is the process that determines the identity of a user. Web.config file – node Options: –Windows:
1 Minggu 7, Pertemuan 13 Security Matakuliah: T0206-Sistem Basisdata Tahun: 2005 Versi: 1.0/0.0.
Data and Database Administration
Chapter 10 Information Systems Management. Agenda Information Systems Department Plan the Use of IT Manage Computing Infrastructure Manage Enterprise.
Chapter 8 Security Transparencies © Pearson Education Limited 1995, 2005.
IS 4420 Database Fundamentals Chapter 12: Data and Database Administration Leon Chen.
Chapter 16 Security. 2 Chapter 16 - Objectives u The scope of database security. u Why database security is a serious concern for an organization. u The.
Concepts of Database Management Seventh Edition
BUSINESS DRIVEN TECHNOLOGY
Factors to be taken into account when designing ICT Security Policies
Oracle Database Administration. Rana Almurshed 2 course objective After completing this course you should be able to: install, create and administrate.
Chapter 1 Introduction to Databases
Chapter 4 Database Management Systems. Chapter 4Slide 2 What is a Database Management System (DBMS)?  Database An organized collection of related data.
Chapter 1: The Database Environment
Security Architecture Dr. Gabriel. Security Database security: –degree to which data is fully protected from tampering or unauthorized acts –Full understanding.
DATABASE SECURITY By Oscar Suciadi CS 157B Prof. Sin-Min Lee.
10/5/1999Database Management -- R. Larson Data Administration and Database Administration University of California, Berkeley School of Information Management.
Chapter 19 Security Transparencies. 2 Chapter 19 - Objectives Scope of database security. Why database security is a serious concern for an organization.
1 © Prentice Hall, 2002 Chapter 12: Data and Database Administration Modern Database Management 6 th Edition Jeffrey A. Hoffer, Mary B. Prescott, Fred.
Chapter 1 Database Systems. Good decisions require good information derived from raw facts Data is managed most efficiently when stored in a database.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
© Pearson Education Limited, Chapter 5 Database Administration and Security Transparencies.
Data and Database Administration
© 2013 Pearson Education, Inc. Publishing as Prentice Hall 1 CHAPTER 11: DATA AND DATABASE ADMINISTRATION Modern Database Management 11 th Edition Jeffrey.
ISOM MIS3150 Data and Info Mgmt Database Security Arijit Sengupta.
6-1 DATABASE FUNDAMENTALS Information is everywhere in an organization Information is stored in databases –Database – maintains information about various.
Data Administration & Database Administration
Concepts of Database Management Sixth Edition
Concepts of Database Management, Fifth Edition Chapter 8: Database Administration.
DATABASE UTILITIES. D ATABASE S YSTEM U TILITIES In addition to possessing the software modules most DBMSs have database utilities that help the DBA in.
AL-MAAREFA COLLEGE FOR SCIENCE AND TECHNOLOGY INFO 232: DATABASE SYSTEMS CHAPTER 1 DATABASE SYSTEMS (Cont’d) Instructor Ms. Arwa Binsaleh.
MIS 385/MBA 664 Systems Implementation with DBMS/ Database Management Dave Salisbury ( )
Concepts of Database Management Eighth Edition
Introduction to Database Systems
ADMINISTRATION & MANAGEMENT TOOLS BY: DURGESH PATEL & KHUSHBOO KADBER
Storing Organizational Information - Databases
D ATABASE A DMINISTRATION L ECTURE N O 3 Muhammad Abrar.
Database Design and Management CPTG /23/2015Chapter 12 of 38 Functions of a Database Store data Store data School: student records, class schedules,
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 7 Storing Organizational Information - Databases.
DA vs. DBA The University of California Berkeley Extension Copyright © 2011 Patrick McDermott.
IT Auditing & Assurance, 2e, Hall & Singleton Chapter 3: Data Management Systems.
Chapter 2 Securing Network Server and User Workstations.
MBA 664 Database Management Dave Salisbury ( )
University of Sunderland COM 220 Lecture Seven Slide 1 Database Users & Administration.
TM 13-1 Copyright © 1999 Addison Wesley Longman, Inc. Data and Database Administration.
Database Administration Basics. Basic Concepts and Definitions  Data Facts that can be recorded and stored  Metadata Data that describes properties.
Data and Database Administration CS263 Lecture 15.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 1 Database Systems.
1 Data and Database Administration Data and Database Administration By Lec. Adeel Shahzad FromBook-B.
Database Administration Advanced Database Dr. AlaaEddin Almabhouh.
Database Security Threats. Database An essential corporate resource Data is a valuable resource Must be strictly controlled, managed and secured May have.
SYSTEMS IMPLEMENTATION TECHNIQUES TRANSACTION PROCESSING DATABASE RECOVERY DATABASE SECURITY CONCURRENCY CONTROL.
Copyright © 2016 Pearson Education, Inc. CHAPTER 12: DATA AND DATABASE ADMINISTRATION Modern Database Management 12 th Edition Jeff Hoffer, Ramesh Venkataraman,
TM 13-1 Copyright © 1999 Addison Wesley Longman, Inc. Data and Database Administration.
Chapter 12: Data and Database Administration
Discovering Computers 2010: Living in a Digital World Chapter 14
Data and database administration
Managing Multi-user Databases
LM 8 Data Administration & Database Administration
Presentation transcript:

Business Intelligence: Data and Text Management Instructor: Bajuna Salehe Web:

The focus IT applications cannot be done with some kind of data. Without data you cannot have most IT applications, nor can you make good decisions. Hence data management should in the core of any business organisation.

The focus Likewise organisations produce more texts in day to day tasks. These texts are in form of documents. Therefore document management is also key issue to be considered by organisations.

Data Problems and Difficulties Various reasons render to difficultness in managing data: The amount of data increase exponentially with time. Data are scattered throughout the organizations and are collected by many individuals using several methods and devices. Continuous increasing of external data which must be considered in making organisational decisions.

Data Problems and Difficulties Data security, quality, and integrity are critical and yet are jeopardised. Selecting data management tools can be a major problems because of the huge number of products available.

Solutions Various means can be used in improving data management. These includes: Data warehouse, intranets, extranets, and some web technologies. The purpose of data management is to ease the burden of maintaining data which is a critical asset of an organisation.

Data and Database Administration Data Administration: A high-level function that is responsible for the overall management of data resources in an organization, including maintaining corporate-wide definitions and standards. Database Administration: A technical function that is responsible for physical database design and for dealing with technical issues such as security enforcement, database performance, and backup and recovery.

Data administration functions Data policies, procedures, standards Planning Data conflict (ownership) resolution Managing the data repository

Database administration functions Selection of hardware and software Installing/upgrading DBMS Tuning database performance Improving query processing performance Managing data security, privacy, and integrity Data backup and recovery

Data Life Cycle and Data Sources Businesses do not run on raw data but they run on data that have been processed to information and knowledge which managers apply to business problems and opprtunities. Due to difficulties of managing data, getting knowledge from large accumulated data is not an easy task.

Data Life Cycle and Data Sources The transformation of data into knowledge and solutions is accomplished in several ways. Data life cycle describes how to accomplish this process. The figure below demonstrate Data Life Cycle

Data Life Cycle

Data Sources The data life cycle begins with acquisition of data from data sources Data sources can be classified into: –Internal Data Sources –Personal Data Sources –External Data Sources

Data Sources Internal data sources focus on internal data. That is data about people, products, services, and processes. –E.g. Data about employees and their pay stored in corporate database. –Data about equipment and machinery.

Data Sources Personal data: Refers to data from Information System users or other corporate employees who document their own expertise by creating personal data. External Data: These ranges from commercial database to sensors and satellites. –Also government reports, data available on CD ROMs, Internet servers, etc.

Data Security Data security refers to how to prevent someone else from knowing the data contents. The data security can be categorised into two aspects: –Data security in transfer –Data security in storage

Data security in transfer Refers how to protect data when it is transferred from one point to another. Data security in transfer is accomplished by using: –Encryption – transform data into a different, unintelligible form. –Decryption – restore the original data from the encrypted form. In encryption plaintext refer to original data and ciphertext refer to encrypted data.

Data security in storage Data security in storage refers to database security. Database security is the protection of data against accidental or intentional loss, destruction, or misuse. There is an increase in difficulty of securing data in the database due to the Internet access and client server technology.

Possible locations of data security threats

Threats to data security can come from: Accidental losses - attributable to Human error, software or hardware failure – tackle using procedures on user authorisation, uniform software installation procedures, hardware maintenance schedules Theft and fraud – attention should be focussed on all the locations in the previous Fig. (control of physical access, firewalls etc.)

Threats to data security can come from: Loss of privacy (personal data) and loss of confidentiality (corporate data) Loss of data integrity – invalid/corrupt data – need established backup/recovery procedures Loss of availability (through, e.g. sabotage)

Data management software should have these security features: Views or subschemas which restrict user views of the database (discussed previously) Integrity controls which are enforced by the DBMS during querying and updating Authorization rules identifying users and restricting actions they can take User-defined procedures defining additional constraints.

Data management software should have these security features: Encryption procedures for encoding data in an unrecognisable form Backup, journalizing, and checkpointing capabilities which facilitate recovery procedures.