Data Security, Data Administration and Database Administration

Slides:



Advertisements
Similar presentations
Database Administration and Security Transparencies 1.
Advertisements

10/25/2001Database Management -- R. Larson Data Administration and Database Administration University of California, Berkeley School of Information Management.
© 2005 by Prentice Hall 1 Chapter 12: Data and Database Administration Modern Database Management 7 th Edition Jeffrey A. Hoffer, Mary B. Prescott, Fred.
Database Administration Chapter Six DAVID M. KROENKE’S DATABASE CONCEPTS, 2 nd Edition.
Oct 31, 2000Database Management -- Fall R. Larson Database Management: Introduction to Terms and Concepts University of California, Berkeley School.
SLIDE 1IS Fall 2005 Database Administration: Security and Integrity University of California, Berkeley School of Information Management.
SLIDE 1IS 257 – Spring 2006 Data Security, Data Administration and Database Administration University of California, Berkeley School of Information.
SLIDE 1IS Fall 2004 Database Administration: Security and Integrity University of California, Berkeley School of Information Management.
Transaction Management and Concurrency Control
Fundamentals, Design, and Implementation, 9/e Chapter 11 Managing Databases with SQL Server 2000.
SLIDE 1IS 257 – Fall 2011 Data Security, Data Administration and Database Administration University of California, Berkeley School of Information.
SLIDE 1IS 257 – Spring 2005 Data Administration and Database Administration University of California, Berkeley School of Information Management.
Data and Database Administration
Database Administration
10/7/1999Database Management -- R. Larson Database Administration: Additional Issues University of California, Berkeley School of Information Management.
IS 4420 Database Fundamentals Chapter 12: Data and Database Administration Leon Chen.
Concepts of Database Management Seventh Edition
Database Administration Part 1 Chapter Six CSCI260 Database Applications.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 10 Transaction Management and Concurrency Control.
Chapter 1 Introduction to Databases
Business Intelligence: Data and Text Management Instructor: Bajuna Salehe Web:
10/5/1999Database Management -- R. Larson Data Administration and Database Administration University of California, Berkeley School of Information Management.
1 © Prentice Hall, 2002 Chapter 12: Data and Database Administration Modern Database Management 6 th Edition Jeffrey A. Hoffer, Mary B. Prescott, Fred.
Data and Database Administration CISB514 Advanced Database  At the end of this chapter, you should be able to:  Define terms related to data & dbase.
Data and Database Administration CISB344 Database 2  At the end of this chapter, you should be able to:  Define terms related to data & database administration.
Data and Database Administration
© 2013 Pearson Education, Inc. Publishing as Prentice Hall 1 CHAPTER 11: DATA AND DATABASE ADMINISTRATION Modern Database Management 11 th Edition Jeffrey.
Database Design - Lecture 1
Data Administration & Database Administration
Concepts of Database Management Sixth Edition
11 SECURITY TEMPLATES AND PLANNING Chapter 7. Chapter 7: SECURITY TEMPLATES AND PLANNING2 OVERVIEW  Understand the uses of security templates  Explain.
Database Technical Session By: Prof. Adarsh Patel.
Sofia, Bulgaria | 9-10 October SQL Server 2005 High Availability for developers Vladimir Tchalkov Crossroad Ltd. Vladimir Tchalkov Crossroad Ltd.
Concepts of Database Management Eighth Edition
Recovery & Concurrency Control. What is a Transaction?  A transaction is a logical unit of work that must be either entirely completed or aborted. 
1 Introduction to Database Systems. 2 Database and Database System / A database is a shared collection of logically related data designed to meet the.
Oracle9i Performance Tuning Chapter 1 Performance Tuning Overview.
The protection of the DB against intentional or unintentional threats using computer-based or non- computer-based controls. Database Security – Part 2.
D ATABASE A DMINISTRATION L ECTURE N O 3 Muhammad Abrar.
Database Design and Management CPTG /23/2015Chapter 12 of 38 Functions of a Database Store data Store data School: student records, class schedules,
Lecture # 3 & 4 Chapter # 2 Database System Concepts and Architecture Muhammad Emran Database Systems 1.
© 2002 by Prentice Hall 1 Database Administration David M. Kroenke Database Concepts 1e Chapter 6 6.
MBA 664 Database Management Dave Salisbury ( )
TM 13-1 Copyright © 1999 Addison Wesley Longman, Inc. Data and Database Administration.
Data and Database Administration CS263 Lecture 15.
Introduction to Databases Dr. Osama AL Rababah. Objectives In this capture you will learn: Some common uses of database systems. The characteristics of.
Week 7 Lecture Part 2 Introduction to Database Administration Samuel S. ConnSamuel S. Conn, Asst Professor.
1 Data and Database Administration Data and Database Administration By Lec. Adeel Shahzad FromBook-B.
Database Administration Advanced Database Dr. AlaaEddin Almabhouh.
Chapter 13 Managing Transactions and Concurrency Database Principles: Fundamentals of Design, Implementation, and Management Tenth Edition.
CSC314 Day 16 Transaction processing Concurrency Control 1.
Copyright © 2016 Pearson Education, Inc. CHAPTER 12: DATA AND DATABASE ADMINISTRATION Modern Database Management 12 th Edition Jeff Hoffer, Ramesh Venkataraman,
TM 13-1 Copyright © 1999 Addison Wesley Longman, Inc. Data and Database Administration.
Chapter 12: Data and Database Administration
Database Management.
Managing Multi-User Databases
Data and database administration
Client/Server Databases and the Oracle 10g Relational Database
Database Management:.
Functions of a Database Management System
IS 325 Notes for Thursday September 7, 2017.
Chapter 10 Transaction Management and Concurrency Control
Introduction of Week 13 Return assignment 11-1 and 3-1-5
Database Administration
PLANNING A SECURE BASELINE INSTALLATION
Chapter 11 Managing Databases with SQL Server 2000
MIS 385/MBA 664 Systems Implementation with DBMS/ Database Management
CHAPTER 5 THE DATA RESOURCE
INTRODUCTION A Database system is basically a computer based record keeping system. The collection of data, usually referred to as the database, contains.
Presentation transcript:

Data Security, Data Administration and Database Administration University of California, Berkeley School of Information IS 257: Database Management IS 257 – Fall 2015

Lecture Outline Review Database Administration: Security Database Administration: Disasters, Backup and Recovery Database Administration: Roles IS 257 – Fall 2015

Lecture Outline Database Administration: Data Integrity and Security Database Administration: Disasters, Backup and Recovery Database Administration: Roles IS 257 – Fall 2015

Data Integrity Intrarecord integrity (enforcing constraints on contents of fields, etc.) Referential Integrity (enforcing the validity of references between records in the database) Concurrency control (ensuring the validity of database updates in a shared multiuser environment) IS 257 – Fall 2015

Integrity Constraints (review) The constraints we wish to impose in order to protect the database from becoming inconsistent. Five types Required data attribute domain constraints entity integrity referential integrity enterprise constraints IS 257 – Fall 2015

Referential Integrity Ensures that dependent relationships in the data are maintained. In Oracle, for example: CREATE TABLE table-name ( attr1 attr-type PRIMARY KEY, attr2 attr-type NOT NULL, …, attrM attr-type REFERENCES owner.tablename(attrname) ON DELETE CASCADE, … IS 257 – Fall 2015

Concurrency Control The goal is to support access by multiple users to the same data, at the same time It must assure that the transactions are serializable and that they are isolated It is intended to handle several problems in an uncontrolled system Specifically: Lost updates Inconsistent data states during access Uncompleted (or committed) changes to data IS 257 – Fall 2015

Concurrency Control: Locking Locking levels Database Table Block or page Record Field Types Shared (S locks) Exclusive (X locks) IS 257 – Fall 2015

Transaction Control in ORACLE Transactions are sequences of SQL statements that ORACLE treats as a unit From the user’s point of view a private copy of the database is created for the duration of the transaction Transactions are started with SET TRANSACTION, followed by the SQL statements Any changes made by the SQL are made permanent by COMMIT Part or all of a transaction can be undone using ROLLBACK IS 257 – Fall 2015

Transactions in MySQL START TRANSACTION or BEGIN starts a transaction block (disables autocommit) COMMIT or ROLLBACK will commit the transaction block or return to state before the block was started MySQL may use different underlying database engines – the InnoDB engine also supports SAVEPOINT and ROLLBACK TO SAVEPOINT NOTE: This syntax can be used in any of MySQL’s database engines - but it only WORKS when using the InnoDB engine (which can be set up when the tables are created) IS 257 – Fall 2015

Transactions in MySQL (5.0+) START TRANSACTION [WITH CONSISTENT SNAPSHOT] | BEGIN [WORK] COMMIT [WORK] [AND [NO] CHAIN] [[NO] RELEASE] ROLLBACK [WORK] [AND [NO] CHAIN] [[NO] RELEASE] SET AUTOCOMMIT = {0 | 1} The START TRANSACTION and BEGIN statement begin a new transaction. COMMIT commits the current transaction, making its changes permanent. ROLLBACK rolls back the current transaction, canceling its changes. The SET AUTOCOMMIT statement disables or enables the default autocommit mode for the current connection IS 257 – Fall 2015

Versioning Newer optimistic approach to concurrency control Instead of locking Assumption is that simultaneous updates will be infrequent Each transaction can attempt an update as it wishes The system will reject an update when it senses a conflict Use of rollback and commit for this IS 257 – Fall 2015

Better performance than locking Use of Versioning… Better performance than locking IS 257 – Fall 2015

Database Security Views or restricted subschemas Authorization rules to identify users and the actions they can perform User-defined procedures (with rule systems or triggers) to define additional constraints or limitations in using the database Encryption to encode sensitive data Authentication schemes to positively identify a person attempting to gain access to the database IS 257 – Fall 2015

Views A subset of the database presented to some set of users SQL: CREATE VIEW viewname AS SELECT field1, field2, field3,…, FROM table1, table2 WHERE <where clause>; Note: “queries” in Access function as views IS 257 – Fall 2015

U = unclassified : S = Secret : TS = Top Secret Restricted Views Main relation has the form: Name C_name Dept C_dept Prof C_prof TC J Smith S Dept1 Cryptography TS M Doe U Dept2 IT Security R Jones Dept3 Secretary U = unclassified : S = Secret : TS = Top Secret IS 257 – Fall 2015

Restricted Views NAME Dept Prof J Smith Dept1 --- M Doe Dept2 S-view of the data NAME Dept Prof J Smith Dept1 --- M Doe Dept2 IT Security R Jones Dept3 Secretary U-view of the data NAME Dept Prof M Doe --- R Jones Dept3 Secretary IS 257 – Fall 2015

Authorization Rules Most current DBMS permit the DBA to define “access permissions” on a table by table basis (at least) using the GRANT and REVOKE SQL commands Some systems permit finer grained authorization (most use GRANT and REVOKE on variant views IS 257 – Fall 2015

From: http://dev.mysql.com/doc/refman/5.1/en/backup-types.html MySQL Backup Types Physical (Raw) Versus Logical Backups Physical (or Raw) Backups Physical backups consist of raw copies of the directories and files that store database contents. This type of backup is suitable for large, important databases that need to be recovered quickly when problems occur. Logical Backups Logical backups save information represented as logical database structure (CREATE DATABASE, CREATE TABLE statements) and content (INSERT statements or delimited-text files). This type of backup is suitable for smaller amounts of data where you might edit the data values or table structure, or recreate the data on a different machine architecture. From: http://dev.mysql.com/doc/refman/5.1/en/backup-types.html IS 257 – Fall 2015

Logical Backups Logical backup tools include the mysqldump program and the SELECT ... INTO OUTFILE statement. These work for any storage engine, even MEMORY. To restore logical backups, SQL-format dump files can be processed using the mysql client. To load delimited-text files, use the LOAD DATA INFILE statement or the mysqlimport client. IS 257 – Fall 2015

Physical Backups Physical backup tools include file system-level commands (such as cp, scp, tar, rsync), mysqlhotcopy for MyISAM tables, ibbackup for InnoDB tables, or START BACKUP for NDB tables. For restore, files copied at the file system level or with mysqlhotcopy can be copied back to their original locations with file system commands; ibbackup restores InnoDB tables, and ndb_restore restores NDB tables. IS 257 – Fall 2015

Lecture Outline Review Database Administration: Security Database Administration: Disasters, Backup and Recovery Database Administration: Roles and Functions IS 257 – Fall 2015

Disasters come in many forms… IS 257 – Fall 2015

IS 257 – Fall 2015

La Crosse, Wisc 2001 IS 257 – Fall 2015

Katrina IS 257 – Fall 2015

Katrina IS 257 – Fall 2015

Katrina IS 257 – Fall 2015

Katrina IS 257 – Fall 2015

Katrina IS 257 – Fall 2015

Katrina IS 257 – Fall 2015

Hurricane Sandy in N.J. & N.Y. IS 257 – Fall 2015

Disaster Recovery Planning Testing and Training Procedures Development Budget & Implement Plan Maintenance Recovery Strategies Risk Analysis From Toigo “Disaster Recovery Planning” IS 257 – Fall 2015

Threats to Assets and Functions Water Fire Power Failure Mechanical breakdown or software failure Accidental or deliberate destruction of hardware or software By hackers, disgruntled employees, industrial saboteurs, terrorists, or others IS 257 – Fall 2015

Threats Between 1967 and 1978 fire and water damage accounted for 62% of all data processing disasters in the U.S. The water damage was sometimes caused by fighting fires More recently improvements in fire suppression (e.g., Halon) for DP centers has meant that water is the primary danger to DP centers IS 257 – Fall 2015

Kinds of Records Class I: VITAL Class II: IMPORTANT Class III: USEFUL Essential, irreplaceable or necessary to recovery Class II: IMPORTANT Essential or important, but reproducible with difficulty or at extra expense Class III: USEFUL Records whose loss would be inconvenient, but which are replaceable Class IV: NONESSENTIAL Records which upon examination are found to be no longer necessary IS 257 – Fall 2015

Offsite Storage of Data Early offsite storage facilities were often intended to survive atomic explosions PRISM International directory PRISM = Professional Records and Information Services Management http://www.prismintl.org/ Mirror sites (Hot sites) Agility “Hotsuite” IS 257 – Fall 2015

Offsite Storage Providers Iron Mountain IS 257 – Fall 2015

Offsite backup providers Verio IS 257 – Fall 2015

Backup and Offsite Backup Found on the Web… This is typical of services that provide offsite backup for computers or DP centers IS 257 – Fall 2015

Lecture Outline Review Database Administration: Security Database Administration: Disasters, Backup and Recovery Database Administration: Roles IS 257 – Fall 2015

Today Traditional and Current Data Administration Traditional and Current Database Administration Review of Security, Integrity, etc. IS 257 – Fall 2015

Changes in Traditional Roles This is being driven by rapid changes in Technology Platforms (e.g., Micro vs. Mainframe vs. Server vs. Cloud) Organizational Structure We will focus on the core functions and tasks of these roles (traditional or current) IS 257 – Fall 2015

Traditional Administration Definitions Data Administration: A high-level function that is responsible for the overall management of data resources in an organization, including maintaining corporate-wide definitions and standards Database Administration: A technical function that is responsible for physical database design and for dealing with technical issues such as security enforcement, database performance, and backup and recovery IS 257 – Fall 2015

Traditional Data Administration Functions Data policies, procedures, standards Planning Data conflict (ownership) resolution Managing the information repository Internal marketing of DA concepts IS 257 – Fall 2015

Traditional Database Administration Functions Selection of DBMS and software tools Installing/upgrading DBMS Tuning database performance Improving query processing performance Managing data security, privacy, and integrity Data backup and recovery IS 257 – Fall 2015

Evolving Approaches to Data Administration Blend data and database administration into one role Fast-track development – monitoring development process (analysis, design, implementation, maintenance) Procedural DBAs–managing quality of triggers and stored procedures eDBA–managing Internet-enabled database applications PDA DBA–data synchronization and personal database management Data warehouse administration IS 257 – Fall 2015

Database System Life Cycle Operation & Maintenance Database Implementation Design Growth & Change Analysis Planning Note: this is a different version of this life cycle than discussed previously IS 257 – Fall 2015

Database Planning Development of a strategic plan for database development that supports the overall organization’s business plan DA supports top management in development of this plan The result of this stage is an enterprise data model IS 257 – Fall 2015

Database Design Purpose of the design phase is the development of the logical database design that will serve the needs of the organization and the physical design implementing the logical design In relational systems the outcome is normalized relations, and the data definition for a particular database systems (including indexes, etc.) IS 257 – Fall 2015

Roles for design process IS 257 – Fall 2015

Database Implementation Database design gives you an empty database Load data into the database structure Convert existing data sets and applications to use the new database May need programs, conversion utilities to convert old data to new formats. Outcome is the actual database with its data IS 257 – Fall 2015

Database Implementation DA & DBA functions Specify database access policies (DA & DBA) Establish Security controls (DBA) Supervise Database loading (DBA) Specify test procedures (DBA) Develop application programming standards (DBA) Establish procedures for backup and recovery (DBA) Conduct User training (DA & DBA) IS 257 – Fall 2015

Operation and Maintenance 1: Operations Users are responsible for updating the database, DA and DBA are responsible for developing procedures that ensure the integrity and security of the database during the update process. Specific responsibility for data collection, editing and verification must be assigned Quality assurance must be practiced to protect and audit the database quality. IS 257 – Fall 2015

Operation and Maintenance 2: Maintenance The ongoing process of updating the database to keep it current adding new records deleting obsolete records changing data values in particular records modifying relation structures (e.g. adding new fields) Privacy, security, access control must be in place. Recovery and Backup procedures must be established and used IS 257 – Fall 2015

Operation and Maintenance: DA & DBA functions Monitor database performance (DBA) Tune and reorganize databases (DBA) Enforce standards and procedures (DBA) Support users (DA & DBA) IS 257 – Fall 2015

Data Warehouse Administration New role, coming with the growth in data warehouses Similar to DA/DBA roles Emphasis on integration and coordination of metadata/data across many data sources Specific roles: Support DSS applications Manage data warehouse growth Establish service level agreements regarding data warehouses and data marts IS 257 – Fall 2015

Growth & Change Change is a way of life Applications, data requirements, reports, etc. will all change as new needs and requirements are found The Database and applications and will need to be modified to meet the needs of changes to the organization and the environment Database performance should be monitored to maintain a high level of system performance IS 257 – Fall 2015

Database Performance Tuning DBMS Installation Setting installation parameters Memory Usage Set cache levels Choose background processes Input/Output (I/O) Contention Use striping Distribution of heavily accessed files CPU Usage Monitor CPU load Application tuning Modification of SQL code in applications IS 257 – Fall 2015

Data Availability Downtime is expensive How to ensure availability Hardware failures–provide redundancy for fault tolerance Loss of data–database mirroring Maintenance downtime–automated and nondisruptive maintenance utilities Network problems–careful traffic monitoring, firewalls, and routers IS 257 – Fall 2015