Module 8 ********* Data Validation & Security Workforce Information Database Training Last update November 2006.

Slides:



Advertisements
Similar presentations
CLEARSPACE Digital Document Archiving system INTRODUCTION Digital Document Archiving is the process of capturing paper documents through scanning and.
Advertisements

OVERVIEW TEAM5 SOFTWARE The TEAM5 software manages personnel and test data for personal ESD grounding devices. Test and personnel data may be viewed/reported.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Monday, 08 June 2015Dr. Mohamed Osman1 What is Database Administration A high level function (technical Function) that is responsible for ► physical DB.
Database Integrity, Security and Recovery Database integrity Database integrity Database security Database security Database recovery Database recovery.
Evidor: The Evidence Collector Software using for: Software for lawyers, law firms, corporate law and IT security departments, licensed investigators,
Database Management: Getting Data Together Chapter 14.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
11 3 / 12 CHAPTER Databases MIS105 Lec14 Irfan Ahmed Ilyas.
Chapter 8 Security Transparencies © Pearson Education Limited 1995, 2005.
Copyright ©2014 Pearson Education, Inc. Chapter 3 Requirements and Business Rules Chapter3.1.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Software Development Unit 2 Databases What is a database? A collection of data organised in a manner that allows access, retrieval and use of that data.
REDCap Overview Institute for Clinical and Translational Science Heath Davis Fred McClurg Brian Finley.
Module 1 ********* Brief Review of the Workforce Information Database Workforce Information Database Training Revised May 2007.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
XP New Perspectives on Microsoft Office Access 2003 Tutorial 12 1 Microsoft Office Access 2003 Tutorial 12 – Managing and Securing a Database.
DAY 14: ACCESS CHAPTER 1 Tazin Afrin October 03,
Switch off your Mobiles Phones or Change Profile to Silent Mode.
Module 7. Data Backups  Definitions: Protection vs. Backups vs. Archiving  Why plan for and execute data backups?  Considerations  Issues/Concerns.
Made by: Sambit Pulak XI-IB. Reliability refers to the operation of hardware, the design of software, the accuracy of data or the correspondence of data.
ALMIS Database Fundamentals. Topics ALMIS Database History Table Layout How to read a table definition Table constraints and Triggers Core Tables Table.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Technology in the Bellingham School District. Bellingham School District Network §Connectivity §Communication §Research Practice Responsible Use.
Database Management. ICT5 Database Administration (DBA) The DBA’s tasks will include the following: 1. The design of the database. After the initial design,
Discovering Computers Fundamentals Fifth Edition Chapter 9 Database Management.
BA372 Stored Procedures and Triggers Lab. What needs to be done to change a customer’s credit limit? Who am I? May I? Do it Log it Display A database.
Database Design and Management CPTG /23/2015Chapter 12 of 38 Functions of a Database Store data Store data School: student records, class schedules,
Chapter 1 Introduction to Databases. 1-2 Chapter Outline   Common uses of database systems   Meaning of basic terms   Database Applications  
Chapter No 4 Query optimization and Data Integrity & Security.
Note1 (Admi1) Overview of administering security.
Database Security Outline.. Introduction Security requirement Reliability and Integrity Sensitive data Inference Multilevel databases Multilevel security.
INFO1408 Database Design Concepts Week 15: Introduction to Database Management Systems.
Prepared By Prepared By : VINAY ALEXANDER ( विनय अलेक्सजेंड़र ) PGT(CS),KV JHAGRAKHAND.
Ch 14 QQ T F 1.A database table consists of fields and records. T F 2.Good data validation techniques can help improve data integrity. T F 3.An index is.
Module 4: Configuring and Troubleshooting DHCP
REDCap Overview Institute for Clinical and Translational Science Fred McClurg Neil Nuehring.
CIS/SUSL1 Fundamentals of DBMS S.V. Priyan Head/Department of Computing & Information Systems.
Chapter 2 Securing Network Server and User Workstations.
Experiment Management System CSE 423 Aaron Kloc Jordan Harstad Robert Sorensen Robert Trevino Nicolas Tjioe Status Report Presentation Industry Mentor:
Programming Logic and Design Fourth Edition, Comprehensive Chapter 16 Using Relational Databases.
ADVANTAGES OF DATA BASE MANAGEMENT SYSTEM. TO BE DICUSSED... Advantages of Database Management System  Controlling Data RedundancyControlling Data Redundancy.
Database Management Systems (DBMS)
Data Integrity # Best Practices & Lessons Learned. Does It Fit Your Organization?
Academic Year 2014 Spring Academic Year 2014 Spring.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
KIM: Kuali Abstraction Layer for Identities, Groups, Roles, and Permissions.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Session 1 Module 1: Introduction to Data Integrity
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Chapter 3 Requirements and Business Rules Copyright © 2012 Pearson Education, Inc. Publishing as Prentice HallChapter3.1.
IS2803 Developing Multimedia Applications for Business (Part 2) Lecture 1: Introduction to IS2803 Rob Gleasure
1 Data and Database Administration Data and Database Administration By Lec. Adeel Shahzad FromBook-B.
TOPSpro Special Topics I: Database Managemen t. Agenda for Module I: Database Management  TOPSpro Backup/Restore Wizard  TOPS-TOPS Import/Export Wizard.
Building Preservation Environments with Data Grid Technology Reagan W. Moore Presenter: Praveen Namburi.
Microsoft SQL is known as RDMS (Relational Database Management System) which is developed by Microsoft and is highly used at corporate and enterprise.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
IT Audit for non-IT auditors Cornell Dover Assistant Auditor General 31 March 2013.
Visibook is instant, simple, and dynamic appointment booking We're headquartered in San Francisco, California "Visibook is awesome. My entire studio was.
Data Integrity & Indexes / Session 1/ 1 of 37 Session 1 Module 1: Introduction to Data Integrity Module 2: Introduction to Indexes.
Chapter 7. Identifying Assets and Activities to Be Protected
Data Validation & Security.
Unit 27: Network Operating Systems
Microsoft Office Access 2003
Unit 4 IT Security Kerris Davies.
AbbottLink™ - IP Address Overview
NAVIGATING THE MINEFIELD
Ensuring the Quality and Best Use of Information
European Computer Driving Licence Syllabus version 5.0
Presentation transcript:

Module 8 ********* Data Validation & Security Workforce Information Database Training Last update November 2006

Providing Accurate Data Consistently Data validation allows us to provide data with confidence in its accuracy, and we can consistently provide this data by implementing thorough security. Module 8 Data Validation & Security

Data Integrity Validity, consistency, and accuracy of the data in a database. Table-level Field-level Relationship-level Business Rules Module 8 Data Validation & Security

Module 8 Data Validation & Security Data Validation The process of determining if an update to a value in a table’s data cell is within a preestablished range or is a member of a set of allowable values.

What are some common data quality problems that affect data integrity and validation? Module 8 Data Validation & Security

Common Data Quality Problems Illegal values Violated attribute dependencies Uniqueness violation Referential integrity violation Missing values Misspellings Cryptic values Embedded values Misfielded values Module 8 Data Validation & Security

Common Data Quality Problems continued…. Word transpositions Duplicate records Contradicting records Wrong references Overlapping data/matching records Name conflicts Structural conflicts Inconsistencies Module 8 Data Validation & Security

What are some methods for checking for data validity? Module 8 Data Validation & Security

Methods for checking for data validity Visual/manual Aggregation Reviewers guide Auto data checks Record counts Spell checks Have data provider review Module 8 Data Validation & Security

Time to Exercise!! Module 8 Data Validation & Security

Network permissions Physical security (including backup & restoration plan) Data Storage Access (Server or PC) Web security Application security User level ALMIS Database Security Considerations Database security prevents unauthorized person(s) from viewing, destroying or altering data within the database. Security Concerns: Confidentiality Integrity Availability User level Application security RDBMS ODBC Suppression flags Data aggregation issues Network (LAN/WAN) security The contact in my state is:______________ Production vs. test Module 8 Data Validation & Security

Network permissions Physical security (including backup & restoration plan) Data Storage Access (Server or PC) Web security Application security User level ALMIS Database Security Considerations Database security prevents unauthorized person(s) from viewing, destroying or altering data within the database. Security Concerns: Confidentiality Integrity Availability User level Application security RDBMS ODBC Suppression flags Data aggregation issues Network (LAN/WAN) security The contact in my state is:______________ Production vs. test Module 8 Data Validation & Security

Physical Security Questions to ask yourself: Where is your data actually stored? Are you responsible for physical security? If you are... Module 8 Data Validation & Security

Physical Security What physical security measures do you have in place? Do you have the right hardware? Are you using obsolete hardware that is prone to crashing or hacking? Do you have a choice? Module 8 Data Validation & Security

Physical Security Do you have a database backup plan? Do you have remote backup so if a fire burns the building you don’t lose both your primary and backup data at the same time? Do you have a data restoration plan? Does the backup plan allow for feasible restoration? Module 8 Data Validation & Security

Physical Security Restoration Plan Does your restoration plan allow for the restoration of individual tables or require the entire database? Do you maintain copies of the tables on your hard drive? Module 8 Data Validation & Security

Physical Security Who has access to the physical storage location? Is your database on a PC or server that someone could easily kick, spill coffee on, or accidentally reappropriate? If you are not responsible for physical security, ask these questions of those who are! Module 8 Data Validation & Security

Network permissions Physical security (including backup & restoration plan) Data Storage Access (Server or PC) Web security Application security User level ALMIS Database Security Considerations Database security prevents unauthorized person(s) from viewing, destroying or altering data within the database. Security Concerns: Confidentiality Integrity Availability User level Application security RDBMS ODBC Suppression flags Data aggregation issues Network (LAN/WAN) security The contact in my state is:______________ Production vs. test Module 8 Data Validation & Security

Data Storage Access What software are you using to store the database? SQL Server, Oracle, FoxPro, Access? Survey says: SQL Server48% Oracle28% Other24% Module 8 Data Validation & Security

Data Storage Access What can be done at the server level to provide for security? Confidentiality, Integrity, Availability DO apply advanced security to the most sensitive data, but DON’T apply advanced security to non-sensitive data Module 8 Data Validation & Security

Data Storage Access Security at the server and/or database level… Permissions What kind of permissions exist? Read only, SA, etc. Who sets those permissions? Who has those permissions? Module 8 Data Validation & Security

ALMIS Database Security Security at the data level… Suppression Suppression flags Suppression can be handled at the database level or the application level Module 8 Data Validation & Security

ALMIS Database Data Security Two approaches: 1. ALMIS Database contains NO confidential data (all data available for use without restriction) 2. ALMIS Database contains confidential data (data access controlled by security and/or suppression) Module 8 Data Validation & Security

ALMIS Database Security Tables that have suppression flags... ces indprj industry iomatrix occprj oeswage stindprj stoccprj NOTE: tables stfirms and wage have no suppression flags but may contain confidential data Module 8 Data Validation & Security

ALMIS Database Data Security Issues to consider regarding suppression: If your database doesn’t contain suppressed records, detailed data won’t aggregate to totals (validity checks?) Without proper suppression, confidential data can be back-calculated Module 8 Data Validation & Security

ALMIS Database Data Security A note on confidential data: If you are checking 202 data (or any other potentially confidential data) to see that it loaded right, make sure your EQUI data files and/or printouts are always secured and shred all photocopies when finished. Check with your local BLS personnel or LMI administrator for specific confidentiality policies. Module 8 Data Validation & Security

Network permissions Physical security (including backup & restoration plan) Data Storage Access (Server or PC) Web security Application security User level ALMIS Database Security Considerations Database security prevents unauthorized person(s) from viewing, destroying or altering data within the database. Security Concerns: Confidentiality Integrity Availability User level Application security RDBMS ODBC Suppression flags Data aggregation issues Network (LAN/WAN) security The contact in my state is:______________ Production vs. test Module 8 Data Validation & Security

User Access Three major types of user access: PC - direct to database (ODBC or RDBMS) Network (LAN/WAN) through application Web (passive or active through application) Module 8 Data Validation & Security

User Access via the Web How do Web users access the data from the database? Passive (static tables automatically updated to web pages) Active (query through application) Module 8 Data Validation & Security

User Access via the Web Questions to ask yourself: What kind of web server are you using? What are the security considerations with that choice? What kind of firewall do you have? Module 8 Data Validation & Security

User Access via the Web Does your web interface have security/confidentiality suppression? Do you display suppressed data to certain users? If so, how is access managed? Passwords? IP address? Module 8 Data Validation & Security

User Access via a Network (LAN/WAN) Questions to ask yourself: What type of network system do you have? Who has rights/access to your data via the network? Through what applications? Are confidential data (suppressed records) available? Module 8 Data Validation & Security

User Access via a Network (LAN/WAN) How do you control access to confidential data? Through user Ids? Through server access permissions? DO recognize the important distinction between network security and data security. Module 8 Data Validation & Security

User Access via direct connection Questions to ask yourself: Is local access machine password protected? Who has access to your machine? Is there a backup plan for your access machine? Is the source data for your database secure? Backup plan? Restorable? Module 8 Data Validation & Security

ALMIS Database Data Security Documentation It may prove beneficial to keep detailed records on… How security is done Where security exists Who is responsible for security Who has access/permissions to what Etc... Module 8 Data Validation & Security

Data Security DISCUSSION Module 8 Data Validation & Security