Chapter 15 Database Administration and Security

Slides:



Advertisements
Similar presentations
Database Administration
Advertisements

8 Chapter 8 The University Lab: Conceptual Design Verification, Logical Design, and Implementation Database Systems: Design, Implementation, and Management,
10/25/2001Database Management -- R. Larson Data Administration and Database Administration University of California, Berkeley School of Information Management.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 15 Database Administration and Security.
Chapter 6 Database Design
1 8 Concepts of Database Management, 4 th Edition, Pratt & Adamski Chapter 8 Database Administration.
Database Administration
Chapter 9 Database Design
15 1 Chapter 15 Database Administration Database Systems: Design, Implementation, and Management, Seventh Edition, Rob and Coronel.
Chapter 9 Database Design
Concepts of Database Management Seventh Edition
9 1 Chapter 9 Database Design Database Systems: Design, Implementation, and Management, Seventh Edition, Rob and Coronel.
6 Chapter 6 Database Design Hachim Haddouti. 6 2 Hachim Haddouti and Rob & Coronel, Ch6 In this chapter, you will learn: That successful database design.
Introduction to Systems Analysis and Design
Chapter 1 Introduction to Databases
Chapter 1: The Database Environment
Database Administration Chapter 16. Need for Databases  Data is used by different people, in different departments, for different reasons  Interpretation.
Security Architecture Dr. Gabriel. Security Database security: –degree to which data is fully protected from tampering or unauthorized acts –Full understanding.
10/5/1999Database Management -- R. Larson Data Administration and Database Administration University of California, Berkeley School of Information Management.
DATABASE ADMINISTRATION AND SECURITY
Chapter 15 Database Administration
Chapter 1 1 © Prentice Hall, 2002 Database Design Dr. Bijoy Bordoloi Introduction to Database Processing.
Database Systems: Design, Implementation, and Management Ninth Edition
Chapter 1 Database Systems. Good decisions require good information derived from raw facts Data is managed most efficiently when stored in a database.
Database Systems: Design, Implementation, and Management Tenth Edition
The Database Development Process
DBS201: DBA/DBMS Lecture 13.
Chapter 15 Database Administration and Security
Data Administration & Database Administration
Concepts of Database Management Sixth Edition
15 1 Chapter 15 Database Administration Database Systems: Design, Implementation, and Management, Seventh Edition, Rob and Coronel.
Concepts of Database Management, Fifth Edition Chapter 8: Database Administration.
AL-MAAREFA COLLEGE FOR SCIENCE AND TECHNOLOGY INFO 232: DATABASE SYSTEMS CHAPTER 1 DATABASE SYSTEMS (Cont’d) Instructor Ms. Arwa Binsaleh.
Database Technical Session By: Prof. Adarsh Patel.
ITEC 3220M Using and Designing Database Systems
Concepts of Database Management Eighth Edition
Security Architecture
Oracle9i Performance Tuning Chapter 1 Performance Tuning Overview.
Chapter 1 Database Systems
The protection of the DB against intentional or unintentional threats using computer-based or non- computer-based controls. Database Security – Part 2.
Database Administration
Database Systems: Design, Implementation, and Management Ninth Edition Chapter 15 Database Administration and Security.
8 8 Chapter 8 The University Lab: Conceptual Design Verification, Logical Design, and Implementation Database Systems: Design, Implementation, and Management.
15 1 Chapter 15 Database Administration Database Systems: Design, Implementation, & Management, 6 th Edition, Rob & Coronel Learning Objectives.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Database Security Outline.. Introduction Security requirement Reliability and Integrity Sensitive data Inference Multilevel databases Multilevel security.
Database Systems Design, Implementation, and Management Coronel | Morris 11e ©2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or.
CIS/SUSL1 Fundamentals of DBMS S.V. Priyan Head/Department of Computing & Information Systems.
Database Administration
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 15 Database Administration and Security.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 15 Database Administration and Security.
CASE (Computer-Aided Software Engineering) Tools Software that is used to support software process activities. Provides software process support by:- –
Chapter 12 Database Administration and Security Database Principles: Fundamentals of Design, Implementation, and Management Tenth Edition.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 15 Database Administration and Security.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Week 7 Lecture Part 2 Introduction to Database Administration Samuel S. ConnSamuel S. Conn, Asst Professor.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 1 Database Systems.
TEXT BOOK: DATABASE ADMINISTRATION: THE COMPLETE GUIDE TO PRACTICES AND PROCEDURES CRAIG S. MULLINS Database Administration(IS4511) Sana azzam
Chapter 5 Managing Multi-user Databases 1. Multi-User Issues Database Administration Concurrency Control Database Security Database Recovery Page 307.
Learners Support Publications www. lsp4you.com Database Users and Administrator.
Database Administration Advanced Database Dr. AlaaEddin Almabhouh.
Database Principles: Fundamentals of Design, Implementation, and Management Chapter 1 The Database Approach.
Database Architecture, Administration and Security.
ITEC 3220A Using and Designing Database Systems
Chapter 16 Database Administration and Security
Managing Multi-user Databases
Chapter 1 Database Systems
Database Administration
Database Systems Design, Implementation, and Management Coronel | Morris 11e ©2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or.
Chapter 1 Database Systems
Presentation transcript:

Chapter 15 Database Administration and Security

Learning Objectives In this chapter, students will learn: That data are a valuable business asset requiring careful management How a database plays a critical role in an organization That the introduction of a DBMS has important technological, managerial, and cultural consequences for an organization

Learning Objectives In this chapter, students will learn: About the database administrator’s managerial and technical roles About data security, database security, and the information security framework About several database administration tools and strategies How various technical tasks of database administration are performed with Oracle

Data Dirty data Data that suffer from inaccuracies and inconsistencies Data quality Ensuring accuracy, validity, and timeliness of data Data profiling software Determine data patterns and compare them against standards defined by the organization Master data management (MDM) software Helps prevent dirty data by coordinating across multiple systems

Figure 15.1 - The Data-Information-Decision Making Cycle

Need for and Role of Databases in an Organization At the top management level Enable strategic decision making and planning Identify growth opportunities Define and enforce organizational policies Reduce costs and boost productivity Provide feedback At the middle management level Deliver the data required for tactical planning Monitor the use of resources Evaluate performance Enforce security and privacy of data in the database At the operational management level Represent and support company operations Produce query results within specified performance levels Enhance the company’s short-term operations

Introduction of a Database: Special Considerations Selecting, installing, configuring, and monitoring the DBMS to ensure that it operates efficiently Technological aspect Careful planning to create an appropriate organizational structure Managerial aspect Listening to people’s concerns about the system and explaining its uses and benefits Cultural aspect

Evolution of the Database Administration Function Information systems (IS) department Provides end users with data management support and solutions for information needs Database administrator Responsible for control of the centralized and shared database Systems administrator General coordinator of all DBAs Data administrator (DA) or information resource manager (IRM) Has a higher degree of responsibility and authority than the DBA

Figure 15.2 - The IS Department’s Internal Organization

Figure 15.3 - The Placement of the DBA Function

Figure 15.4 - A DBA Functional Organization

Table 15.1 - Contrasting DA and DBA Activities and Characteristics

Table 15.2 - Desired DBA Skills

DBA’s Managerial Role Provide end-user support Enforce policies, procedures, and standards for correct data creation, usage, and distribution within the database Manage data security, privacy, and integrity Manage data backup and recovery Fully recover data in case of data loss Database security officer (DSO): Ensures database security and integrity

DBA’s Managerial Role Manage data distribution and use Disaster management: Planning, organizing, and testing of database contingency plans and recovery procedures Full backup or database dump: Produces a complete copy of the entire database Incremental backup: Produces a backup of all data since the last backup date Concurrent backup: Takes place while the user is working on the database Manage data distribution and use

DBA’s Technical Role Evaluate, select, and install DBMS and related utilities Design and implement databases and applications Test and evaluate databases and applications Operate the DBMS, utilities, and applications Train and support users Maintain the DBMS, utilities, and applications

DBA’s Role in the Cloud Reduced role in installing and maintaining the DBMS as cloud services provide: DBMS installation and updates Server/network management Backup and recovery operations

Security Goals Confidentiality: Protecting data against unauthorized access Compliance: Activities that meet data privacy and security reporting guidelines Integrity: Keeping data consistent and free of errors or anomalies Availability: Accessibility of data whenever required by authorized users and for authorized purposes

Security Policy Collection of standards, policies, and procedures created to guarantee security Ensures auditing and compliance Security audit process Identifies security vulnerabilities Identifies measures to protect the system

Security Vulnerability Weakness in a system component that could allow unauthorized access or cause service disruptions Categories - Technical, managerial, cultural, and procedural Security threat: Imminent security violation Security breach: Occurs when a security threat is exploited and could lead to a database whose integrity is preserved or corrupted

Table 15.4 - Sample Security Vulnerabilities and Related Protective Measures

Table 15.4 - Sample Security Vulnerabilities and Related Protective Measures

Database Security DBMS features and related measures that comply with the security requirements Authorization management: Procedures to protect database security and integrity User access management View definition DBMS access control DBMS usage monitoring Audit log: Automatically records description of database operations performed by all users

Data Dictionary Types Integrated - Included with the DBMS Standalone - Third-party systems Active data dictionary: Automatically updated by the DBMS with every database access Passive data dictionary: Requires running a batch process Main function - Store description of all objects that interact with the database

Data Dictionary or Information Resource Dictionary Metadata is the basis for monitoring database use and for assigning access rights to users DBA uses data dictionary to support data analysis and design

Computer-Aided Systems Engineering (CASE) Tools Automated framework for the Systems Development Life Cycle (SDLC) Use structured methodologies and powerful graphical interfaces Front-end CASE tools: Provide support for the planning, analysis, and design phases Back-end CASE tools: Provide support for the coding and implementation phases

Components of a CASE Tool Graphics Screen painters and report generators Integrated repository Analysis segment Program documentation generator

Developing a Data Administration Strategy Information engineering (IE): Translates strategic goals into data and applications Information systems architecture (ISA): Helps plan, develop, and control future information systems Critical success factors Management commitment and defined standards Thorough analysis of the company situation End-user involvement, training, and a small pilot project

Using Oracle for Database Administration Ensure that the RDBMS starts automatically Create tablespaces and datafiles Tablespace: Logical storage space Datafile: Physically stores the database’s data Manage users and establish security User: Allows a given person to log on to the database Role: Authorize a user to connect to the database and use its system resources Profile: Control how much database resource a user can use

Using Oracle for Database Administration Customize the database initialization parameters Initialization parameters reserve resources used by the database at run time After modifying parameters, database may be required to restart

Types of Tablespace SYSTEM USERS TEMP UNDOTBS1 Stores the data dictionary data USERS Stores the table data created by the end users TEMP Stores the temporary tables and indexes created during the execution of SQL statements UNDOTBS1 Stores database transaction recovery information