Data Integrity Lesson 12. Skills Matrix Maintaining Data Integrity Maintaining data integrity is your most important responsibility. –Performing backups.

Slides:



Advertisements
Similar presentations
Database Systems: Design, Implementation, and Management Tenth Edition
Advertisements

HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Database Administration and Security Transparencies 1.
DoD Information Technology Security Certification and Accreditation Process (DITSCAP) Phase III – Validation Thomas Howard Chris Pierce.
Information Security Policies and Standards
Chapter 2 Data Models Database Systems: Design, Implementation, and Management, Seventh Edition, Rob and Coronel.
3.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 3: Introducing Active Directory.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Getting Started (Excerpts) Chapter One DAVID M. KROENKE’S DATABASE CONCEPTS, 2 nd Edition.
Concepts of Database Management Seventh Edition
Operating System Security Chapter 9. Operating System Security Terms and Concepts An operating system manages and controls access to hardware components.
3.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 3: Introducing Active Directory.
Stephen S. Yau CSE , Fall Security Strategies.
Chapter 1 Introduction to Databases
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Service Broker Lesson 11. Skills Matrix Service Broker Service Broker, provides a solution to common problems with message delivery and consistency that.
5205 – IT Service Delivery and Support
Understanding Active Directory
Database Management System Lecture 2 Introduction to Database management.
1 Introducing Windows Backup There are different methods for starting Windows 2000 Backup. Requirements for running Windows 2000 Backup All users can back.
2 1 Chapter 2 Data Model Database Systems: Design, Implementation, and Management, Sixth Edition, Rob and Coronel.
SEC835 Database and Web application security Information Security Architecture.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 3 Administration of Users.
Concepts of Database Management Sixth Edition
Security in Practice Enterprise Security. Business Continuity Ability of an organization to maintain its operations and services in the face of a disruptive.
5.1 © 2004 Pearson Education, Inc. Lesson 5: Administering User Accounts Exam Microsoft® Windows® 2000 Directory Services Infrastructure Goals 
Concepts of Database Management Eighth Edition
Security Architecture
Operating System Security. OS manages and controls access to hardware components Older OSs focused on ensuring data confidentiality Modern operating systems.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Security David Frommer Principal Architect Business Intelligence Microsoft Partner of the Year 2005 & 2007.
Additional Security Tools Lesson 15. Skills Matrix.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
A PRIMER FOR KEEPING YOUR ENVIRONMENT IN SHAPE. SQL Server 2008 Policy Based Management By Scott Abrants.
The Client/Server Database Environment Ployphan Sornsuwit KPRU Ref.
Lecture # 3 & 4 Chapter # 2 Database System Concepts and Architecture Muhammad Emran Database Systems 1.
Database Systems DBMS Environment Data Abstraction.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Component 8/Unit 9bHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 9b Creating Fault Tolerant.
NT SECURITY Introduction Security features of an operating system revolve around the principles of “Availability,” “Integrity,” and Confidentiality. For.
Slides copyright 2010 by Paladin Group, LLC used with permission by UMBC Training Centers, LLC.
Permissions Lesson 13. Skills Matrix Security Modes Maintaining data integrity involves creating users, controlling their access and limiting their ability.
Module 9: Designing Security for Data. Overview Creating a Security Plan for Data Creating a Design for Security of Data.
Introduction to Information Security
Security fundamentals Topic 2 Establishing and maintaining baseline security.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
CHAPTER 5 MANAGING USER ACCOUNTS & GROUPS. User Accounts Windows 95, 98 & Me do not need a user account like Windows XP Professional to access computer.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
SQL Server 2005 Implementation and Maintenance Chapter 6: Security and SQL Server 2005.
Endpoints Lesson 17. Skills Matrix Endpoints Endpoints provide a reliable, securable, scalable messaging system that enables SQL Server to communicate.
Introduction to Core Database Concepts Getting started with Databases and Structure Query Language (SQL)
Disaster Recovery Planning (DRP) DRP: The definition of business processes, their infrastructure supports and tolerances to interruptions, and formulation.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
Module 5: Designing Physical Security for Network Resources
SQL Implementation & Administration
CS457 Introduction to Information Security Systems
Blackboard Security System
Administrating a Database
Operating System Security
Introduction of Week 6 Assignment Discussion
IS4680 Security Auditing for Compliance
السلوك التنظيمى المعاصر
IS4680 Security Auditing for Compliance
IS4680 Security Auditing for Compliance
Understanding the issues related to the use of information
Administrating a Database
06 | SQL Server and the Cloud
Presentation transcript:

Data Integrity Lesson 12

Skills Matrix

Maintaining Data Integrity Maintaining data integrity is your most important responsibility. –Performing backups of all data on a regular schedule as your first layer of defense. –The time between the last backup and the moment of disaster could involve some data loss. –You must work with your management to find the acceptable loss rate, combined with the investment rate to avoid the anticipated loss, to maintain this goal.

Enforcing Organizational Security Policies The most important phase of maintaining data integrity, and the effort demanding your greatest attention, is the “watchdog” phase. You must constantly run baselines to check for performance degradation and potential data losses. You must constantly encourage users to use safe practices.

Identifying Risk 1.Asset identification 2.Risk assessment 3.Threat identification 4.Vulnerability assessment

Understanding Forensic Requirements Evidence collection Evidence preservation Chain of custody Jurisdiction

Implementing Physical Security Measures Buildings and grounds Devices Communications Storage media

Planning and Education Creating a Business Continuity Plan (BCP) Creating a disaster recovery plan (DRP) Educating Users

Backup, Backup, Backup A backup and restoration process creates your first line of defense against data loss. A backup copies your data to a store somewhere other than on the mass storage devices supporting your database, usually on some type of tape media. –You can also store a backup on a hard drive on another computer connected over a local area network (LAN).

Security Plan The first step in safeguarding any type of system must be a good security plan: –Type of users –Fixed server roles –Database access –Type of access –Group permissions –Object creation –Auditing –Public role permissions –Guest access

SQL Server’s Security Architecture Starting with SQL Server 2005, Microsoft introduced the concepts of working with principles, securables and permissions. –Principle: An entity (such as a login, user, group, or role) that can be granted access to a securable resource. –Securable: Entities that can be secured with permissions. –Permissions: A rule associated with an object to regulate which users can gain access to the object and in what manner.

Maintaining Data Integrity Principals are entities that can request SQL Server resources. Principals are arranged in a hierarchy. The scope of influence of a principal depends on the scope of the definition of the principal: Windows, Server, Database, or whether the principal is indivisible or a collection Every principal has a security identifier (SID).

Principals

Qualified Name Every object in a database has a unique four part fully qualified name in the form InstanceName.DatabaseName.SchemaNam e.ObjectName. –This implies a server level, database level, schema level, and object level hierarchy.

Qualified Name The four part SQL Server security architecture begins with the InstanceName. SQL Server can be installed into multiple instances on a single Windows operating system (OS) and hardware platform. The default SQL Server installation assumes the name of the OS platform and thus this four part naming convention has been traditionally expressed as ServerName.DatabaseName.SchemaName.ObjectName Within each of these four scopes exist securables.

Securables

Permissions Within each of these scopes exist permissions. Permissions complete the security architecture model. The permissions available for data manipulation language (DML) securables.

Permissions Applicable to DML Securables

Summary This lesson examined the forethought and planning that must be undertaken to maintain data integrity. –Don’t forget anything. Can a water pipe rupturing flood your computer room? –Test your recovery plan for every possible disaster. –Practice a database restore (to a different spindle) to assure your procedures actually work.

Summary SQL Server has a sophisticated security system that allows you to carefully implement your security plan.

Summary for Certification Examination Understand SQL Server’s security architecture. –Understand the concepts of permissions, securables and principles.

Summary You can partition views in the same way you can partition tables and for the same reasons: store parts of your views on different spindles or even different servers.