D ATABASE A DMINISTRATION L ECTURE N O 3 Muhammad Abrar.

Slides:



Advertisements
Similar presentations
Auditing Computer-Based Information Systems
Advertisements

Database Administration and Security Transparencies 1.
Data and Database Administration Chapter 12. Outline What is Concurrency Control? Background Serializability  Locking mechanisms.
Introduction to Database Management  Department of Computer Science Northern Illinois University January 2001.
Monday, 08 June 2015Dr. Mohamed Osman1 What is Database Administration A high level function (technical Function) that is responsible for ► physical DB.
10/25/2001Database Management -- R. Larson Data Administration and Database Administration University of California, Berkeley School of Information Management.
© 2005 by Prentice Hall 1 Chapter 12: Data and Database Administration Modern Database Management 7 th Edition Jeffrey A. Hoffer, Mary B. Prescott, Fred.
1 7 Concepts of Database Management, 4 th Edition, Pratt & Adamski Chapter 7 DBMS Functions.
Database Integrity, Security and Recovery Database integrity Database integrity Database security Database security Database recovery Database recovery.
1 8 Concepts of Database Management, 4 th Edition, Pratt & Adamski Chapter 8 Database Administration.
1 Minggu 7, Pertemuan 13 Security Matakuliah: T0206-Sistem Basisdata Tahun: 2005 Versi: 1.0/0.0.
Data and Database Administration
Chapter 8 Security Transparencies © Pearson Education Limited 1995, 2005.
IS 4420 Database Fundamentals Chapter 12: Data and Database Administration Leon Chen.
Concepts of Database Management Seventh Edition
Factors to be taken into account when designing ICT Security Policies
Functions of a Database Management System. Functions of a DBMS C.J. Date n Indexing n Views n Security n Integrity n Concurrency n Backup/Recovery n Design.
 Mechanism for restoring a database quickly and accurately after loss or damage  RESPONSIBILITY OF ?????  Recovery facilities: Backup Facilities Backup.
 Mechanism for restoring a database quickly and accurately after loss or damage  RESPONSIBILITY OF ?????  Recovery facilities: Backup Facilities Backup.
Chapter 1 Introduction to Databases
Business Intelligence: Data and Text Management Instructor: Bajuna Salehe Web:
10/5/1999Database Management -- R. Larson Data Administration and Database Administration University of California, Berkeley School of Information Management.
Chapter 19 Security Transparencies. 2 Chapter 19 - Objectives Scope of database security. Why database security is a serious concern for an organization.
1 © Prentice Hall, 2002 Chapter 12: Data and Database Administration Modern Database Management 6 th Edition Jeffrey A. Hoffer, Mary B. Prescott, Fred.
II.I Selected Database Issues: 1 - SecuritySlide 1/24 II. Selected Database Issues Part 1: Security Lecture 1 Lecturer: Chris Clack 3C13/D6.
© Pearson Education Limited, Chapter 5 Database Administration and Security Transparencies.
D ATABASE A DMINISTRATION L ECTURE N O 4 Muhammad Abrar.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
Data and Database Administration
© 2013 Pearson Education, Inc. Publishing as Prentice Hall 1 CHAPTER 11: DATA AND DATABASE ADMINISTRATION Modern Database Management 11 th Edition Jeffrey.
ISOM MIS3150 Data and Info Mgmt Database Security Arijit Sengupta.
Managing Multi-User Databases AIMS 3710 R. Nakatsu.
This presentation prepared for MIS 421 / MBA 575 at Western Washington University. Material in this presentation drawn from Richard T. Watson, Data Management:
Concepts of Database Management Sixth Edition
DBSQL 7-1 Copyright © Genetic Computer School 2009 Chapter 7 Transaction Management, Database Security and Recovery.
1 Topics in Database Administration u What is database administration? u What are the tasks involved in establishing, creating, implementing and maintaining.
Multi-user Database Processing Architectures Architectures Transactions Transactions Security Security Administration Administration.
Concepts of Database Management Sixth Edition
The University of Akron Dept of Business Technology Computer Information Systems DBMS Functions 2440: 180 Database Concepts Instructor: Enoch E. Damson.
Concepts of Database Management, Fifth Edition
Concepts of Database Management, Fifth Edition Chapter 8: Database Administration.
DATABASE UTILITIES. D ATABASE S YSTEM U TILITIES In addition to possessing the software modules most DBMSs have database utilities that help the DBA in.
Concepts of Database Management Eighth Edition
Data & Databases Basic Data Fundamentals. Data vs Information l Data: facts Computer systems store data. l Information: facts organized for a specific.
Security and Transaction Nhi Tran CS 157B - Dr. Lee Fall, 2003.
The protection of the DB against intentional or unintentional threats using computer-based or non- computer-based controls. Database Security – Part 2.
Topics in Database Administration What is database administration? What is data administration? What are the tasks involved in establishing, creating,
Lecture 12 Recoverability and failure. 2 Optimistic Techniques Based on assumption that conflict is rare and more efficient to let transactions proceed.
Chapter 1 Introduction to Databases. 1-2 Chapter Outline   Common uses of database systems   Meaning of basic terms   Database Applications  
Database Security Outline.. Introduction Security requirement Reliability and Integrity Sensitive data Inference Multilevel databases Multilevel security.
CSCI 3140 Module 6 – Database Security Theodore Chiasson Dalhousie University.
14.1/21 Part 5: protection and security Protection mechanisms control access to a system by limiting the types of file access permitted to users. In addition,
IT Auditing & Assurance, 2e, Hall & Singleton Chapter 3: Data Management Systems.
Data & Database Administration
ADVANTAGES OF DATA BASE MANAGEMENT SYSTEM. TO BE DICUSSED... Advantages of Database Management System  Controlling Data RedundancyControlling Data Redundancy.
MBA 664 Database Management Dave Salisbury ( )
TM 13-1 Copyright © 1999 Addison Wesley Longman, Inc. Data and Database Administration.
Topics in Database Administration What is database administration? What is data administration? What are the tasks involved in establishing, creating,
Data and Database Administration CS263 Lecture 15.
1 Data and Database Administration Data and Database Administration By Lec. Adeel Shahzad FromBook-B.
1 Chapter 7 Data Protection Data Recovery As with almost all complex forms of computer hardware and software, there is always the possibility.
Database Security Threats. Database An essential corporate resource Data is a valuable resource Must be strictly controlled, managed and secured May have.
Copyright © 2016 Pearson Education, Inc. CHAPTER 12: DATA AND DATABASE ADMINISTRATION Modern Database Management 12 th Edition Jeff Hoffer, Ramesh Venkataraman,
TM 13-1 Copyright © 1999 Addison Wesley Longman, Inc. Data and Database Administration.
Chapter 12: Data and Database Administration
Functions of a Database Management System
LM 8 Data Administration & Database Administration
Database Security &Threats
Introduction of Week 13 Return assignment 11-1 and 3-1-5
Implementation of security elements in database
Presentation transcript:

D ATABASE A DMINISTRATION L ECTURE N O 3 Muhammad Abrar

D ATABASE A DMINISTRATION A technical function that is responsible for physical database design and for dealing with technical issues such as security enforcement, database performance, and backup and recovery

D ATABASE S ECURITY Protection of the data against accidental or intentional loss, destruction or misuse

T HREATS TO D ATA S ECURITY Accidental losses, including human error, software, and hardware caused breaches Theft and fraud Loss of privacy or confidentiality Loss of data integrity Loss of availability

D ATA S ECURITY P LAN A comprehensive data security plan will include establishing administrative policies and procedures, physical protections, and data management software protections

S ECURITY F EATURES OF D ATA M ANAGEMENT S OFTWARE Views or Schemas: Which restrict user views of the database Authorization Rules: Which identify users and restrict the action they may take against the database User-defined procedures: Which define additional constraints or limitations in using a database

D ATA M ANAGEMENT S OFTWARE F EATURES Encryption Procedures: Which encodes data in an unrecognizable form Authorization Schemes: Which positively identify a person attempting to gain access to the database Backup, journaling, and checkpoint capabilities: These facilitate recovery procedures

V IEWS A subset of the database that is presented to one or more users. A view is created by querying one or more of the base tables, producing a dynamic result for the user at the time of request

AUTHORIZATION RULES Controls incorporated in the data management systems that restrict access to data and also restrict the action s that people may take when they access data. For example, a person who can supply a password may be authorized to read any record in the database but can not necessarily modify those records.

AUTHORIZATION TABLES A table that specifies who is authorized to perform which type of action against an object and under what condition. Example

AUTHORIZATION TABLES/MATRICES Most of the customary DBMSs don’t implement the authorization tables directly. They rather use simplified versions of authorization tables. Usually two types of simple tables are used. Authorization table for subjects Authorization tables for objects

AUTHORIZATION TABLE FOR SUBJECTS(SALESPERSONS) TABLE

AUTHORIZATION TABLE FOR OBJECTS(ORDER RECORDS)

ORACLE AUTHORIZATION SCHEME Oracle defines the following privileges that can be granted to users at database, table, or column levels

ORACLE PRIVILEGES TABLE OF ORACLE PRIVILEGES

ENCRYPTION The coding or scrambling of data so that humans cannot read them This facility can be used to secure sensitive data during storage and transmission

BIOMETRIC DEVICES Measures or detects personal characteristics such as fingerprints, voice points, eye pictures, or signature dynamics

BACKING UP DATABASES Uses mechanisms for restoring a database quickly and accurately after loss or damage These are called recovery mechanisms

BASIC RECOVERY FACILITIES BACKUP FASCILITIES: Which provide periodic backup copies of the database JOURNALISTING FACILITIES: Which maintain an audit trail of transactions and database changes CHECKPOINT FACILITY: By this the DBMS periodically suspends all processing and synchronize its files and journals RECOVERY MANAGER: Which allows the DBMS to restore the database to a correct condition and restart processing transactions

JOURNALISTING FACILITIES An audit trail of transactions and database changes. This facility is based on the following concepts TRANSACTION: A discrete unit of work that must be completely processed or not processed at all within a computer system. entering a customer order is an example of a transaction

JOURNALISTING FACILITIES TRANSACTION LOG: Contains a record of the essential data for each transaction that is processed against the database DATABASE CHANGE LOG: Contains before and after images of records that have been modified by transactions BEFORE-IMAGE : A copy of a record or page of memory before it has been modified AFTER-IMAGE: A copy of records or page of memory after it has been modified

CHECKPOINT FACILITY A facility by which the DBMS periodically refuses to accept any new transactions. The system is in a quite state, and the database and transaction logs are synchronized

CHECKPOINT FACILITY The system refuses to accept any new transaction. All current transactions are completed and journal files are brought update. Then the database and transaction logs are synchronized. The DBMS writes a special record called checkpoint record to the log file which is like the snapshot of the database. This record contains information to restart the system. Any dirty data blocks are written to the system

RECOVERY PROCEDURES Procedures used to restore the database after it has been lost or damaged RECOVERY MANAGER: A module of the DBMS that restore the database to a correct condition when a failure occur and resumes processing user requests

TYPES OF DATABASE FAILURES ABORTED TRANSACTIONS: A Transaction In Processing That Terminates Abnormally SYSTEM FAILURE: Power failure, network failure, hardware failure etc DATABASE DESTRUCTION: The database itself is lost or destroyed or cannot be read

CONTROLLING CONCURRENT ACCESS The process of managing simultaneous operations against a database so that data integrity is maintained and the operations do not interfere with each other in a multiuser environment

CONCURRENCY PROBLEMS An unrepeatable read, one that occurs when one user reads data that have been partially updated by another user