1 Data and Database Administration Data and Database Administration By Lec. Adeel Shahzad FromBook-B.

Slides:



Advertisements
Similar presentations
Chapter 11: Data and Database Administration
Advertisements

Auditing Computer-Based Information Systems
Database Administration and Security Transparencies 1.
Chapter 11: data and Database Administration
Monday, 08 June 2015Dr. Mohamed Osman1 What is Database Administration A high level function (technical Function) that is responsible for ► physical DB.
10/25/2001Database Management -- R. Larson Data Administration and Database Administration University of California, Berkeley School of Information Management.
© 2005 by Prentice Hall 1 Chapter 12: Data and Database Administration Modern Database Management 7 th Edition Jeffrey A. Hoffer, Mary B. Prescott, Fred.
Database Integrity, Security and Recovery Database integrity Database integrity Database security Database security Database recovery Database recovery.
Web Site Security ISYS 512/812. Authentication Authentication is the process that determines the identity of a user. Web.config file – node Options: –Windows:
Data and Database Administration
Concurrency Control. R/RR/W W/W User 2 ReadWrite User 1 Read Write R/W: Inconsistent Read problem. W/W: Lost Update problem.
© 2007 by Prentice Hall 1 Chapter 12: Data and Database Administration Modern Database Management 8 th Edition Jeffrey A. Hoffer, Mary B. Prescott, Fred.
Chapter 8 Security Transparencies © Pearson Education Limited 1995, 2005.
IS 4420 Database Fundamentals Chapter 12: Data and Database Administration Leon Chen.
Concepts of Database Management Seventh Edition
Chapter 1 Introduction to Databases
Business Intelligence: Data and Text Management Instructor: Bajuna Salehe Web:
10/5/1999Database Management -- R. Larson Data Administration and Database Administration University of California, Berkeley School of Information Management.
Chapter 19 Security Transparencies. 2 Chapter 19 - Objectives Scope of database security. Why database security is a serious concern for an organization.
© 2009 Pearson Education, Inc. Publishing as Prentice Hall 1 Chapter 13: Data and Database Administration Modern Database Management 9 th Edition Jeffrey.
1 © Prentice Hall, 2002 Chapter 12: Data and Database Administration Modern Database Management 6 th Edition Jeffrey A. Hoffer, Mary B. Prescott, Fred.
Data and Database Administration CISB514 Advanced Database  At the end of this chapter, you should be able to:  Define terms related to data & dbase.
Data and Database Administration CISB344 Database 2  At the end of this chapter, you should be able to:  Define terms related to data & database administration.
D ATABASE A DMINISTRATION ITEC 450 Fall 2012 Instructor: Dr. Rama Gudhe.
© Pearson Education Limited, Chapter 5 Database Administration and Security Transparencies.
Data and Database Administration
© 2013 Pearson Education, Inc. Publishing as Prentice Hall 1 CHAPTER 11: DATA AND DATABASE ADMINISTRATION Modern Database Management 11 th Edition Jeffrey.
Data Administration & Database Administration
Concepts of Database Management Sixth Edition
© 2013 Pearson Education, Inc. Publishing as Prentice Hall 1 CHAPTER 11: DATA AND DATABASE ADMINISTRATION Modern Database Management 11 th Edition Jeffrey.
© 2011 Pearson Education, Inc. Publishing as Prentice Hall 1 Chapter 11: Data and Database Administration Modern Database Management 10 h Edition Jeffrey.
DBSQL 7-1 Copyright © Genetic Computer School 2009 Chapter 7 Transaction Management, Database Security and Recovery.
1 Topics in Database Administration u What is database administration? u What are the tasks involved in establishing, creating, implementing and maintaining.
Concepts of Database Management, Fifth Edition Chapter 8: Database Administration.
DATABASE UTILITIES. D ATABASE S YSTEM U TILITIES In addition to possessing the software modules most DBMSs have database utilities that help the DBA in.
AL-MAAREFA COLLEGE FOR SCIENCE AND TECHNOLOGY INFO 232: DATABASE SYSTEMS CHAPTER 1 DATABASE SYSTEMS (Cont’d) Instructor Ms. Arwa Binsaleh.
Concepts of Database Management Eighth Edition
MIS 385/MBA 664 Systems Implementation with DBMS/ Database Management Dave Salisbury ( )
The protection of the DB against intentional or unintentional threats using computer-based or non- computer-based controls. Database Security – Part 2.
© 2009 Pearson Education, Inc. Publishing as Prentice Hall 1 UNIT 9: Data Management Modern Database Management 9 th Edition Jeffrey A. Hoffer, Mary B.
Topics in Database Administration What is database administration? What is data administration? What are the tasks involved in establishing, creating,
D ATABASE A DMINISTRATION L ECTURE N O 3 Muhammad Abrar.
DA vs. DBA The University of California Berkeley Extension Copyright © 2011 Patrick McDermott.
Introduction to Databases
CSCI 3140 Module 6 – Database Security Theodore Chiasson Dalhousie University.
Database Administration
Data & Database Administration
1 Chapter 12: Data and Database Administration Modern Database Management Jeffrey A. Hoffer, Mary B. Prescott, Fred R. McFadden.
MBA 664 Database Management Dave Salisbury ( )
TM 13-1 Copyright © 1999 Addison Wesley Longman, Inc. Data and Database Administration.
Chapter 11 © 2013 Pearson Education, Inc. Publishing as Prentice Hall Chapter 11: data and Database Administration Modern Database Management 11 th Edition.
Topics in Database Administration What is database administration? What is data administration? What are the tasks involved in establishing, creating,
Database Administration Basics. Basic Concepts and Definitions  Data Facts that can be recorded and stored  Metadata Data that describes properties.
Data and Database Administration CS263 Lecture 15.
© 2013 Pearson Education, Inc. Publishing as Prentice Hall 1 CHAPTER 11: DATA AND DATABASE ADMINISTRATION Modern Database Management 11 th Edition Jeffrey.
Chapter 5 Managing Multi-user Databases 1. Multi-User Issues Database Administration Concurrency Control Database Security Database Recovery Page 307.
Web Database Security Session 12 & 13 Matakuliah: Web Database Tahun: 2008.
© 2009 Pearson Education, Inc. Publishing as Prentice Hall 1 Lecture 13: Data and Database Administration Modern Database Management 9 th Edition Jeffrey.
Database Security Threats. Database An essential corporate resource Data is a valuable resource Must be strictly controlled, managed and secured May have.
Copyright © 2016 Pearson Education, Inc. CHAPTER 12: DATA AND DATABASE ADMINISTRATION Modern Database Management 12 th Edition Jeff Hoffer, Ramesh Venkataraman,
TM 13-1 Copyright © 1999 Addison Wesley Longman, Inc. Data and Database Administration.
Chapter 12: Data and Database Administration
Data and database administration
IS 325 Notes for Thursday September 7, 2017.
Chapter 12: Data and Database Administration
Managing Multi-user Databases
LM 8 Data Administration & Database Administration
Chapter 12: Data and Database Administration
Chapter 12: Data and Database Administration
Presentation transcript:

1 Data and Database Administration Data and Database Administration By Lec. Adeel Shahzad FromBook-B

Chapter 13 2 Objectives Definition of terms Definition of terms List functions and roles of data/database administration List functions and roles of data/database administration Describe role of data dictionaries and information repositories Describe role of data dictionaries and information repositories Compare optimistic and pessimistic concurrency control Compare optimistic and pessimistic concurrency control Describe problems and techniques for data security Describe problems and techniques for data security Describe problems and techniques for data recovery Describe problems and techniques for data recovery Describe database tuning issues and list areas where changes can be done to tune the database Describe database tuning issues and list areas where changes can be done to tune the database Describe importance and measures of data availability Describe importance and measures of data availability

Chapter 13 3 Traditional Administration Definitions Data Administration: A high-level function that is responsible for the overall management of data resources in an organization, including maintaining corporate-wide definitions and standards Data Administration: A high-level function that is responsible for the overall management of data resources in an organization, including maintaining corporate-wide definitions and standards Database Administration: A technical function that is responsible for physical database design and for dealing with technical issues such as security enforcement, database performance, and backup and recovery Database Administration: A technical function that is responsible for physical database design and for dealing with technical issues such as security enforcement, database performance, and backup and recovery

Chapter 13 4 Traditional Data Administration Functions Data policies, procedures, standards Data policies, procedures, standards Planning Planning Data conflict (ownership) resolution Data conflict (ownership) resolution Managing the information repository Managing the information repository Internal marketing of DA concepts Internal marketing of DA concepts

Chapter 13 5 Traditional Database Administration Functions Selection of DBMS and software tools Selection of DBMS and software tools Installing/upgrading DBMS Installing/upgrading DBMS Tuning database performance Tuning database performance Improving query processing performance Improving query processing performance Managing data security, privacy, and integrity Managing data security, privacy, and integrity Data backup and recovery Data backup and recovery

Chapter 13 6 Evolving Approaches to Data Administration Blend data and database administration into one role Blend data and database administration into one role Fast-track development–monitoring development process (planning, analysis, design, implementation, maintenance) Fast-track development–monitoring development process (planning, analysis, design, implementation, maintenance) Procedural DBAs–managing quality of triggers and stored procedures Procedural DBAs–managing quality of triggers and stored procedures eDBA–managing Internet-enabled database applications eDBA–managing Internet-enabled database applications PDA DBA–data synchronization and personal database management PDA DBA–data synchronization and personal database management Data warehouse administration Data warehouse administration

Chapter 13 7 Open Source DBMSs An alternative to proprietary packages such as Oracle, Microsoft SQL Server, or Microsoft Access An alternative to proprietary packages such as Oracle, Microsoft SQL Server, or Microsoft Access mySQL is an example of an open-source DBMS mySQL is an example of an open-source DBMS Less expensive than proprietary packages Less expensive than proprietary packages Source code available, for modification Source code available, for modification Absence of complete documentation Absence of complete documentation Ambiguous licensing concerns Ambiguous licensing concerns Not as feature-rich as proprietary DBMSs Not as feature-rich as proprietary DBMSs Vendors may not have certification programs Vendors may not have certification programs

Chapter 13 8 Figure 13-2 Data modeling responsibilities

Chapter 13 9 Database Security Database Security: Protection of the data against accidental or intentional loss, destruction, or misuse Database Security: Protection of the data against accidental or intentional loss, destruction, or misuse Increased difficulty due to Internet access and client/server technologies Increased difficulty due to Internet access and client/server technologies

Chapter Figure 13-3 Possible locations of data security threats

Chapter Threats to Data Security Accidental losses attributable to: Accidental losses attributable to: – Human error – Software failure – Hardware failure Theft and fraud Theft and fraud Improper data access: Improper data access: – Loss of privacy (personal data) – Loss of confidentiality (corporate data) Loss of data integrity Loss of data integrity Loss of availability (through, e.g. sabotage) Loss of availability (through, e.g. sabotage)

Chapter Figure 13-4 Establishing Internet Security

Chapter Web Security Static HTML files are easy to secure Static HTML files are easy to secure – Standard database access controls – Place Web files in protected directories on server Dynamic pages are harder Dynamic pages are harder – Control of CGI scripts – User authentication – Session security – SSL for encryption – Restrict number of users and open ports – Remove unnecessary programs

Chapter Database Software Security Features Views or subschemasViews or subschemas Integrity controls( Accuracy, Completeness, Consistency )Integrity controls( Accuracy, Completeness, Consistency ) Authorization rulesAuthorization rules User-defined proceduresUser-defined procedures EncryptionEncryption Authentication schemesAuthentication schemes Backup, journalizing, and checkpointingBackup, journalizing, and checkpointing

Chapter Database Recovery  Mechanism for restoring a database quickly and accurately after loss or damage  Recovery facilities: Backup FacilitiesBackup Facilities Journalizing FacilitiesJournalizing Facilities Checkpoint FacilityCheckpoint Facility Recovery ManagerRecovery Manager

Chapter Back-up Facilities Automatic dump facility that produces backup copy of the entire database Automatic dump facility that produces backup copy of the entire database Periodic backup (e.g. nightly, weekly) Periodic backup (e.g. nightly, weekly) Cold backup–database is shut down during backup Cold backup–database is shut down during backup Hot backup–selected portion is shut down and backed up at a given time Hot backup–selected portion is shut down and backed up at a given time Backups stored in secure, off-site location Backups stored in secure, off-site location

Chapter Checkpoint Facilities DBMS periodically refuses to accept new transactions DBMS periodically refuses to accept new transactions  system is in a quiet state  system is in a quiet state Database and transaction logs are synchronized Database and transaction logs are synchronized This allows recovery manager to resume processing from short period, instead of repeating entire day