+ All Categories
Home > Documents > Data Administration

Data Administration

Date post: 03-Jan-2016
Category:
Upload: jayme-ruiz
View: 25 times
Download: 0 times
Share this document with a friend
Description:
Data and information are valuable assets. Data is used at many business levels Operations and transactions. Tactical management. Strategic management. There are many databases and applications in an organization. Someone has to be responsible for organizing, controlling, and sharing data. - PowerPoint PPT Presentation
38
1 D D A A T T A A B B A A S S E E Data Administration Data and information are valuable assets. Data is used at many business levels Operations and transactions. Tactical management. Strategic management. There are many databases and applications in an organization. Someone has to be responsible for organizing, controlling, and sharing data. Data Administrator (DA) Business Operations Tactical Management Strategic Management EIS ES DSS Tra n saction Processing Pr o cess Con t rol
Transcript
Page 1: Data Administration

1

DDAATTAABBAASSEE

Data Administration

Data and information are valuable assets.

Data is used at many business levels Operations and transactions. Tactical management. Strategic management.

There are many databases and applications in an organization.

Someone has to be responsible for organizing, controlling, and sharing data. Data Administrator (DA)

Business Operations

TacticalManagement

StrategicManagement

EIS

ESD

SSTr

ansa

ctio

n

Proc

essi

ng

Proc

ess

Con

trol

Page 2: Data Administration

2

DDAATTAABBAASSEE

Data Administrator (DA)

Provide centralized control over the data. Data definition.

Format Naming convention

Data integration. Selection of DBMS.

Act as data and database advocate. Application ideas. Decision support. Strategic uses.

Coordinate data integrity, security, and control.

Page 3: Data Administration

3

DDAATTAABBAASSEE

Database Administrator (DBA)

Install and upgrade DBMS. Create user accounts and

monitor security. In charge of backup and

recovery of the database. Monitor and tune the

database performance. Coordinate with DBMS

vendor and plan for changes.

Maintain DBMS-specific information for developers.

Page 4: Data Administration

4

DDAATTAABBAASSEE

DBA Tools: Oracle Schema Manager

Page 5: Data Administration

5

DDAATTAABBAASSEE

DBA Tools: SQL Server Enterprise Mgr.

Page 6: Data Administration

6

DDAATTAABBAASSEE

Microsoft Access

Page 7: Data Administration

7

DDAATTAABBAASSEE

DBA Tools: Performance Monitors

Page 8: Data Administration

8

DDAATTAABBAASSEE

Microsoft Access: Analyze PerformanceTools

AnalyzePerformance

Page 9: Data Administration

9

DDAATTAABBAASSEE

SQL Server Query Analyzer

Page 10: Data Administration

10

DDAATTAABBAASSEE

SQL Query Analyzer Detail

Page 11: Data Administration

11

DDAATTAABBAASSEE

Oracle Query Analysis

ALTER SYSTEM SET TIMED_STATISTICS=true;ALTER SYSTEM SET USER_DUMP_DEST= ‘newdir’;ALTER SESSION SET SQL_TRACE = true;

Run your queryALTER SESSION SET SQL_TRACE = false;

EXPLAIN PLAN SET STATEMENT_ID = ‘Your title’ INTO output FOR

Your query

Requires output table be setup first.

Page 12: Data Administration

12

DDAATTAABBAASSEE

Oracle SQL Trace

call count cpu elapsed disk query current rows----- ------ ----- ------- ----- ----- ------- ----Parse 1 0.02 0.04 0 0 0 0Execute 1 0.00 0.00 0 0 0 0Fetch 12 0.00 0.00 0 823 4 164----- ------ ----- ------- ----- ----- ------- ----total 14 0.02 0.04 0 823 4 164

Misses in library cache during parse: 1Optimizer goal: CHOOSEParsing user id: 26

Rows Row Source Operation------- --------------------------------------------- 164 NESTED LOOPS 303 NESTED LOOPS 197 TABLE ACCESS FULL SALE 498 INDEX RANGE SCAN (object id 3398) 164 TABLE ACCESS BY INDEX ROWID MERCHANDISE 604 INDEX UNIQUE SCAN (object id 3388)

Page 13: Data Administration

13

DDAATTAABBAASSEE

Database Administration Planning

Determine hardware and software needs.

DesignEstimate space requirements, estimate performance.

Implementation Install software, create databases, transfer data.

OperationMonitor performance, backup and recovery.

Growth and ChangeMonitor and forecast storage needs.

SecurityCreate user accounts, monitor changes.

Page 14: Data Administration

14

DDAATTAABBAASSEE

Database Planning

EstimationData storage requirementsTime to developCost to developOperations costs

Page 15: Data Administration

15

DDAATTAABBAASSEE

Managing Database Design Teamwork

Data standardsData repositoryReusable objectsCASE toolsNetworks / communication

Subdividing projectsDelivering in stages

User needs / prioritiesVersion upgrades

Normalization by user viewsDistribute individual sectionsCombine sections

Assign forms and reports

Page 16: Data Administration

16

DDAATTAABBAASSEE

Database Implementation

Standards for application programming.User interface.Programming standards.

Layout and techniques.Variable & object definition.

Test procedures.

Data access and ownership. Loading databases. Backup and recovery plans. User and operator training.

Page 17: Data Administration

17

DDAATTAABBAASSEE

Database Operation and Maintenance Monitoring usage

Size and growthPerformance / delaysSecurity logsUser problems

Backup and recovery User support

Help deskTraining classes

Page 18: Data Administration

18

DDAATTAABBAASSEE

Database Growth and Change Detect need for change

Size and speedStructures / design

Requests for additional data.Difficulties with queries.

Usage patternsForecasts

Delays in implementing changesTime to recognize needs.Time to get agreement and approval.Time to install new hardware.Time to create / modify software.

Page 19: Data Administration

19

DDAATTAABBAASSEE

Backup and Recovery

Backups are crucial! Offsite storage! Scheduled backup.

Regular intervals.Record time.Track backups.

Journals / logs Checkpoint Rollback / Roll forward

OrdID Odate Amount ...192 2/2/01 252.35 …193 2/2/01 998.34 …

OrdID Odate Amount ...192 2/2/01 252.35 …193 2/2/01 998.34 …194 2/2/01 77.23 ...

OrdID Odate Amount ...192 2/2/01 252.35 …193 2/2/01 998.34 …194 2/2/01 77.23 …195 2/2/01 101.52 …

Snapshot

Changes

Journal/Log

Page 20: Data Administration

20

DDAATTAABBAASSEE

Database Security and Privacy

Physical security Protecting hardware Protecting software and

data.

Logical security Unauthorized disclosure Unauthorized modification Unauthorized withholding

Security Threats Employees / Insiders

Disgruntled employees “Terminated” employees Dial-up / home access

Programmers Time bombs Trap doors

Visitors Consultants Business partnerships

Strategic sharing EDI

Hackers--Internet

Page 21: Data Administration

21

DDAATTAABBAASSEE

Data Privacy

Who owns data?Customer rights.International complications.

Do not release data to others.Do not read data unnecessarily.Report all infractions and problems.

Page 22: Data Administration

22

DDAATTAABBAASSEE

Physical Security Hardware

Preventing problemsFire preventionSite considerationsBuilding design

Hardware backup facilities

Continuous backup (mirror sites)

Hot sitesShell sites “Sister” agreements

Telecommunication systems

Personal computers

Data and softwareBackupsOff-site backupsPersonal computers

Policies and proceduresNetwork backup

Disaster planningWrite it downTrain all new employeesTest it once a yearTelecommunications

Allowable time between disaster and business survival limits.

Page 23: Data Administration

23

DDAATTAABBAASSEE

Physical Security Provisions

Backup data. Backup hardware. Disaster planning and testing. Prevention.

Location. Fire monitoring and control. Control physical access.

Page 24: Data Administration

24

DDAATTAABBAASSEE

Managerial Controls

“Insiders” Hiring Termination Monitoring Job segmentation Physical access limitations

LocksGuards and video monitoringBadges and tracking

Consultants and Business alliances Limited data access Limited physical access Paired with employees

Page 25: Data Administration

25

DDAATTAABBAASSEE

Logical Security

Unauthorized disclosure. Unauthorized modification. Unauthorized withholding.

Disclosure example Letting a competitor see the

strategic marketing plans.

Modification example Letting employees change

their salary numbers.

Withholding example Preventing a finance officer

from retrieving data needed to get a bank loan.

Page 26: Data Administration

26

DDAATTAABBAASSEE

User Identification

User identification Accounts

Individual Groups

Passwords Do not use “real” words. Do not use personal (or pet)

names. Include non-alphabetic

characters. Use at least 6 (8)

characters. Change it often. Too many passwords!

Alternative identification Finger / hand print readers Voice Retina (blood vessel) scans DNA typing

Hardware passwords The one-minute password. Card matched to computer. Best method for open

networks / Internet.

Page 27: Data Administration

27

DDAATTAABBAASSEE

Basic Security Ideas

Limit access to hardware Physical locks. Video monitoring. Fire and environment

monitors. Employee logs / cards. Dial-back modems

Monitor usage Hardware logs. Access from network nodes. Software and data usage.

Background checks Employees Consultants

phonecompany

phonecompany

14

5

2

3

Jones 1111Smith 2222Olsen 3333Araha 4444

Dialback modem User calls modem Modem gets name, password Modem hangs up phone Modem calls back user Machine gets final password

Page 28: Data Administration

28

DDAATTAABBAASSEE

Access Controls Operating system

Access to directoriesReadView / File scanWriteCreateDelete

Access to filesReadWriteEditDelete

DBMS usually needs most of these

Assign by user or group.

DBMS access controls Read Data Update Data Insert Data Delete Data Open / Run Read Design Modify Design Administer

Owners and administrator Need separate user

identification / login to DBMS.

Page 29: Data Administration

29

DDAATTAABBAASSEE

SQL Security Commands GRANT privileges REVOKE privileges Privileges include

SELECT DELETE INSERT UPDATE

Objects include Table Table columns (SQL 92+) Query

Users include Name/Group PUBLIC

GRANT INSERTON BicycleTO OrderClerks

REVOKE DELETEON CustomerFROM Assemblers

Page 30: Data Administration

30

DDAATTAABBAASSEE

Oracle Security Manager

Page 31: Data Administration

31

DDAATTAABBAASSEE

SQL Server Security Manager

Page 32: Data Administration

32

DDAATTAABBAASSEE

Using Queries for Control

Permissions apply to entire table or query.

Use query to grant access to part of a table.

Example Employee table Give all employees read

access to name and phone (phonebook).

Give managers read access to salary.

SQL Grant Revoke

Employee(ID, Name, Phone, Salary)

Query: PhonebookSELECT Name, PhoneFROM Employee

SecurityGrant Read access to Phonebookfor group of Employees.

Grant Read access to Employeefor group of Managers.

Revoke all access to Employeefor everyone else (except Admin).

Page 33: Data Administration

33

DDAATTAABBAASSEE

Separation of Duties

SupplierID Name…673 Acme Supply772 Basic Tools983 Common X

Supplier

OrderID SupplierID8882 7728893 6738895 009

PurchaseOrder

Referentialintegrity

Clerk must use SupplierID from the Supplier table, and cannot add a new supplier.

Purchasing manager can add new suppliers, but cannot add new orders.

Page 34: Data Administration

34

DDAATTAABBAASSEE

Securing an Access Database

Set up a secure workgroup Create a new Admin user. Enable security by setting a password Remove the original Admin user.

Run the Security Wizard in the database to be secured. Assign user and group access privileges in the new

database. Encrypt the new database. Save it as an MDE file.

Page 35: Data Administration

35

DDAATTAABBAASSEE

Encryption Protection for open transmissions

Networks The Internet Weak operating systems

Single key Dual key

Protection Authentication

Trap doors / escrow keys U.S. export limits

64 bit key limit Breakable by brute force

Typical hardware:2 weeksSpecial hardware: minutes

Plain textmessage

Encryptedtext

Key: 9837362

Key: 9837362

DES

Encryptedtext

Plain textmessage

DES

Single key: e.g., DES

Page 36: Data Administration

36

DDAATTAABBAASSEE

Dual Key Encryption

Using Takao’s private key ensures it came from him. Using Makiko’s public key means only she can read it.

Makiko

TakaoPublic Keys

Makiko 29Takao 17

Private Key13

Private Key37

UseTakao’sPublic key

UseTakao’sPrivate key

Message

Message

Encrypt+T

Encrypt+T+M

Encrypt+M

UseMakiko’s

Public key

UseMakiko’s

Private key

Transmission

Page 37: Data Administration

37

DDAATTAABBAASSEE

Sally’s Pet Store: Security

ManagementSally/CEO

Sales StaffStore managerSales people

Business AlliancesAccountantAttorneySuppliersCustomers

ProductsSalesPurchasesReceive products

AnimalsSalesPurchasesAnimal Healthcare

EmployeesHiring/ReleaseHoursPay checks

AccountsPaymentsReceiptsManagement Reports

Users

Operations

Page 38: Data Administration

38

DDAATTAABBAASSEE

Sally’s Pet Store: Purchases

Purchase Query PurchaseItem QueryPurchaseMerchandiseOrder Supplier Employee City

OrderItem Merchandise

Sally/CEO W/A W/A R: ID, Name R W/A W/AStore Mgr. W/A R* R: ID, Name R A RSales people R R* R: ID, Name R R RAccountant R R* R: ID, Name R R RAttorney - - - - - -Suppliers R R* - R R RCustomers - - - - - -

*Basic Supplier data: ID, Name, Address, Phone, ZipCode, CityID

R: ReadW: WriteA: Add


Recommended