Database Administration and Security

Get Started. It's Free
or sign up with your email address
Database Administration and Security by Mind Map: Database Administration and Security

1. Evolution of Database Administration Function

1.1. Information system department

1.1.1. Provide end user with data management support and solution for information needs

1.2. Database adminstrator

1.2.1. Responsible for control of the centralized and shared database

1.3. System administrator

1.3.1. General coordinator of all BDAs

1.4. Data administrator/Information resources manager

1.4.1. High degree of responsibility and authority than the DBA

2. DBA's Managerial Role

2.1. Provide end user support

2.2. Enforce policies, procedures and standards for correct data creation, usage, and distribution within the database

2.3. Manage data security, privacy and integrity

2.4. Manage data backup and recovery

2.4.1. Fully recover data in case of data loss

2.4.2. Database security officer to ensure database security and integrity

2.4.3. Disaster management

2.4.4. Full backup/database dump

2.4.5. Incremental backup

2.4.6. Concurrent backup

2.5. Manage data distribution and use

3. DBA's Technical Role

3.1. Evaluate, select and install DBMS and related utilities

3.2. Design and implement databases and applications

3.3. Test and evaluate databases and applications

3.4. Operate DBMS, utilities and applications

3.5. Train and support users

3.6. Maintain the DBMS, utilities, and applications

4. DBA's Role in Cloud

4.1. DBMS installations and updates

4.2. Server/network management

4.3. Backup and recovery operations

5. Security Vulnerability

5.1. Weakness in a system component that could allow unauthorized access or cause service disruption

5.2. Categories

5.2.1. Technical

5.2.2. Managerial

5.3. Security threat

5.3.1. Imminent security violent

5.4. Security breach

5.4.1. Occurs when a security threat exploited and could lead to a database whose integrity is preserved or corrupted

6. CASE Tool

6.1. Automated framework of SDLC

6.2. Use structured methodologies and powerful graphical interfaces

6.3. Front-End CASE Tools

6.3.1. Provide support for the planning, analysis and design phases

6.4. Back-end CASE Tools

6.4.1. Provide support for the coding and implementation phases

6.5. Components

6.5.1. Graphics

6.5.2. Screen painters and report generators

6.5.3. Integrated repository

6.5.4. Analysis segment

6.5.5. Program documentation generators

7. Data

7.1. Dirty data

7.2. Data quality

7.3. Data profiling software

7.4. Master data management software

8. Special Consideration

8.1. Technological aspect

8.1.1. Select, install, configure and monitor DBS to ensure it operate efficiently

8.2. Managerial aspect

8.2.1. Careful planning to crete an appropriate organizational structure

8.3. Cultural aspect

8.3.1. Listen to people's concern about the system and explain its uses and benefits

9. Security Goals

9.1. Confidentiality

9.2. Compliance

9.3. Intergrity

9.4. Availability

10. Security Policy

10.1. Collection of standards, policies and procedures created to guarantee security

10.1.1. Ensure auditing and compliance

10.2. Security audit process

10.2.1. Identifies security vulnerabilities

10.2.2. Identifies measures to protect the system

11. Database Security

11.1. Features and related measures that comply with the security requirements

11.2. Authority management

11.2.1. User access management

11.2.2. View definition

11.2.3. DBMS access control

11.2.4. DBMS usage monitoring

12. Data Dictionary

12.1. Types

12.1.1. Integrated

12.1.2. Stand alone

12.2. Active data dictionary

12.3. Passive data dictionary