Database Administration and Security

Get Started. It's Free
or sign up with your email address
Rocket clouds
Database Administration and Security by Mind Map: Database Administration and Security

1. Data

1.1. Dirty data

1.2. Data quality

1.3. Data profiling software

1.4. Master data management software

2. Special Consideration

2.1. Technological aspect

2.1.1. Select, install, configure and monitor DBS to ensure it operate efficiently

2.2. Managerial aspect

2.2.1. Careful planning to crete an appropriate organizational structure

2.3. Cultural aspect

2.3.1. Listen to people's concern about the system and explain its uses and benefits

3. Evolution of Database Administration Function

3.1. Information system department

3.1.1. Provide end user with data management support and solution for information needs

3.2. Database adminstrator

3.2.1. Responsible for control of the centralized and shared database

3.3. System administrator

3.3.1. General coordinator of all BDAs

3.4. Data administrator/Information resources manager

3.4.1. High degree of responsibility and authority than the DBA

4. DBA's Managerial Role

4.1. Provide end user support

4.2. Enforce policies, procedures and standards for correct data creation, usage, and distribution within the database

4.3. Manage data security, privacy and integrity

4.4. Manage data backup and recovery

4.4.1. Fully recover data in case of data loss

4.4.2. Database security officer to ensure database security and integrity

4.4.3. Disaster management

4.4.4. Full backup/database dump

4.4.5. Incremental backup

4.4.6. Concurrent backup

4.5. Manage data distribution and use

5. DBA's Technical Role

5.1. Evaluate, select and install DBMS and related utilities

5.2. Design and implement databases and applications

5.3. Test and evaluate databases and applications

5.4. Operate DBMS, utilities and applications

5.5. Train and support users

5.6. Maintain the DBMS, utilities, and applications

6. DBA's Role in Cloud

6.1. DBMS installations and updates

6.2. Server/network management

6.3. Backup and recovery operations

7. Security Goals

7.1. Confidentiality

7.2. Compliance

7.3. Intergrity

7.4. Availability

8. Security Policy

8.1. Collection of standards, policies and procedures created to guarantee security

8.1.1. Ensure auditing and compliance

8.2. Security audit process

8.2.1. Identifies security vulnerabilities

8.2.2. Identifies measures to protect the system

9. Security Vulnerability

9.1. Weakness in a system component that could allow unauthorized access or cause service disruption

9.2. Categories

9.2.1. Technical

9.2.2. Managerial

9.3. Security threat

9.3.1. Imminent security violent

9.4. Security breach

9.4.1. Occurs when a security threat exploited and could lead to a database whose integrity is preserved or corrupted

10. Database Security

10.1. Features and related measures that comply with the security requirements

10.2. Authority management

10.2.1. User access management

10.2.2. View definition

10.2.3. DBMS access control

10.2.4. DBMS usage monitoring

11. Data Dictionary

11.1. Types

11.1.1. Integrated

11.1.2. Stand alone

11.2. Active data dictionary

11.3. Passive data dictionary

12. CASE Tool

12.1. Automated framework of SDLC

12.2. Use structured methodologies and powerful graphical interfaces

12.3. Front-End CASE Tools

12.3.1. Provide support for the planning, analysis and design phases

12.4. Back-end CASE Tools

12.4.1. Provide support for the coding and implementation phases

12.5. Components

12.5.1. Graphics

12.5.2. Screen painters and report generators

12.5.3. Integrated repository

12.5.4. Analysis segment

12.5.5. Program documentation generators