Database Administration and Security

Get Started. It's Free
or sign up with your email address
Database Administration and Security by Mind Map: Database Administration and Security

1. Data

1.1. Dirty data

1.1.1. Data that suffer from inaccuracies and inconsistencies

1.2. Data quality

1.2.1. Ensuring accuracy, validity, and timeliness of data

1.3. Data profiling software

1.3.1. Determine data patterns and compare them against standards defined by the organization

1.4. Master data management (MDM) software

1.4.1. Helps prevent dirty data by coordinating across multiple systems

2. Special Considerations

2.1. Technological aspect

2.1.1. Selecting, installing, configuring, and monitoring the DBMS to ensure that it operates efficiently

2.2. Managerial aspect

2.2.1. Careful planning to create an appropriate organizational structure

2.3. Cultural aspect

2.3.1. Listening to people’s concerns about the system and explaining its uses and benefits

3. Evolution of the Database Administration Function

3.1. Information systems (IS) department

3.1.1. Provides end users with data management support and solutions for information needs

3.2. Database administrator

3.2.1. Responsible for control of the centralized and shared database

3.3. Systems administrator

3.3.1. General coordinator of all DBAs

3.4. Data administrator (DA) or information resource manager (IRM)

3.4.1. Has a higher degree of responsibility and authority than the DBA

4. DBA’s Managerial Role

4.1. Provide end-user support

4.2. Enforce policies, procedures, and standards for correct data creation, usage, and distribution within the database

4.3. Manage data security, privacy, and integrity

4.4. Manage data backup and recovery -Fully recover data in case of data loss - Database security officer (DSO): Ensures database security and integrity

5. DBA’s Technical Role

5.1. Evaluate, select, and install DBMS and related utilities

5.2. Design and implement databases and applications

5.3. Test and evaluate databases and applications

5.4. Operate the DBMS, utilities, and applications

5.5. Train and support users

5.6. Maintain the DBMS, utilities, and applications

6. DBA’s Role in the Cloud

6.1. Reduced role in installing and maintaining the DBMS as cloud services provide:

6.1.1. DBMS installation and updates

6.1.2. Server/network management

6.1.3. Backup and recovery operations

7. Security Goals

7.1. Confidentiality: Protecting data against unauthorized access

7.2. Compliance: Activities that meet data privacy and security reporting guidelines

7.3. Integrity: Keeping data consistent and free of errors or anomalies

7.4. Availability: Accessibility of data whenever required by authorized users and for authorized purposes

8. Security Policy

8.1. Collection of standards, policies, and procedures created to guarantee security

8.1.1. Ensures auditing and compliance

8.2. Security audit process

8.2.1. Identifies security vulnerabilities

8.2.2. Identifies measures to protect the system

9. Security Vulnerability

9.1. Weakness in a system component that could allow unauthorized access or cause service disruptions

9.2. Categories - Technical, managerial, cultural, and procedural

9.3. Security threat: Imminent security violation

9.4. Security breach: Occurs when a security threat is exploited and could lead to a database whose integrity is preserved or corrupted

10. Database Security

10.1. Authorization management: Procedures to protect database security and integrity

10.1.1. User access management

10.1.2. View definition

10.1.3. DBMS access control

10.1.4. DBMS usage monitoring

11. Data Dictionary

11.1. Types

11.1.1. ntegrated - Included with the DBMS

11.1.2. Standalone - Third-party systems

11.2. Active data dictionary: Automatically updated by the DBMS with every database access

11.3. Passive data dictionary: Requires running a batch process

11.4. Main function - Store description of all objects that interact with the database

12. Components of a CASE Tool

12.1. Graphics

12.2. Screen painters and report generators

12.3. Integrated repository

12.4. Analysis segment

12.5. Program documentation generator

13. Types of Tablespace

13.1. SYSTEM

13.1.1. Stores the data dictionary data

13.2. USERS

13.2.1. Stores the table data created by the end users

13.3. TEMP

13.3.1. Stores the temporary tables and indexes created during the execution of SQL statements

13.4. UNDOTBS1

13.4.1. Stores database transaction recovery information