0% found this document useful (0 votes)
5 views14 pages

Lecture 8-Data Database Administration v1

The document outlines the roles and responsibilities of data and database administration, distinguishing between high-level data administration and technical database administration. It discusses evolving approaches to these roles, including the integration of functions and the emergence of task-specific DBAs. Additionally, it highlights database security concerns, threats to data integrity, and various security features and solutions for protecting data in database systems.

Uploaded by

isaac rubia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views14 pages

Lecture 8-Data Database Administration v1

The document outlines the roles and responsibilities of data and database administration, distinguishing between high-level data administration and technical database administration. It discusses evolving approaches to these roles, including the integration of functions and the emergence of task-specific DBAs. Additionally, it highlights database security concerns, threats to data integrity, and various security features and solutions for protecting data in database systems.

Uploaded by

isaac rubia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

DATABASE SYSTEMS

8. Data and Database


Administration
Traditional Administration Definitions
2

Data Administration: A high-level


function that is responsible for the overall
management of data resources in an
organization, including maintaining
corporate-wide definitions and
standards
Database Administration: A technical
function that is responsible for physical
database design and for dealing with
technical issues such as security
enforcement, database performance,
and backup and recovery
Traditional Data Administration
3
Functions
 Data policies, procedures, standards
 Planning
 Data conflict (ownership) resolution
 Managing the information repository

Traditional Database Administration Functions


 Selection of DBMS and software tools
 Installing/upgrading DBMS
 Tuning database performance
 Improving query processing performance
 Data backup and recovery
Data Modeling Responsibilities
4
Evolving Approaches to Data
5 and Database Administration
 Blend data and database administration into
one role
 Fast-track development – (planning, analysis,
design, implementation, maintenance)
 Task Specific DBAs
Procedural DBAs –managing quality of triggers
and stored procedures
Electronic DBAs –managing Internet-enabled
database applications
PDA DBA –data synchronization and personal
database management
 Data warehouse administration
Open Source DBMSs
6
 An alternative to proprietary packages such as Oracle, Microsoft SQL
Server, or Microsoft Access
 mySQL is an example of an open-source DBMS

Benefits
 Less expensive than proprietary packages
 Source code available, for modification
Drawbacks
 Absence of complete documentation
 Ambiguous licensing concerns
 Not as feature-rich as proprietary DBMSs
 Vendors may not have certification programs
Database Security
7

 Database Security: Protection of the data against accidental or


intentional loss, destruction, or misuse.

 Increased difficulty due to Internet access and client/server


technologies
Threats to Data Security
8
 Accidental losses attributable to e.g. through human error, software
failure or hardware failure
 Intentional Loss e.g. through sabotage
 Theft and fraud
 Improper data access that leads to Loss of privacy or confidentiality
 Loss of data integrity
Web Security
9
 Static HTML files are easy to secure through:
 Standard database access controls
 Place Web files in protected directories on server

 Dynamic pages are harder. This calls for:


 Control of CGI scripts
 User authentication
 Session security
 SSL for encryption
 Restrict number of users and open ports
 Remove unnecessary programs
Solutions
10
W3C Web Privacy Standard
11

 Platform for Privacy Protection (P3P) addresses the following:


 Who collects data
 What data is collected and for what purpose
 Who is data shared with
 Can users control access to their data
 How are disputes resolved
 Policies for retaining data
Database Software Security Features
12
1. Views - A view is a subset of the database that is presented to one
or more users. User can be given access privilege to view without
allowing access privilege to underlying tables
2. Integrity Controls – achieved by creating domains i.e. a set of
allowable values
3. Authentication Schemes - obtain a positive identification of the user.
E.g. Passwords, smart cards, Biometric devices, digital certificates
etc
4. user-defined procedures - Some DBMSs also provide capabilities for
to customize the authorization process by granting privileges
5. . Authorization Rules – Restrict access to data or actions that people
can take on data. An authorization matrix is designed for Subjects,
Objects, Actions and Constraints
6. Encryption – the coding or scrambling of data so that humans
cannot read them. Secure Sockets Layer (SSL) is a popular
encryption scheme for TCP/IP connections
13

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy