Chapter 12: Data and Database Administration - PowerPoint PPT Presentation

1 / 19
About This Presentation
Title:

Chapter 12: Data and Database Administration

Description:

... data security, privacy, and integrity. data backup and recovery ... facilitate recovery. Security: Views. Presents only data to which a user needs access ... – PowerPoint PPT presentation

Number of Views:265
Avg rating:3.0/5.0
Slides: 20
Provided by: steven69
Category:

less

Transcript and Presenter's Notes

Title: Chapter 12: Data and Database Administration


1
(No Transcript)
2
Chapter 12 Data and Database Administration
3
Data Administrator
  • Custodian of the organizations data
  • Develops procedures to protect and control data
    resource
  • Maintains corporate-wide data definitions and
    standards
  • Functional responsibilities planning, analysis,
    design, implementation, maintenance, protection
  • Should be a respected, senior-level middle
    manager
  • Requires a high level of managerial and technical
    skills

4
Database Administrator
  • Responsible for physical database design and
    technical issues
  • Carries through the standards and procedures
    established by data administrator
  • Broad technical background
  • Managerial skills are also critical

5
Corporate Data Management
  • Functions
  • data policies, procedures, and standards
  • planning
  • data conflict resolution
  • internal marketing
  • managing the data repository
  • selection of hardware and software
  • managing data security, privacy, and integrity
  • data backup and recovery

6
Planning for Databases
  • What data will be included?
  • What processes will the system perform?
  • What business locations will the system affect?
  • What work units and people will be affected by
    the system?
  • How will the system fit with significant business
    effects?

7
Managing Data Security
  • Threats to data security
  • accidental human, software, hardware error
  • theft and fraud
  • loss of privacy or confidentiality
  • loss of data integrity
  • loss of availability
  • Data security plan
  • limit access
  • conceal data
  • facilitate recovery

8
Security Views
  • Presents only data to which a user needs access
  • Always shows current data
  • More sophisticated security measures are normally
    required

9
Security Authorization Rules
  • Restrict access to data
  • Restrict actions that may be taken
  • Authorization tables for subjects (users)
  • Authorization tables for objects (data)

10
Security User-Defined Procedures
Security Encryption Security Authentication S
chemes
11
Database Recovery
  • Backup facilities
  • static data dynamic data incremental backup
  • Journalizing facilities
  • transaction log before-image after-image
  • Checkpoint facility
  • provides known state from which recovery can be
    done
  • Recovery manager

12
Recovery and Restart Procedures
  • Switch (mirrored database)
  • Restore/Rerun reprocess transactions
  • Transaction integrity
  • commit or abort
  • backward recovery rollback undo transactions
  • forward recovery -- rollforward apply
    transactions

13
Chapter 13 Distributed Databases
14
Distributed Database
  • A single logical database that is spread
    physically across computers in multiple locations
    that are connected by a data communications
    network.
  • conditions that encourage use of distributed
    databases
  • distribution and autonomy of business units
  • data sharing
  • data communications costs and reliability

15
Options for Distributing a Database
  • Data replication
  • Horizontal partitioning
  • Vertical partitioning
  • Combinations of the above

16
Data Replication
  • Advantages
  • reliability
  • fast response
  • less complicated integrity routines
  • node decoupling
  • reduced network traffic at prime time
  • Disadvantages
  • storage requirements
  • complexity and cost of updating

17
More on Data Replication
  • Schemes
  • snapshot replication
  • near real-time replication
  • pull replication
  • Replication favored when
  • process requests are read-only
  • data are relatively static

18
Partitioning (H or V)
  • Advantages
  • efficiency
  • local optimization
  • security
  • ease of querying
  • Disadvantages
  • inconsistent access speeds
  • backup vulnerability

19
(No Transcript)
Write a Comment
User Comments (0)
About PowerShow.com