Title: Module 8
1Module 8 Data Validation Security
Workforce Information Database Training Last
update November 2006
2Module 8 Data Validation Security
Providing Accurate Data Consistently Data
validation allows us to provide data with
confidence in its accuracy, and we can
consistently provide this data by implementing
thorough security.
3Module 8 Data Validation Security
- Data Integrity
- Validity, consistency, and accuracy of the data
in a database. - Table-level
- Field-level
- Relationship-level
- Business Rules
4Module 8 Data Validation Security
Data Validation The process of determining if an
update to a value in a tables data cell is
within a preestablished range or is a member of a
set of allowable values.
5Module 8 Data Validation Security
What are some common data quality problems that
affect data integrity and validation?
6Module 8 Data Validation Security
- Common Data Quality Problems
- Illegal values
- Violated attribute dependencies
- Uniqueness violation
- Referential integrity violation
- Missing values
- Misspellings
- Cryptic values
- Embedded values
- Misfielded values
7Module 8 Data Validation Security
- Common Data Quality Problems
- continued.
- Word transpositions
- Duplicate records
- Contradicting records
- Wrong references
- Overlapping data/matching records
- Name conflicts
- Structural conflicts
- Inconsistencies
8Module 8 Data Validation Security
- What are some methods for
- checking for data validity?
9Module 8 Data Validation Security
- Methods for checking
- for data validity
- Visual/manual
- Aggregation
- Reviewers guide
- Auto data checks
- Record counts
- Spell checks
- Have data provider review
10Module 8 Data Validation Security
Time to Exercise!!
11(No Transcript)
12Module 8 Data Validation Security
ALMIS Database Security Considerations
The contact in my state is______________
Physical security (including backup
restoration plan)
Security Concerns Confidentiality Integrity Avail
ability
Network (LAN/WAN) security
Data Storage Access (Server or PC)
Web security
Application security
Application security
User level
- Suppression flags
- Data aggregation issues
User level
User level
Database security prevents unauthorized person(s)
from viewing, destroying or altering data within
the database.
13Module 8 Data Validation Security
ALMIS Database Security Considerations
The contact in my state is______________
Physical security (including backup
restoration plan)
Security Concerns Confidentiality Integrity Avail
ability
Network (LAN/WAN) security
Data Storage Access (Server or PC)
Web security
Application security
Application security
User level
- Suppression flags
- Data aggregation issues
User level
User level
Database security prevents unauthorized person(s)
from viewing, destroying or altering data within
the database.
14Module 8 Data Validation Security
- Physical Security
- Questions to ask yourself
- Where is your data actually stored?
- Are you responsible for physical security?
- If you are...
15Module 8 Data Validation Security
- Physical Security
- What physical security measures do you have in
place? - Do you have the right hardware?
- Are you using obsolete hardware that is prone to
crashing or hacking? Do you have a choice? -
16Module 8 Data Validation Security
- Physical Security
- Do you have a database backup plan?
- Do you have remote backup so if a fire burns the
building you dont lose both your primary and
backup data at the same time? - Do you have a data restoration plan? Does the
backup plan allow for feasible restoration? -
17Module 8 Data Validation Security
- Physical Security
- Restoration Plan
- Does your restoration plan allow for the
restoration of individual tables or require the
entire database? - Do you maintain copies of the tables on your hard
drive?
18Module 8 Data Validation Security
- Physical Security
- Who has access to the physical storage location?
- Is your database on a PC or server that someone
could easily kick, spill coffee on, or
accidentally reappropriate? -
If you are not responsible for physical security,
ask these questions of those who are!
19Module 8 Data Validation Security
ALMIS Database Security Considerations
The contact in my state is______________
Physical security (including backup
restoration plan)
Security Concerns Confidentiality Integrity Avail
ability
Network (LAN/WAN) security
Data Storage Access (Server or PC)
Web security
Application security
Application security
User level
- Suppression flags
- Data aggregation issues
User level
User level
Database security prevents unauthorized person(s)
from viewing, destroying or altering data within
the database.
20Module 8 Data Validation Security
- Data Storage Access
- What software are you using to store the
database? - SQL Server, Oracle, FoxPro, Access?
Survey says SQL Server 48 Oracle 28 Other 2
4
21Module 8 Data Validation Security
- Data Storage Access
- What can be done at the server level to provide
for security? - Confidentiality, Integrity, Availability
DO apply advanced security to the most sensitive
data, but DONT apply advanced security to
non-sensitive data
22Module 8 Data Validation Security
- Data Storage Access
- Security at the server and/or database level
- Permissions
- What kind of permissions exist?
- Read only, SA, etc.
- Who sets those permissions?
- Who has those permissions?
23Module 8 Data Validation Security
- ALMIS Database Security
- Security at the data level
- Suppression
- Suppression flags
- Suppression can be handled at the database level
or the application level
24Module 8 Data Validation Security
ALMIS Database Data Security Two approaches 1.
ALMIS Database contains NO confidential data
(all data available for use without
restriction) 2. ALMIS Database contains
confidential data (data access controlled by
security and/or suppression)
25Module 8 Data Validation Security
ALMIS Database Security Tables that have
suppression flags...
ces indprj industry
iomatrix occprj oeswage
stindprj stoccprj
NOTE tables stfirms and wage have no
suppression flags but may contain confidential
data
26Module 8 Data Validation Security
- ALMIS Database Data Security
- Issues to consider regarding suppression
- If your database doesnt contain suppressed
records, detailed data wont aggregate to totals
(validity checks?) - Without proper suppression, confidential data can
be back-calculated
27Module 8 Data Validation Security
ALMIS Database Data Security A note on
confidential data If you are checking 202 data
(or any other potentially confidential data) to
see that it loaded right, make sure your EQUI
data files and/or printouts are always secured
and shred all photocopies when finished. Check
with your local BLS personnel or LMI
administrator for specific confidentiality
policies.
28Module 8 Data Validation Security
ALMIS Database Security Considerations
The contact in my state is______________
Physical security (including backup
restoration plan)
Security Concerns Confidentiality Integrity Avail
ability
Network (LAN/WAN) security
Data Storage Access (Server or PC)
Web security
Application security
Application security
User level
- Suppression flags
- Data aggregation issues
User level
User level
Database security prevents unauthorized person(s)
from viewing, destroying or altering data within
the database.
29Module 8 Data Validation Security
User Access Three major types of user access
- PC - direct to database (ODBC or RDBMS)
- Network (LAN/WAN) through application
- Web (passive or active through application)
30Module 8 Data Validation Security
- User Access via the Web
- How do Web users access the data from the
database? - Passive (static tables automatically updated to
web pages) - Active (query through application)
31Module 8 Data Validation Security
- User Access via the Web
- Questions to ask yourself
- What kind of web server are you using? What are
the security considerations with that choice? - What kind of firewall do you have?
32Module 8 Data Validation Security
- User Access via the Web
- Does your web interface have security/confidential
ity suppression? - Do you display suppressed data to certain users?
If so, how is access managed? Passwords? IP
address?
33Module 8 Data Validation Security
- User Access via a Network (LAN/WAN)
- Questions to ask yourself
- What type of network system do you have?
- Who has rights/access to your data via the
network? Through what applications? - Are confidential data (suppressed records)
available?
34Module 8 Data Validation Security
- User Access via a Network (LAN/WAN)
- How do you control access to confidential data?
Through user Ids? Through server access
permissions? - DO recognize the important distinction between
network security and data security.
35Module 8 Data Validation Security
- User Access via direct connection
- Questions to ask yourself
- Is local access machine password protected?
- Who has access to your machine?
- Is there a backup plan for your access machine?
- Is the source data for your database secure?
Backup plan? Restorable?
36Module 8 Data Validation Security
ALMIS Database Data Security Documentation It
may prove beneficial to keep detailed records on
- How security is done
- Where security exists
- Who is responsible for security
- Who has access/permissions to what
- Etc...
37Module 8 Data Validation Security
Data Security DISCUSSION