33
1 Chapter 12: Data and Database Administration Modern Database Management Jeffrey A. Hoffer, Mary B. Prescott, Fred R. McFadden

1 Chapter 12: Data and Database Administration Modern Database Management Jeffrey A. Hoffer, Mary B. Prescott, Fred R. McFadden

Embed Size (px)

Citation preview

Page 1: 1 Chapter 12: Data and Database Administration Modern Database Management Jeffrey A. Hoffer, Mary B. Prescott, Fred R. McFadden

1

Chapter 12:Data and Database

Administration

Modern Database Management

Jeffrey A. Hoffer, Mary B. Prescott, Fred R. McFadden

Page 2: 1 Chapter 12: Data and Database Administration Modern Database Management Jeffrey A. Hoffer, Mary B. Prescott, Fred R. McFadden

3

Definitions

• Data Administration: A high-level function that is responsible for the overall management of data resources in an organization, including maintaining corporate-wide definitions and standards

• Database Administration: A technical function that is responsible for physical database design and for dealing with technical issues such as security enforcement, database performance, and backup and recovery

Page 3: 1 Chapter 12: Data and Database Administration Modern Database Management Jeffrey A. Hoffer, Mary B. Prescott, Fred R. McFadden

4

Traditional Data Administration Functions

• Data policies, procedures, standards• Planning• Data conflict (ownership) resolution• Internal marketing of DA concepts• Managing the data repository

Page 4: 1 Chapter 12: Data and Database Administration Modern Database Management Jeffrey A. Hoffer, Mary B. Prescott, Fred R. McFadden

5

Traditional Database Administration Functions

• Selection of hardware and software• Installing/upgrading DBMS• Tuning database performance• Improving query processing performance• Managing data security, privacy, and integrity• Data backup and recovery

Page 5: 1 Chapter 12: Data and Database Administration Modern Database Management Jeffrey A. Hoffer, Mary B. Prescott, Fred R. McFadden

7

Figure 12-2 Data modeling responsibilities

Page 6: 1 Chapter 12: Data and Database Administration Modern Database Management Jeffrey A. Hoffer, Mary B. Prescott, Fred R. McFadden

8

Data Warehouse Administration• Similar to DA/DBA roles• Emphasis on integration and coordination

of metadata/data across many data sources

• Specific roles:– Support decision –support applications– Manage data warehouse growth– Establish service level agreements regarding

data warehouses and data marts

Page 7: 1 Chapter 12: Data and Database Administration Modern Database Management Jeffrey A. Hoffer, Mary B. Prescott, Fred R. McFadden

9

• The need to manage data is permanent• Data can exist at several levels• Application software should be separate from the database• Application software can be classified by how they treat data

1. Data capture2. Data transfer3. Data analysis and presentation

MANAGERIAL ISSUES IN MANAGING DATAPrinciples in Managing Data

Page 8: 1 Chapter 12: Data and Database Administration Modern Database Management Jeffrey A. Hoffer, Mary B. Prescott, Fred R. McFadden

10

• Application software should be considered disposable

• Data should be captured once• There should be strict data standards

MANAGERIAL ISSUES IN MANAGING DATAPrinciples in Managing Data

Page 9: 1 Chapter 12: Data and Database Administration Modern Database Management Jeffrey A. Hoffer, Mary B. Prescott, Fred R. McFadden

11

MANAGERIAL ISSUES IN MANAGING DATAThe Data Management Process

Page 10: 1 Chapter 12: Data and Database Administration Modern Database Management Jeffrey A. Hoffer, Mary B. Prescott, Fred R. McFadden

12

MANAGERIAL ISSUES IN MANAGING DATA

• Organizations should have policies regarding:– Data ownership – Data administration

Data Management Policies

Page 11: 1 Chapter 12: Data and Database Administration Modern Database Management Jeffrey A. Hoffer, Mary B. Prescott, Fred R. McFadden

15

Data Administration

Key functions of the data administration group:• Promote and control data sharing• Analyze the impact of changes to application systems when data definitions

change• Maintain the data dictionary• Reduce redundant data and processing• Reduce system maintenance costs and improve system development productivity• Improve quality and security of data• Insure data integrity

MANAGERIAL ISSUES IN MANAGING DATA

Page 12: 1 Chapter 12: Data and Database Administration Modern Database Management Jeffrey A. Hoffer, Mary B. Prescott, Fred R. McFadden

17

Database Security

• Database Security: Protection of the data against accidental or intentional loss, destruction, or misuse

Page 13: 1 Chapter 12: Data and Database Administration Modern Database Management Jeffrey A. Hoffer, Mary B. Prescott, Fred R. McFadden

18

Figure 12-3 Possible locations of data security threats

Page 14: 1 Chapter 12: Data and Database Administration Modern Database Management Jeffrey A. Hoffer, Mary B. Prescott, Fred R. McFadden

23

Database Software Security Features

• Views or subschemas• Integrity controls• Authorization rules• User-defined procedures• Encryption• Authentication schemes• Backup, journalizing, and checkpointing

Page 15: 1 Chapter 12: Data and Database Administration Modern Database Management Jeffrey A. Hoffer, Mary B. Prescott, Fred R. McFadden

24

Views and Integrity Controls

• Views– Subset of the database that is presented to one or more

users– User can be given access privilege to view without

allowing access privilege to underlying tables

• Integrity Controls– Protect data from unauthorized use– Domains – set allowable values– Assertions – enforce database conditions

Page 16: 1 Chapter 12: Data and Database Administration Modern Database Management Jeffrey A. Hoffer, Mary B. Prescott, Fred R. McFadden

25

Authorization Rules• Controls incorporated in the data management

system• Restrict: – access to data– actions that people can take on data

• Authorization matrix for:– Subjects– Objects– Actions– Constraints

Page 17: 1 Chapter 12: Data and Database Administration Modern Database Management Jeffrey A. Hoffer, Mary B. Prescott, Fred R. McFadden

26

Figure 12-5 Authorization matrix

Page 18: 1 Chapter 12: Data and Database Administration Modern Database Management Jeffrey A. Hoffer, Mary B. Prescott, Fred R. McFadden

29

Authentication Schemes• Goal – obtain a positive identification of the

user• Passwords: First line of defense– Should be at least 8 characters long– Should combine alphabetic and numeric data– Should not be complete words or personal

information– Should be changed frequently

Page 19: 1 Chapter 12: Data and Database Administration Modern Database Management Jeffrey A. Hoffer, Mary B. Prescott, Fred R. McFadden

30

Authentication Schemes (cont.)• Strong Authentication

– Passwords are flawed:• Users share them with each other• They get written down, could be copied• Automatic logon scripts remove need to explicitly type them in• Unencrypted passwords travel the Internet

• Possible solutions:– Two factor–e.g. smart card plus PIN– Three factor–e.g. smart card, biometric, PIN– Biometric devices–use of fingerprints, retinal scans, etc. for

positive ID– Third-party mediated authentication–using secret keys, digital

certificates

Page 20: 1 Chapter 12: Data and Database Administration Modern Database Management Jeffrey A. Hoffer, Mary B. Prescott, Fred R. McFadden

31

Examples of Different Biometric Technologies

• Fingerprint• Iris • Face • Handprint• Voice

Page 21: 1 Chapter 12: Data and Database Administration Modern Database Management Jeffrey A. Hoffer, Mary B. Prescott, Fred R. McFadden

32

Fingerprint• Minutiae (mi – noo – shee – ah)

– Points of interest in the fingerprint

• Advantages – Subjects have multiple fingers– Easy to use, with some training– Fingerprints are unique to each

finger of each individual and the ridge arrangement remains permanent during one's lifetime

Source: National Science & Technology Council’s (NSTC) Subcommittee on Biometrics

Page 22: 1 Chapter 12: Data and Database Administration Modern Database Management Jeffrey A. Hoffer, Mary B. Prescott, Fred R. McFadden

33

Security Policies and Procedures

• Personnel controls– Hiring practices, employee monitoring, security training

• Physical access controls– Equipment locking, check-out procedures, screen

placement• Maintenance controls– Maintenance agreements, access to source code, quality

and availability standards• Data privacy controls– Adherence to privacy legislation, access rules

Page 23: 1 Chapter 12: Data and Database Administration Modern Database Management Jeffrey A. Hoffer, Mary B. Prescott, Fred R. McFadden

34

Database Recovery

Mechanism for restoring a database quickly and accurately after loss or damage

Recovery facilities:• Backup Facilities• Journalizing Facilities• Checkpoint Facility• Recovery Manager

Page 24: 1 Chapter 12: Data and Database Administration Modern Database Management Jeffrey A. Hoffer, Mary B. Prescott, Fred R. McFadden

37

Figure 12-9 Database audit trail

From the backup and logs, databases can be restored in case of damage or loss

Page 25: 1 Chapter 12: Data and Database Administration Modern Database Management Jeffrey A. Hoffer, Mary B. Prescott, Fred R. McFadden

41

Figure 12-10 Basic recovery techniques a) Rollback

Page 26: 1 Chapter 12: Data and Database Administration Modern Database Management Jeffrey A. Hoffer, Mary B. Prescott, Fred R. McFadden

42

Figure 12-10 Basic recovery techniques (cont.)b) Rollforward

Page 27: 1 Chapter 12: Data and Database Administration Modern Database Management Jeffrey A. Hoffer, Mary B. Prescott, Fred R. McFadden

44

Concurrency Control

• ProblemProblem – in a multi-user environment, simultaneous access to data can result in interference and data loss

• SolutionSolution – Concurrency Control– The process of managing simultaneous

operations against a database so that data integrity is maintained and the operations do not interfere with each other in a multi-user environment.

Page 28: 1 Chapter 12: Data and Database Administration Modern Database Management Jeffrey A. Hoffer, Mary B. Prescott, Fred R. McFadden

45

Figure 12-11 Lost update (no concurrency control in effect)

Simultaneous access causes updates to cancel each other

A similar problem is the inconsistent readinconsistent read problem

Page 29: 1 Chapter 12: Data and Database Administration Modern Database Management Jeffrey A. Hoffer, Mary B. Prescott, Fred R. McFadden

46

Concurrency Control Techniques

• Serializability– Finish one transaction before starting another

• Locking Mechanisms – The most common way of achieving

serialization– Data that is retrieved for the purpose of

updating is locked for the updater– No other user can perform update until

unlocked

Page 30: 1 Chapter 12: Data and Database Administration Modern Database Management Jeffrey A. Hoffer, Mary B. Prescott, Fred R. McFadden

49

Deadlock• An impasse that results when two or more transactions

have locked common resources, and each waits for the other to unlock their resources

Figure 12-13The problem of deadlock

John and Marsha John and Marsha will wait forever for will wait forever for each other to each other to release their release their locked resources!locked resources!

Page 31: 1 Chapter 12: Data and Database Administration Modern Database Management Jeffrey A. Hoffer, Mary B. Prescott, Fred R. McFadden

50

Managing Deadlock• Deadlock prevention: This involves locking all

records required at the beginning of a transaction– Two-phase locking protocol

• Growing phase• Shrinking phase

– May be difficult to determine all needed resources in advance

• Deadlock Resolution:– Allow deadlocks to occur– Mechanisms for detecting and breaking them

• Resource usage matrix

Page 32: 1 Chapter 12: Data and Database Administration Modern Database Management Jeffrey A. Hoffer, Mary B. Prescott, Fred R. McFadden

53

Managing Data Quality• Causes of poor data quality– External data sources– Redundant data storage– Lack of organizational commitment

• Data quality improvement– Perform data quality audit– Establish data stewardship program (data steward is a

liaison between IT and business units)– Apply total quality management (TQM) practices– Overcome organizational barriers– Apply modern DBMS technology– Estimate return on investment

Page 33: 1 Chapter 12: Data and Database Administration Modern Database Management Jeffrey A. Hoffer, Mary B. Prescott, Fred R. McFadden

54

Managing Data Quality

• Data StewardData Steward - Liaisons between IT and business units

• Five Data Quality Issues:Security policy and disaster recoveryPersonnel controlsPhysical access controlsMaintenance controls (hardware & software)Data protection and privacy