DATABASE SYSTEMS
8. Data and Database
Administration
Traditional Administration Definitions
2
Data Administration: A high-level
function that is responsible for the overall
management of data resources in an
organization, including maintaining
corporate-wide definitions and
standards
Database Administration: A technical
function that is responsible for physical
database design and for dealing with
technical issues such as security
enforcement, database performance,
and backup and recovery
Traditional Data Administration
3
Functions
Data policies, procedures, standards
Planning
Data conflict (ownership) resolution
Managing the information repository
Traditional Database Administration Functions
Selection of DBMS and software tools
Installing/upgrading DBMS
Tuning database performance
Improving query processing performance
Data backup and recovery
Data Modeling Responsibilities
4
Evolving Approaches to Data
5 and Database Administration
Blend data and database administration into
one role
Fast-track development – (planning, analysis,
design, implementation, maintenance)
Task Specific DBAs
Procedural DBAs –managing quality of triggers
and stored procedures
Electronic DBAs –managing Internet-enabled
database applications
PDA DBA –data synchronization and personal
database management
Data warehouse administration
Open Source DBMSs
6
An alternative to proprietary packages such as Oracle, Microsoft SQL
Server, or Microsoft Access
mySQL is an example of an open-source DBMS
Benefits
Less expensive than proprietary packages
Source code available, for modification
Drawbacks
Absence of complete documentation
Ambiguous licensing concerns
Not as feature-rich as proprietary DBMSs
Vendors may not have certification programs
Database Security
7
Database Security: Protection of the data against accidental or
intentional loss, destruction, or misuse.
Increased difficulty due to Internet access and client/server
technologies
Threats to Data Security
8
Accidental losses attributable to e.g. through human error, software
failure or hardware failure
Intentional Loss e.g. through sabotage
Theft and fraud
Improper data access that leads to Loss of privacy or confidentiality
Loss of data integrity
Web Security
9
Static HTML files are easy to secure through:
Standard database access controls
Place Web files in protected directories on server
Dynamic pages are harder. This calls for:
Control of CGI scripts
User authentication
Session security
SSL for encryption
Restrict number of users and open ports
Remove unnecessary programs
Solutions
10
W3C Web Privacy Standard
11
Platform for Privacy Protection (P3P) addresses the following:
Who collects data
What data is collected and for what purpose
Who is data shared with
Can users control access to their data
How are disputes resolved
Policies for retaining data
Database Software Security Features
12
1. Views - A view is a subset of the database that is presented to one
or more users. User can be given access privilege to view without
allowing access privilege to underlying tables
2. Integrity Controls – achieved by creating domains i.e. a set of
allowable values
3. Authentication Schemes - obtain a positive identification of the user.
E.g. Passwords, smart cards, Biometric devices, digital certificates
etc
4. user-defined procedures - Some DBMSs also provide capabilities for
to customize the authorization process by granting privileges
5. . Authorization Rules – Restrict access to data or actions that people
can take on data. An authorization matrix is designed for Subjects,
Objects, Actions and Constraints
6. Encryption – the coding or scrambling of data so that humans
cannot read them. Secure Sockets Layer (SSL) is a popular
encryption scheme for TCP/IP connections
13