SlideShare a Scribd company logo
1 of 36
Chapter 12:
     Data and Database
       Administration
   Modern Database Management
           6th Edition
Jeffrey A. Hoffer, Mary B. Prescott, Fred R.
                  McFadden


                                               1
                © Prentice Hall, 2002
Definitions
   Data   Administration: A high-level function that is
    responsible for the overall management of data
    resources in an organization, including
    maintaining corporate-wide definitions and
    standards
   Database Administration: A technical function
    that is responsible for physical database design
    and for dealing with technical issues such as
    security enforcement, database performance, and
    backup and recovery
Chapter 12                                 2
                   © Prentice Hall, 2002
Data Administration Functions
   Data  policies, procedures, standards
   Planning
   Data conflict (ownership) resolution
   Internal marketing of DA concepts
   Managing the data repository




Chapter 12                               3
                 © Prentice Hall, 2002
Database Administration
              Functions
   Selection  of hardware and software
   Installing/upgrading DBMS
   Tuning database performance
   Improving query processing performance
   Managing data security, privacy, and
    integrity
   Data backup and recovery

Chapter 12                              4
                © Prentice Hall, 2002
Data Warehouse Administration
   New  role, coming with the growth in data
    warehouses
   Similar to DA/DBA roles
   Emphasis on integration and coordination
    of metadata/data across many data sources
   Specific roles:
      – Support decision –support applications
      – Manage data warehouse growth
      – Establish service level agreements regarding
        data warehouses and data marts
Chapter 12                                 5
                   © Prentice Hall, 2002
Database Security
  Database   Security: Protection of the
   data against accidental or intentional
   loss, destruction, or misuse
  Increased difficulty due to Internet
   access and client/server technologies


Chapter 12                              6
                © Prentice Hall, 2002
Figure 12-2: Possible locations of data security threats




Chapter 12                                    7
                    © Prentice Hall, 2002
Threats to Data Security
   Accidental    losses attributable to:
      – Human error
      – Software failure
      – Hardware failure
   Theftand fraud.
   Improper data access:
      – Loss of privacy (personal data)
      – Loss of confidentiality (corporate data)
   Loss of data integrity
   Loss of availability (through, e.g. sabotage)

Chapter 12                                         8
                     © Prentice Hall, 2002
Data Management Software
           Security Features
  •   Views or subschemas
  •   Integrity controls
  •   Authorization rules
  •   User-defined procedures
  •   Encryption
  •   Authentication schemes
  •   Backup, journalizing, and checkpointing
Chapter 12                                9
                  © Prentice Hall, 2002
Views and Integrity Controls
   Views
      – Subset of the database that is presented to one or more
        users
      – User can be given access privilege to view without
        allowing access privilege to underlying tables
   Integrity   Controls
      – Protect data from unauthorized use
      – Domains – set allowable values
      – Assertions – enforce database conditions

Chapter 12                                         10
                      © Prentice Hall, 2002
Authorization Rules
 Controlsincorporated in the data management system
 Restrict:
   – access to data
   – actions that people can take on data
 Authorization     matrix for:
   –   Subjects
   –   Objects
   –   Actions
   –   Constraints



Chapter 12                                   11
                     © Prentice Hall, 2002
Figure 12-3: Authorization matrix




Chapter 12                                       12
                      © Prentice Hall, 2002
Figure 12-4(a): Authorization table for subjects




                                   Figure 12-4(b): Authorization table for objects




Figure 12-5: Oracle8i privileges

                                             Some DBMSs also provide
                                             capabilities for user-defined
                                             procedures to customize the
                                             authorization process

Chapter 12                                                     13
                            © Prentice Hall, 2002
Authentication Schemes
   Goal – obtain a positive identification of the user
   Passwords are flawed:
      – Users share them with each other
      – They get written down, could be copied
      – Automatic logon scripts remove need to explicitly type
        them in
      – Unencrypted passwords travel the Internet
   Possible   solutions:
      – Biometric devices – use of fingerprints, retinal scans,
        etc. for positive ID
      – Third-party authentication – using secret keys, digital
        certificates
Chapter 12                                         14
                      © Prentice Hall, 2002
Database Recovery
     Mechanism   for restoring a database quickly
      and accurately after loss or damage
     Recovery facilities:
        • Backup Facilities
        • Journalizing Facilities
        • Checkpoint Facility
        • Recovery Manager



Chapter 12                                  15
                    © Prentice Hall, 2002
Backup Facilities
   Automatic  dump facility that produces
    backup copy of the entire database
   Periodic backup (e.g. nightly, weekly)
   Cold backup – database is shut down during
    backup
   Hot backup – selected portion is shut down
    and backed up at a given time
   Backups stored in secure, off-site location

Chapter 12                              16
                © Prentice Hall, 2002
Journalizing Facilities
   Audit  trail of transactions and database
    updates
   Transaction log – record of essential data
    for each transaction processed against the
    database
   Database change log – images of updated
    data
      – Before-image – copy before modification
      – After-image – copy after modification

               Produces an audit trail
Chapter 12                                 17
                   © Prentice Hall, 2002
Figure 12-6: Database audit trail




                      From the backup and
                      logs, databases can be
                      restored in case of
                      damage or loss

Chapter 12                                     18
                   © Prentice Hall, 2002
Checkpoint Facilities
   DBMS    periodically refuses to accept new
    transactions
    system is in a quiet state
   Database and transaction logs are
    synchronized
    This allows recovery manager to resume processing
    from short period, instead of repeating entire day


Chapter 12                                    19
                    © Prentice Hall, 2002
Recovery and Restart
                 Procedures
  Switch  - Mirrored databases
  Restore/Rerun - Reprocess transactions against the
   backup
  Transaction Integrity - Commit or abort all
   transaction changes
  Backward Recovery (Rollback) - Apply before
   images
  Forward Recovery (Roll Forward) - Apply after
   images (preferable to restore/rerun)

Chapter 12                                20
                  © Prentice Hall, 2002
Figure 12-7: Basic recovery techniques
                           (a) Rollback




Chapter 12                                      21
                       © Prentice Hall, 2002
Figure 12-7(b) Rollforward




Chapter 12                                22
                © Prentice Hall, 2002
Database Failure Responses
    Aborted transactions
     – Preferred recovery: rollback
     – Alternative: Rollforward to state just prior to abort
    Incorrect data
     – Preferred recovery: rollback
     – Alternative 1: re-run transactions not including inaccurate data updates
     – Alternative 2: compensating transactions
    System failure (database intact)
     – Preferred recovery: switch to duplicate database
     – Alternative 1: rollback
     – Alternative 2: restart from checkpoint
    Database destruction
     – Preferred recovery: switch to duplicate database
     – Alternative 1: rollforward
     – Alternative 2: reprocess transactions

Chapter 12                                                      23
                            © Prentice Hall, 2002
Concurrency Control
   Problem –  in a multi-user environment,
    simultaneous access to data can result in
    interference and data loss
   Solution – Concurrency Control
      – The process of managing simultaneous
        operations against a database so that data
        integrity is maintained and the operations do
        not interfere with each other in a multi-user
        environment.

Chapter 12                                  24
                    © Prentice Hall, 2002
Figure 12-8: LOST UPDATE




     Simultaneous access causes updates to cancel each other
       A similar problem is the inconsistent read problem
Chapter 12                                        25
                      © Prentice Hall, 2002
Concurrency Control
                Techniques
   Serializability   –
      – Finish one transaction before starting another
   Locking Mechanisms
      – The most common way of achieving
        serialization
      – Data that is retrieved for the purpose of
        updating is locked for the updater
      – No other user can perform update until
        unlocked

Chapter 12                                   26
                   © Prentice Hall, 2002
Figure 12-9: Updates with locking for concurrency control




             This prevents the lost update problem
Chapter 12                                      27
                     © Prentice Hall, 2002
Locking Mechanisms
   Locking     level:
      –   Database – used during database updates
      –   Table – used for bulk updates
      –   Block or page – very commonly used
      –   Record – only requested row; fairly commonly used
      –   Field – requires significant overhead; impractical
   Types     of locks:
      – Shared lock - Read but no update permitted. Used
        when just reading to prevent another user from placing
        an exclusive lock on the record
      – Exclusive lock - No access permitted. Used when
        preparing to update

Chapter 12                                        28
                         © Prentice Hall, 2002
Deadlock
          An impasse that results when two or more transactions
           have locked common resources, and each waits for the
           other to unlock their resources


           Figure 12-11
    A deadlock situation

UserA and UserB will wait
forever for each other to
release their locked resources!




   Chapter 12                                        29
                             © Prentice Hall, 2002
Managing Deadlock
  Deadlock       prevention:
     – Lock all records required at the beginning of a
       transaction
     – Two-phase locking protocol
            Growing phase
            Shrinking phase
     – May be difficult to determine all needed resources in
        advance
  Deadlock       Resolution:
     – Allow deadlocks to occur
     – Mechanisms for detecting and breaking them
            Resource usage matrix


Chapter 12                                        30
                         © Prentice Hall, 2002
Versioning
    Optimistic  approach to concurrency control
    Instead of locking
    Assumption is that simultaneous updates will be
     infrequent
    Each transaction can attempt an update as it
     wishes
    The system will reject an update when it senses a
     conflict
    Use of rollback and commit for this


Chapter 12                                31
                  © Prentice Hall, 2002
Figure 12-12: the use of versioning




              Better performance than locking

Chapter 12                                         32
                    © Prentice Hall, 2002
Managing Data Quality
   Data Steward -     Liaisons between IT and
    business units
   Five Data Quality Issues:
       Security policy and disaster recovery
       Personnel controls
       Physical access controls
       Maintenance controls (hardware & software)
       Data protection and privacy

Chapter 12                                 33
                   © Prentice Hall, 2002
Data Dictionaries and Repositories
   Data     dictionary
      – Documents data elements of a database
   System        catalog
      – System-created database that describes all database
        objects
   Information       Repository
      – Stores metadata describing data and data processing
        resources
   Information       Repository Dictionary System
     (IRDS)
      – Software tool managing/controlling access to
        information repository
Chapter 12                                       34
                      © Prentice Hall, 2002
Figure 12-13: Three components of the repository system architecture

                                                                  A schema of the
                                                                  repository information




                                                Software that manages the repository objects




                                                                 Where repository objects
                                                                 are stored

        Source: adapted from Bernstein, 1996.


 Chapter 12                                                                   35
                                           © Prentice Hall, 2002
Database Performance Tuning
   DBMS      Installation
      – Setting installation parameters
   Memory      Usage
      – Set cache levels
      – Choose background processes
   Input/Output      Contention
      – Use striping
      – Distribution of heavily accessed files
   CPU      Usage
      – Monitor CPU load
   Application      tuning
      – Modification of SQL code in applications
Chapter 12                                       36
                      © Prentice Hall, 2002

More Related Content

What's hot

Data and database administration(database)
Data and database administration(database)Data and database administration(database)
Data and database administration(database)welcometofacebook
 
Rman Presentation
Rman PresentationRman Presentation
Rman PresentationRick van Ek
 
A Day In The Life Of A DBA Manager
A Day In The Life Of A DBA ManagerA Day In The Life Of A DBA Manager
A Day In The Life Of A DBA ManagerMahesh Vallampati
 
BACKUP & RECOVERY IN DBMS
BACKUP & RECOVERY IN DBMSBACKUP & RECOVERY IN DBMS
BACKUP & RECOVERY IN DBMSBaivabiNayak
 
Database Administration
Database AdministrationDatabase Administration
Database AdministrationBilal Arshad
 
Database administration and security
Database administration and securityDatabase administration and security
Database administration and securityDhani Ahmad
 
Oracle Security Presentation
Oracle Security PresentationOracle Security Presentation
Oracle Security PresentationFrancisco Alvarez
 
Oracle Database Availability & Scalability Across Versions & Editions
Oracle Database Availability & Scalability Across Versions & EditionsOracle Database Availability & Scalability Across Versions & Editions
Oracle Database Availability & Scalability Across Versions & EditionsMarkus Michalewicz
 
Basic oracle-database-administration
Basic oracle-database-administrationBasic oracle-database-administration
Basic oracle-database-administrationsreehari orienit
 
Backup & recovery with rman
Backup & recovery with rmanBackup & recovery with rman
Backup & recovery with rmanitsabidhussain
 
Database backup and recovery basics
Database backup and recovery basicsDatabase backup and recovery basics
Database backup and recovery basicsShahed Mohamed
 
Maa goldengate-rac-2007111
Maa goldengate-rac-2007111Maa goldengate-rac-2007111
Maa goldengate-rac-2007111pablitosax
 
Less01 architecture
Less01 architectureLess01 architecture
Less01 architectureAmit Bhalla
 
The oracle database architecture
The oracle database architectureThe oracle database architecture
The oracle database architectureAkash Pramanik
 
Database administration
Database administrationDatabase administration
Database administrationRanidm
 
Database User and Administrator
Database User and AdministratorDatabase User and Administrator
Database User and AdministratorA. S. M. Shafi
 
Data abstraction in DBMS
Data abstraction in DBMSData abstraction in DBMS
Data abstraction in DBMSPapan Sarkar
 

What's hot (20)

DBA
DBADBA
DBA
 
Data and database administration(database)
Data and database administration(database)Data and database administration(database)
Data and database administration(database)
 
Lecture2 oracle ppt
Lecture2 oracle pptLecture2 oracle ppt
Lecture2 oracle ppt
 
Rman Presentation
Rman PresentationRman Presentation
Rman Presentation
 
A Day In The Life Of A DBA Manager
A Day In The Life Of A DBA ManagerA Day In The Life Of A DBA Manager
A Day In The Life Of A DBA Manager
 
BACKUP & RECOVERY IN DBMS
BACKUP & RECOVERY IN DBMSBACKUP & RECOVERY IN DBMS
BACKUP & RECOVERY IN DBMS
 
Database Administration
Database AdministrationDatabase Administration
Database Administration
 
Database administration and security
Database administration and securityDatabase administration and security
Database administration and security
 
Oracle Security Presentation
Oracle Security PresentationOracle Security Presentation
Oracle Security Presentation
 
Oracle Database Availability & Scalability Across Versions & Editions
Oracle Database Availability & Scalability Across Versions & EditionsOracle Database Availability & Scalability Across Versions & Editions
Oracle Database Availability & Scalability Across Versions & Editions
 
Basic oracle-database-administration
Basic oracle-database-administrationBasic oracle-database-administration
Basic oracle-database-administration
 
Backup & recovery with rman
Backup & recovery with rmanBackup & recovery with rman
Backup & recovery with rman
 
Database backup and recovery basics
Database backup and recovery basicsDatabase backup and recovery basics
Database backup and recovery basics
 
Maa goldengate-rac-2007111
Maa goldengate-rac-2007111Maa goldengate-rac-2007111
Maa goldengate-rac-2007111
 
Less01 architecture
Less01 architectureLess01 architecture
Less01 architecture
 
The oracle database architecture
The oracle database architectureThe oracle database architecture
The oracle database architecture
 
Database administration
Database administrationDatabase administration
Database administration
 
Database User and Administrator
Database User and AdministratorDatabase User and Administrator
Database User and Administrator
 
Data abstraction in DBMS
Data abstraction in DBMSData abstraction in DBMS
Data abstraction in DBMS
 
Oracle Tablespace - Basic
Oracle Tablespace - BasicOracle Tablespace - Basic
Oracle Tablespace - Basic
 

Similar to Data & database administration hoffer

The Database Environment Chapter 12
The Database Environment Chapter 12The Database Environment Chapter 12
The Database Environment Chapter 12Jeanie Arnoco
 
The Database Environment Chapter 1
The Database Environment Chapter 1The Database Environment Chapter 1
The Database Environment Chapter 1Jeanie Arnoco
 
The Database Environment Chapter 13
The Database Environment Chapter 13The Database Environment Chapter 13
The Database Environment Chapter 13Jeanie Arnoco
 
A27 Vectorwise Performance Considerations_implementation_best_practices
A27 Vectorwise Performance Considerations_implementation_best_practicesA27 Vectorwise Performance Considerations_implementation_best_practices
A27 Vectorwise Performance Considerations_implementation_best_practicesInsight Technology, Inc.
 
Oracle Database 12c Multitenant for Consolidation
Oracle Database 12c Multitenant for ConsolidationOracle Database 12c Multitenant for Consolidation
Oracle Database 12c Multitenant for ConsolidationYudi Herdiana
 
Fazal rafi.. database concurancy control and recovery
Fazal rafi.. database concurancy control and recoveryFazal rafi.. database concurancy control and recovery
Fazal rafi.. database concurancy control and recoverySofthat IT Solutions
 
Data Virtualization: An Essential Component of a Cloud Data Lake
Data Virtualization: An Essential Component of a Cloud Data LakeData Virtualization: An Essential Component of a Cloud Data Lake
Data Virtualization: An Essential Component of a Cloud Data LakeDenodo
 
Oracle database 12c new features
Oracle database 12c new featuresOracle database 12c new features
Oracle database 12c new featuresJakkrapat S.
 
Things learned from OpenWorld 2013
Things learned from OpenWorld 2013Things learned from OpenWorld 2013
Things learned from OpenWorld 2013Connor McDonald
 
vFabric Data Director 2.7 customer deck
vFabric Data Director 2.7 customer deckvFabric Data Director 2.7 customer deck
vFabric Data Director 2.7 customer deckJunchi Zhang
 
High Availability And Oracle Data Guard 11g R2
High Availability And Oracle Data Guard 11g R2High Availability And Oracle Data Guard 11g R2
High Availability And Oracle Data Guard 11g R2Mario Redón Luz
 
Best Practices in the Cloud for Data Management (US)
Best Practices in the Cloud for Data Management (US)Best Practices in the Cloud for Data Management (US)
Best Practices in the Cloud for Data Management (US)Denodo
 
High Availability Options for DB2 Data Centre
High Availability Options for DB2 Data CentreHigh Availability Options for DB2 Data Centre
High Availability Options for DB2 Data Centreterraborealis
 
C4 delivering database as a service within your organization
C4   delivering database as a service within your organizationC4   delivering database as a service within your organization
C4 delivering database as a service within your organizationDr. Wilfred Lin (Ph.D.)
 
Bilbao oracle12c keynote
Bilbao  oracle12c keynoteBilbao  oracle12c keynote
Bilbao oracle12c keynoteAitor Ibañez
 

Similar to Data & database administration hoffer (20)

The Database Environment Chapter 12
The Database Environment Chapter 12The Database Environment Chapter 12
The Database Environment Chapter 12
 
The Database Environment Chapter 1
The Database Environment Chapter 1The Database Environment Chapter 1
The Database Environment Chapter 1
 
Ch 13 D B Admin
Ch 13  D B  AdminCh 13  D B  Admin
Ch 13 D B Admin
 
INT 1010 07-2.pdf
INT 1010 07-2.pdfINT 1010 07-2.pdf
INT 1010 07-2.pdf
 
The Database Environment Chapter 13
The Database Environment Chapter 13The Database Environment Chapter 13
The Database Environment Chapter 13
 
A27 Vectorwise Performance Considerations_implementation_best_practices
A27 Vectorwise Performance Considerations_implementation_best_practicesA27 Vectorwise Performance Considerations_implementation_best_practices
A27 Vectorwise Performance Considerations_implementation_best_practices
 
Oracle Database 12c Multitenant for Consolidation
Oracle Database 12c Multitenant for ConsolidationOracle Database 12c Multitenant for Consolidation
Oracle Database 12c Multitenant for Consolidation
 
Fazal rafi.. database concurancy control and recovery
Fazal rafi.. database concurancy control and recoveryFazal rafi.. database concurancy control and recovery
Fazal rafi.. database concurancy control and recovery
 
Data Virtualization: An Essential Component of a Cloud Data Lake
Data Virtualization: An Essential Component of a Cloud Data LakeData Virtualization: An Essential Component of a Cloud Data Lake
Data Virtualization: An Essential Component of a Cloud Data Lake
 
Guide on Raid Data Recovery
Guide on Raid Data RecoveryGuide on Raid Data Recovery
Guide on Raid Data Recovery
 
Oracle database 12c new features
Oracle database 12c new featuresOracle database 12c new features
Oracle database 12c new features
 
Powerpoint chap.9
Powerpoint chap.9Powerpoint chap.9
Powerpoint chap.9
 
Maximize Availability With Oracle Database 12c
Maximize Availability With Oracle Database 12cMaximize Availability With Oracle Database 12c
Maximize Availability With Oracle Database 12c
 
Things learned from OpenWorld 2013
Things learned from OpenWorld 2013Things learned from OpenWorld 2013
Things learned from OpenWorld 2013
 
vFabric Data Director 2.7 customer deck
vFabric Data Director 2.7 customer deckvFabric Data Director 2.7 customer deck
vFabric Data Director 2.7 customer deck
 
High Availability And Oracle Data Guard 11g R2
High Availability And Oracle Data Guard 11g R2High Availability And Oracle Data Guard 11g R2
High Availability And Oracle Data Guard 11g R2
 
Best Practices in the Cloud for Data Management (US)
Best Practices in the Cloud for Data Management (US)Best Practices in the Cloud for Data Management (US)
Best Practices in the Cloud for Data Management (US)
 
High Availability Options for DB2 Data Centre
High Availability Options for DB2 Data CentreHigh Availability Options for DB2 Data Centre
High Availability Options for DB2 Data Centre
 
C4 delivering database as a service within your organization
C4   delivering database as a service within your organizationC4   delivering database as a service within your organization
C4 delivering database as a service within your organization
 
Bilbao oracle12c keynote
Bilbao  oracle12c keynoteBilbao  oracle12c keynote
Bilbao oracle12c keynote
 

More from Mohd Arif

Bootp and dhcp
Bootp and dhcpBootp and dhcp
Bootp and dhcpMohd Arif
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarpMohd Arif
 
User datagram protocol
User datagram protocolUser datagram protocol
User datagram protocolMohd Arif
 
Project identification
Project identificationProject identification
Project identificationMohd Arif
 
Project evalaution techniques
Project evalaution techniquesProject evalaution techniques
Project evalaution techniquesMohd Arif
 
Presentation
PresentationPresentation
PresentationMohd Arif
 
Pointers in c
Pointers in cPointers in c
Pointers in cMohd Arif
 
Peer to-peer
Peer to-peerPeer to-peer
Peer to-peerMohd Arif
 
Overview of current communications systems
Overview of current communications systemsOverview of current communications systems
Overview of current communications systemsMohd Arif
 
Overall 23 11_2007_hdp
Overall 23 11_2007_hdpOverall 23 11_2007_hdp
Overall 23 11_2007_hdpMohd Arif
 
Objectives of budgeting
Objectives of budgetingObjectives of budgeting
Objectives of budgetingMohd Arif
 
Network management
Network managementNetwork management
Network managementMohd Arif
 
Networing basics
Networing basicsNetworing basics
Networing basicsMohd Arif
 
Iris ngx next generation ip based switching platform
Iris ngx next generation ip based switching platformIris ngx next generation ip based switching platform
Iris ngx next generation ip based switching platformMohd Arif
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and sslMohd Arif
 
Ip security in i psec
Ip security in i psecIp security in i psec
Ip security in i psecMohd Arif
 
Intro to comp. hardware
Intro to comp. hardwareIntro to comp. hardware
Intro to comp. hardwareMohd Arif
 

More from Mohd Arif (20)

Bootp and dhcp
Bootp and dhcpBootp and dhcp
Bootp and dhcp
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarp
 
User datagram protocol
User datagram protocolUser datagram protocol
User datagram protocol
 
Project identification
Project identificationProject identification
Project identification
 
Project evalaution techniques
Project evalaution techniquesProject evalaution techniques
Project evalaution techniques
 
Presentation
PresentationPresentation
Presentation
 
Pointers in c
Pointers in cPointers in c
Pointers in c
 
Peer to-peer
Peer to-peerPeer to-peer
Peer to-peer
 
Overview of current communications systems
Overview of current communications systemsOverview of current communications systems
Overview of current communications systems
 
Overall 23 11_2007_hdp
Overall 23 11_2007_hdpOverall 23 11_2007_hdp
Overall 23 11_2007_hdp
 
Objectives of budgeting
Objectives of budgetingObjectives of budgeting
Objectives of budgeting
 
Network management
Network managementNetwork management
Network management
 
Networing basics
Networing basicsNetworing basics
Networing basics
 
Loaders
LoadersLoaders
Loaders
 
Lists
ListsLists
Lists
 
Iris ngx next generation ip based switching platform
Iris ngx next generation ip based switching platformIris ngx next generation ip based switching platform
Iris ngx next generation ip based switching platform
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and ssl
 
Ip security in i psec
Ip security in i psecIp security in i psec
Ip security in i psec
 
Intro to comp. hardware
Intro to comp. hardwareIntro to comp. hardware
Intro to comp. hardware
 
Heap sort
Heap sortHeap sort
Heap sort
 

Recently uploaded

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Recently uploaded (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

Data & database administration hoffer

  • 1. Chapter 12: Data and Database Administration Modern Database Management 6th Edition Jeffrey A. Hoffer, Mary B. Prescott, Fred R. McFadden 1 © Prentice Hall, 2002
  • 2. Definitions  Data Administration: A high-level function that is responsible for the overall management of data resources in an organization, including maintaining corporate-wide definitions and standards  Database Administration: A technical function that is responsible for physical database design and for dealing with technical issues such as security enforcement, database performance, and backup and recovery Chapter 12 2 © Prentice Hall, 2002
  • 3. Data Administration Functions  Data policies, procedures, standards  Planning  Data conflict (ownership) resolution  Internal marketing of DA concepts  Managing the data repository Chapter 12 3 © Prentice Hall, 2002
  • 4. Database Administration Functions  Selection of hardware and software  Installing/upgrading DBMS  Tuning database performance  Improving query processing performance  Managing data security, privacy, and integrity  Data backup and recovery Chapter 12 4 © Prentice Hall, 2002
  • 5. Data Warehouse Administration  New role, coming with the growth in data warehouses  Similar to DA/DBA roles  Emphasis on integration and coordination of metadata/data across many data sources  Specific roles: – Support decision –support applications – Manage data warehouse growth – Establish service level agreements regarding data warehouses and data marts Chapter 12 5 © Prentice Hall, 2002
  • 6. Database Security Database Security: Protection of the data against accidental or intentional loss, destruction, or misuse Increased difficulty due to Internet access and client/server technologies Chapter 12 6 © Prentice Hall, 2002
  • 7. Figure 12-2: Possible locations of data security threats Chapter 12 7 © Prentice Hall, 2002
  • 8. Threats to Data Security  Accidental losses attributable to: – Human error – Software failure – Hardware failure  Theftand fraud.  Improper data access: – Loss of privacy (personal data) – Loss of confidentiality (corporate data)  Loss of data integrity  Loss of availability (through, e.g. sabotage) Chapter 12 8 © Prentice Hall, 2002
  • 9. Data Management Software Security Features • Views or subschemas • Integrity controls • Authorization rules • User-defined procedures • Encryption • Authentication schemes • Backup, journalizing, and checkpointing Chapter 12 9 © Prentice Hall, 2002
  • 10. Views and Integrity Controls  Views – Subset of the database that is presented to one or more users – User can be given access privilege to view without allowing access privilege to underlying tables  Integrity Controls – Protect data from unauthorized use – Domains – set allowable values – Assertions – enforce database conditions Chapter 12 10 © Prentice Hall, 2002
  • 11. Authorization Rules  Controlsincorporated in the data management system  Restrict: – access to data – actions that people can take on data  Authorization matrix for: – Subjects – Objects – Actions – Constraints Chapter 12 11 © Prentice Hall, 2002
  • 12. Figure 12-3: Authorization matrix Chapter 12 12 © Prentice Hall, 2002
  • 13. Figure 12-4(a): Authorization table for subjects Figure 12-4(b): Authorization table for objects Figure 12-5: Oracle8i privileges Some DBMSs also provide capabilities for user-defined procedures to customize the authorization process Chapter 12 13 © Prentice Hall, 2002
  • 14. Authentication Schemes  Goal – obtain a positive identification of the user  Passwords are flawed: – Users share them with each other – They get written down, could be copied – Automatic logon scripts remove need to explicitly type them in – Unencrypted passwords travel the Internet  Possible solutions: – Biometric devices – use of fingerprints, retinal scans, etc. for positive ID – Third-party authentication – using secret keys, digital certificates Chapter 12 14 © Prentice Hall, 2002
  • 15. Database Recovery  Mechanism for restoring a database quickly and accurately after loss or damage  Recovery facilities: • Backup Facilities • Journalizing Facilities • Checkpoint Facility • Recovery Manager Chapter 12 15 © Prentice Hall, 2002
  • 16. Backup Facilities  Automatic dump facility that produces backup copy of the entire database  Periodic backup (e.g. nightly, weekly)  Cold backup – database is shut down during backup  Hot backup – selected portion is shut down and backed up at a given time  Backups stored in secure, off-site location Chapter 12 16 © Prentice Hall, 2002
  • 17. Journalizing Facilities  Audit trail of transactions and database updates  Transaction log – record of essential data for each transaction processed against the database  Database change log – images of updated data – Before-image – copy before modification – After-image – copy after modification Produces an audit trail Chapter 12 17 © Prentice Hall, 2002
  • 18. Figure 12-6: Database audit trail From the backup and logs, databases can be restored in case of damage or loss Chapter 12 18 © Prentice Hall, 2002
  • 19. Checkpoint Facilities  DBMS periodically refuses to accept new transactions   system is in a quiet state  Database and transaction logs are synchronized This allows recovery manager to resume processing from short period, instead of repeating entire day Chapter 12 19 © Prentice Hall, 2002
  • 20. Recovery and Restart Procedures  Switch - Mirrored databases  Restore/Rerun - Reprocess transactions against the backup  Transaction Integrity - Commit or abort all transaction changes  Backward Recovery (Rollback) - Apply before images  Forward Recovery (Roll Forward) - Apply after images (preferable to restore/rerun) Chapter 12 20 © Prentice Hall, 2002
  • 21. Figure 12-7: Basic recovery techniques (a) Rollback Chapter 12 21 © Prentice Hall, 2002
  • 22. Figure 12-7(b) Rollforward Chapter 12 22 © Prentice Hall, 2002
  • 23. Database Failure Responses  Aborted transactions – Preferred recovery: rollback – Alternative: Rollforward to state just prior to abort  Incorrect data – Preferred recovery: rollback – Alternative 1: re-run transactions not including inaccurate data updates – Alternative 2: compensating transactions  System failure (database intact) – Preferred recovery: switch to duplicate database – Alternative 1: rollback – Alternative 2: restart from checkpoint  Database destruction – Preferred recovery: switch to duplicate database – Alternative 1: rollforward – Alternative 2: reprocess transactions Chapter 12 23 © Prentice Hall, 2002
  • 24. Concurrency Control  Problem – in a multi-user environment, simultaneous access to data can result in interference and data loss  Solution – Concurrency Control – The process of managing simultaneous operations against a database so that data integrity is maintained and the operations do not interfere with each other in a multi-user environment. Chapter 12 24 © Prentice Hall, 2002
  • 25. Figure 12-8: LOST UPDATE Simultaneous access causes updates to cancel each other A similar problem is the inconsistent read problem Chapter 12 25 © Prentice Hall, 2002
  • 26. Concurrency Control Techniques  Serializability – – Finish one transaction before starting another  Locking Mechanisms – The most common way of achieving serialization – Data that is retrieved for the purpose of updating is locked for the updater – No other user can perform update until unlocked Chapter 12 26 © Prentice Hall, 2002
  • 27. Figure 12-9: Updates with locking for concurrency control This prevents the lost update problem Chapter 12 27 © Prentice Hall, 2002
  • 28. Locking Mechanisms  Locking level: – Database – used during database updates – Table – used for bulk updates – Block or page – very commonly used – Record – only requested row; fairly commonly used – Field – requires significant overhead; impractical  Types of locks: – Shared lock - Read but no update permitted. Used when just reading to prevent another user from placing an exclusive lock on the record – Exclusive lock - No access permitted. Used when preparing to update Chapter 12 28 © Prentice Hall, 2002
  • 29. Deadlock  An impasse that results when two or more transactions have locked common resources, and each waits for the other to unlock their resources Figure 12-11 A deadlock situation UserA and UserB will wait forever for each other to release their locked resources! Chapter 12 29 © Prentice Hall, 2002
  • 30. Managing Deadlock  Deadlock prevention: – Lock all records required at the beginning of a transaction – Two-phase locking protocol  Growing phase  Shrinking phase – May be difficult to determine all needed resources in advance  Deadlock Resolution: – Allow deadlocks to occur – Mechanisms for detecting and breaking them  Resource usage matrix Chapter 12 30 © Prentice Hall, 2002
  • 31. Versioning  Optimistic approach to concurrency control  Instead of locking  Assumption is that simultaneous updates will be infrequent  Each transaction can attempt an update as it wishes  The system will reject an update when it senses a conflict  Use of rollback and commit for this Chapter 12 31 © Prentice Hall, 2002
  • 32. Figure 12-12: the use of versioning Better performance than locking Chapter 12 32 © Prentice Hall, 2002
  • 33. Managing Data Quality  Data Steward - Liaisons between IT and business units  Five Data Quality Issues:  Security policy and disaster recovery  Personnel controls  Physical access controls  Maintenance controls (hardware & software)  Data protection and privacy Chapter 12 33 © Prentice Hall, 2002
  • 34. Data Dictionaries and Repositories  Data dictionary – Documents data elements of a database  System catalog – System-created database that describes all database objects  Information Repository – Stores metadata describing data and data processing resources  Information Repository Dictionary System (IRDS) – Software tool managing/controlling access to information repository Chapter 12 34 © Prentice Hall, 2002
  • 35. Figure 12-13: Three components of the repository system architecture A schema of the repository information Software that manages the repository objects Where repository objects are stored Source: adapted from Bernstein, 1996. Chapter 12 35 © Prentice Hall, 2002
  • 36. Database Performance Tuning  DBMS Installation – Setting installation parameters  Memory Usage – Set cache levels – Choose background processes  Input/Output Contention – Use striping – Distribution of heavily accessed files  CPU Usage – Monitor CPU load  Application tuning – Modification of SQL code in applications Chapter 12 36 © Prentice Hall, 2002