SlideShare a Scribd company logo
1 of 44
Database Systems: Design,
Implementation, and
Management
YourName
SubmittedTo:
2
Data as a Corporate Asset
• Data are a valuable asset that require careful
management
• Data are a valuable resource that translate into
information
• Accurate, timely information triggers actions
that enhance company’s position and generate
wealth
3
4
The Need for and Role of Databases
in an Organization
• Database’s predominant role is to support
managerial decision making at all levels
• DBMS facilitates:
– Interpretation and presentation of data
– Distribution of data and information
– Preservation and monitoring of data
– Control over data duplication and use
• Three levels to organization management:
– Top, middle, operational
5
Introduction of a Database:
Special Considerations
• Introduction of a DBMS is likely to have a
profound impact
– Might be positive or negative, depending on how
it is administered
• Three aspects to DBMS introduction:
– Technological
– Managerial
– Cultural
• One role of DBA department is to educate end
users about system uses and benefits
6
The Evolution of the Database
Administration Function
• Data administration has its roots in the old,
decentralized world of the file system
• Advent of DBMS produced new level of data
management sophistication
– DP department evolved into information systems
(IS) department
• Data management became increasingly
complex
– Development of database administration
function
7
The Database Environment’s
Human Component
• Even most carefully crafted database system
cannot operate without human component
• Effective data administration requires both
technical and managerial skills
• DA must set data administration goals
• DBA is focal point for data/user interaction
• Need for diverse mix of skills
8
9
Security
• Securing data entails securing overall
information system architecture
• Confidentiality: data protected against
unauthorized access
• Integrity: keep data consistent and free of
errors or anomalies
• Availability: accessibility of data by authorized
users for authorized purposes
10
Security Policies
• Database security officer secures the system
and the data
– Works with the database administrator
• Security policy: collection of standards,
policies, procedures to guarantee security
– Ensures auditing and compliance
• Security audit process identifies security
vulnerabilities
– Identifies measures to protect the system
11
Security Vulnerabilities
• Security vulnerability: weakness in a system
component
– Could allow unauthorized access or cause
service disruptions
• Security threat: imminent security violation
– Could occur at any time
• Security breach yields a database whose
integrity is:
• Preserved
• Corrupted
12
13
14
Database Security
• Refers to the use of DBMS features and other
measures to comply with security requirements
• DBA secures DBMS from installation through
operation and maintenance
• Authorization management:
– User access management
– View definition
– DBMS access control
– DBMS usage monitoring
15
Database Administration Tools
• Two main types of data dictionaries:
– Integrated
– Standalone
• Active data dictionary automatically updated
by the DBMS with every database access
• Passive data dictionary requires running a
batch process
• Main function: store description of all objects
that interact with database
16
Database Administration Tools
(continued)
• Data dictionary that includes data external to
DBMS becomes flexible tool
– Enables use and allocation of all organization’s
information
• Metadata often the basis for monitoring
database use
– Also for assigning access rights to users
• DBA uses data dictionary to support data
analysis and design
17
CASE Tools
• Computer-aided systems engineering
– Automated framework for SDLC
– Structured methodologies and powerful
graphical interfaces
• Front-end CASE tools provide support for
planning, analysis, and design phases
• Back-end CASE tools provide support for
coding and implementation phases
• Typical CASE tool has five components
18
19
Developing a Data
Administration Strategy
• Information engineering (IE) translates
strategic goals into data and applications
• Information systems architecture (ISA) is the
output of IE process
• Implementing IE is a costly process
– Provides a framework that includes use of
computerized, automated, and integrated tools
• Success of information systems strategy
depends on critical success factors
– Managerial, technological, and corporate culture
20
The DBA at Work: Using Oracle for
Database Administration
• Technical tasks handled by the DBA in a
specific DBMS:
– Creating and expanding database storage
structures
– Managing database objects
– Managing end-user database environment
– Customizing database initialization parameters
• All DBMS vendors provide programs to perform
database administrative tasks
Oracle Database Administration Tools
• In Oracle, most
DBA tasks
performed via
Oracle
Enterprise
Manager
interface
21
22
The Default Login
• Must connect to the database to perform
administrative tasks
– Username with administrative privileges
• Oracle automatically creates SYSTEM and
SYS user IDs with administrative privileges
• Define preferred credentials by clicking on
Preferences link, then Preferred Credentials
• Username and passwords are database-
specific
23
Ensuring an Automatic RDBMS Start
• DBA ensures database access automatically
started when computer turned on
• Service is a Windows system name for a
special program that runs automatically
– Part of the operating system
• Database instance: separate location in
memory reserved to run the database
– May have several databases running in memory
at the same time
24
Creating Tablespaces and Datafiles
• Database composed of one or more
tablespaces
• Tablespace is a logical storage space
– Physically stored in one or more datafiles
• Datafile physically stores the database’s data
– Each datafile can reside in a different directory
on the hard disk
• Database has 1:M relationship with tablespaces
• Tablespace has 1:M relationship with datafiles
25
Managing the Database Objects:
Tables, Views, Triggers, and
Procedures
• Database object: any object created by end
users
• Schema: logical section of the database that
belongs to a given user
– Schema identified by a username
– Within the schema, users create their own tables
and other objects
• Normally, users authorized to access only the
objects that belong to their own schemas
26
Managing Users and
Establishing Security
• User: uniquely identifiable object
– Allows a given person to log on to the database
• Role: a named collection of database access
privileges
– Authorizes a user to connect to the database
and use system resources
• Profile: named collection of settings
– Controls how much of a resource a given user
can use
27
Customizing the Database
Initialization Parameters
• Fine-tuning requires modification of database
configuration parameters
– Some are changed in real time using SQL
– Some affect database instance
– Others affect entire RDBMS and all instances
• Initialization parameters reserve resources
used by the database at run time
• After modifying parameters, may need to restart
the database
28
Creating a New Database
• General database creation format tends to be
generic
– Execution tends to be DBMS-specific
• Leading RDBMS vendors offer option to create
databases manually
– Use SQL commands or GUI-based process
• Oracle Database Configuration Assistant uses
a wizard interface
29
30
31
32
33
34
35
36
37
38
39
40
41
42
Summary
• Data management is a critical activity for any
organization
– Data should be treated as a corporate asset
• DBMS is the most commonly used electronic
tool for corporate data management
• DBMS has impact on organization’s managerial,
technological, and cultural framework
• Data administration function evolved from
centralized electronic data processing
– Applications began to share common repository
43
Summary (continued)
• Database administrator (DBA) is responsible
for managing corporate database
• Broader data management activity is handled
by data administrator (DA)
• DA is more managerially oriented than more
technically oriented DBA
– DA function is DBMS-independent
– DBA function is more DBMS-dependent
• When there is no DA, DBA executes all DA
functions
44
Summary (continued)
• Security ensures confidentiality, integrity,
availability of information system and data
• Security policy is a collection of standards,
policies, and practices
• Security vulnerability is a weakness in system
component
• Information engineering guides development
of data administration strategy
• CASE tools and data dictionaries translate
strategic plans to operational plans

More Related Content

Similar to Database Administration, Management & Security.pptx

CST204 DBMS Module-1
CST204 DBMS Module-1CST204 DBMS Module-1
CST204 DBMS Module-1Jyothis Menon
 
Lecture-1.ppt
Lecture-1.pptLecture-1.ppt
Lecture-1.pptChSheraz3
 
Introduction to Database Management System.pdf
Introduction to Database Management System.pdfIntroduction to Database Management System.pdf
Introduction to Database Management System.pdfbiswajit62002
 
Business intelligence and data warehouses
Business intelligence and data warehousesBusiness intelligence and data warehouses
Business intelligence and data warehousesDhani Ahmad
 
Database management system (part 1)
Database management system (part 1)Database management system (part 1)
Database management system (part 1)KavithaA19
 
Unit-I mech for studendts for btech .ppt
Unit-I mech for studendts for btech .pptUnit-I mech for studendts for btech .ppt
Unit-I mech for studendts for btech .pptDeepakShakya39
 
Data base chapter 2 | detail about the topic
Data base chapter 2 | detail about the topicData base chapter 2 | detail about the topic
Data base chapter 2 | detail about the topichoseg78377
 
Database management systems components
Database management systems componentsDatabase management systems components
Database management systems componentsmuhammad bilal
 
01-database-management.pptx
01-database-management.pptx01-database-management.pptx
01-database-management.pptxdhanajimirajkar1
 
Cp 121 lecture 01
Cp 121 lecture 01Cp 121 lecture 01
Cp 121 lecture 01ITNet
 
CST204 DBMSMODULE1 PPT (1).pptx
CST204 DBMSMODULE1 PPT (1).pptxCST204 DBMSMODULE1 PPT (1).pptx
CST204 DBMSMODULE1 PPT (1).pptxMEGHANA508383
 
Beginning Of DBMS (data base)
Beginning Of DBMS (data base)Beginning Of DBMS (data base)
Beginning Of DBMS (data base)Surya Swaroop
 
UNIT machine learning unit 1,algorithm pdf
UNIT machine learning  unit 1,algorithm pdfUNIT machine learning  unit 1,algorithm pdf
UNIT machine learning unit 1,algorithm pdfOmarFarooque9
 
Chapter 4 security part ii auditing database systems
Chapter 4 security part ii auditing database systemsChapter 4 security part ii auditing database systems
Chapter 4 security part ii auditing database systemsjayussuryawan
 
Chapter 6: Data Operations Management
Chapter 6: Data Operations ManagementChapter 6: Data Operations Management
Chapter 6: Data Operations ManagementAhmed Alorage
 

Similar to Database Administration, Management & Security.pptx (20)

CST204 DBMS Module-1
CST204 DBMS Module-1CST204 DBMS Module-1
CST204 DBMS Module-1
 
Lecture-1.ppt
Lecture-1.pptLecture-1.ppt
Lecture-1.ppt
 
Introduction to Database Management System.pdf
Introduction to Database Management System.pdfIntroduction to Database Management System.pdf
Introduction to Database Management System.pdf
 
Dbms unit 1
Dbms unit 1Dbms unit 1
Dbms unit 1
 
Business intelligence and data warehouses
Business intelligence and data warehousesBusiness intelligence and data warehouses
Business intelligence and data warehouses
 
Database management system (part 1)
Database management system (part 1)Database management system (part 1)
Database management system (part 1)
 
Session1
Session1Session1
Session1
 
Unit-I mech for studendts for btech .ppt
Unit-I mech for studendts for btech .pptUnit-I mech for studendts for btech .ppt
Unit-I mech for studendts for btech .ppt
 
Data base chapter 2 | detail about the topic
Data base chapter 2 | detail about the topicData base chapter 2 | detail about the topic
Data base chapter 2 | detail about the topic
 
Database management systems components
Database management systems componentsDatabase management systems components
Database management systems components
 
01-database-management.pptx
01-database-management.pptx01-database-management.pptx
01-database-management.pptx
 
Cp 121 lecture 01
Cp 121 lecture 01Cp 121 lecture 01
Cp 121 lecture 01
 
CST204 DBMSMODULE1 PPT (1).pptx
CST204 DBMSMODULE1 PPT (1).pptxCST204 DBMSMODULE1 PPT (1).pptx
CST204 DBMSMODULE1 PPT (1).pptx
 
Beginning Of DBMS (data base)
Beginning Of DBMS (data base)Beginning Of DBMS (data base)
Beginning Of DBMS (data base)
 
Foundations of business intelligence databases and information management
Foundations of business intelligence databases and information managementFoundations of business intelligence databases and information management
Foundations of business intelligence databases and information management
 
UNIT machine learning unit 1,algorithm pdf
UNIT machine learning  unit 1,algorithm pdfUNIT machine learning  unit 1,algorithm pdf
UNIT machine learning unit 1,algorithm pdf
 
Introduction to RDBMS
Introduction to RDBMSIntroduction to RDBMS
Introduction to RDBMS
 
Chapter 4 security part ii auditing database systems
Chapter 4 security part ii auditing database systemsChapter 4 security part ii auditing database systems
Chapter 4 security part ii auditing database systems
 
Chapter 6: Data Operations Management
Chapter 6: Data Operations ManagementChapter 6: Data Operations Management
Chapter 6: Data Operations Management
 
Rdbms
RdbmsRdbms
Rdbms
 

Recently uploaded

10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 

Recently uploaded (20)

10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 

Database Administration, Management & Security.pptx

  • 1. Database Systems: Design, Implementation, and Management YourName SubmittedTo:
  • 2. 2 Data as a Corporate Asset • Data are a valuable asset that require careful management • Data are a valuable resource that translate into information • Accurate, timely information triggers actions that enhance company’s position and generate wealth
  • 3. 3
  • 4. 4 The Need for and Role of Databases in an Organization • Database’s predominant role is to support managerial decision making at all levels • DBMS facilitates: – Interpretation and presentation of data – Distribution of data and information – Preservation and monitoring of data – Control over data duplication and use • Three levels to organization management: – Top, middle, operational
  • 5. 5 Introduction of a Database: Special Considerations • Introduction of a DBMS is likely to have a profound impact – Might be positive or negative, depending on how it is administered • Three aspects to DBMS introduction: – Technological – Managerial – Cultural • One role of DBA department is to educate end users about system uses and benefits
  • 6. 6 The Evolution of the Database Administration Function • Data administration has its roots in the old, decentralized world of the file system • Advent of DBMS produced new level of data management sophistication – DP department evolved into information systems (IS) department • Data management became increasingly complex – Development of database administration function
  • 7. 7 The Database Environment’s Human Component • Even most carefully crafted database system cannot operate without human component • Effective data administration requires both technical and managerial skills • DA must set data administration goals • DBA is focal point for data/user interaction • Need for diverse mix of skills
  • 8. 8
  • 9. 9 Security • Securing data entails securing overall information system architecture • Confidentiality: data protected against unauthorized access • Integrity: keep data consistent and free of errors or anomalies • Availability: accessibility of data by authorized users for authorized purposes
  • 10. 10 Security Policies • Database security officer secures the system and the data – Works with the database administrator • Security policy: collection of standards, policies, procedures to guarantee security – Ensures auditing and compliance • Security audit process identifies security vulnerabilities – Identifies measures to protect the system
  • 11. 11 Security Vulnerabilities • Security vulnerability: weakness in a system component – Could allow unauthorized access or cause service disruptions • Security threat: imminent security violation – Could occur at any time • Security breach yields a database whose integrity is: • Preserved • Corrupted
  • 12. 12
  • 13. 13
  • 14. 14 Database Security • Refers to the use of DBMS features and other measures to comply with security requirements • DBA secures DBMS from installation through operation and maintenance • Authorization management: – User access management – View definition – DBMS access control – DBMS usage monitoring
  • 15. 15 Database Administration Tools • Two main types of data dictionaries: – Integrated – Standalone • Active data dictionary automatically updated by the DBMS with every database access • Passive data dictionary requires running a batch process • Main function: store description of all objects that interact with database
  • 16. 16 Database Administration Tools (continued) • Data dictionary that includes data external to DBMS becomes flexible tool – Enables use and allocation of all organization’s information • Metadata often the basis for monitoring database use – Also for assigning access rights to users • DBA uses data dictionary to support data analysis and design
  • 17. 17 CASE Tools • Computer-aided systems engineering – Automated framework for SDLC – Structured methodologies and powerful graphical interfaces • Front-end CASE tools provide support for planning, analysis, and design phases • Back-end CASE tools provide support for coding and implementation phases • Typical CASE tool has five components
  • 18. 18
  • 19. 19 Developing a Data Administration Strategy • Information engineering (IE) translates strategic goals into data and applications • Information systems architecture (ISA) is the output of IE process • Implementing IE is a costly process – Provides a framework that includes use of computerized, automated, and integrated tools • Success of information systems strategy depends on critical success factors – Managerial, technological, and corporate culture
  • 20. 20 The DBA at Work: Using Oracle for Database Administration • Technical tasks handled by the DBA in a specific DBMS: – Creating and expanding database storage structures – Managing database objects – Managing end-user database environment – Customizing database initialization parameters • All DBMS vendors provide programs to perform database administrative tasks
  • 21. Oracle Database Administration Tools • In Oracle, most DBA tasks performed via Oracle Enterprise Manager interface 21
  • 22. 22 The Default Login • Must connect to the database to perform administrative tasks – Username with administrative privileges • Oracle automatically creates SYSTEM and SYS user IDs with administrative privileges • Define preferred credentials by clicking on Preferences link, then Preferred Credentials • Username and passwords are database- specific
  • 23. 23 Ensuring an Automatic RDBMS Start • DBA ensures database access automatically started when computer turned on • Service is a Windows system name for a special program that runs automatically – Part of the operating system • Database instance: separate location in memory reserved to run the database – May have several databases running in memory at the same time
  • 24. 24 Creating Tablespaces and Datafiles • Database composed of one or more tablespaces • Tablespace is a logical storage space – Physically stored in one or more datafiles • Datafile physically stores the database’s data – Each datafile can reside in a different directory on the hard disk • Database has 1:M relationship with tablespaces • Tablespace has 1:M relationship with datafiles
  • 25. 25 Managing the Database Objects: Tables, Views, Triggers, and Procedures • Database object: any object created by end users • Schema: logical section of the database that belongs to a given user – Schema identified by a username – Within the schema, users create their own tables and other objects • Normally, users authorized to access only the objects that belong to their own schemas
  • 26. 26 Managing Users and Establishing Security • User: uniquely identifiable object – Allows a given person to log on to the database • Role: a named collection of database access privileges – Authorizes a user to connect to the database and use system resources • Profile: named collection of settings – Controls how much of a resource a given user can use
  • 27. 27 Customizing the Database Initialization Parameters • Fine-tuning requires modification of database configuration parameters – Some are changed in real time using SQL – Some affect database instance – Others affect entire RDBMS and all instances • Initialization parameters reserve resources used by the database at run time • After modifying parameters, may need to restart the database
  • 28. 28 Creating a New Database • General database creation format tends to be generic – Execution tends to be DBMS-specific • Leading RDBMS vendors offer option to create databases manually – Use SQL commands or GUI-based process • Oracle Database Configuration Assistant uses a wizard interface
  • 29. 29
  • 30. 30
  • 31. 31
  • 32. 32
  • 33. 33
  • 34. 34
  • 35. 35
  • 36. 36
  • 37. 37
  • 38. 38
  • 39. 39
  • 40. 40
  • 41. 41
  • 42. 42 Summary • Data management is a critical activity for any organization – Data should be treated as a corporate asset • DBMS is the most commonly used electronic tool for corporate data management • DBMS has impact on organization’s managerial, technological, and cultural framework • Data administration function evolved from centralized electronic data processing – Applications began to share common repository
  • 43. 43 Summary (continued) • Database administrator (DBA) is responsible for managing corporate database • Broader data management activity is handled by data administrator (DA) • DA is more managerially oriented than more technically oriented DBA – DA function is DBMS-independent – DBA function is more DBMS-dependent • When there is no DA, DBA executes all DA functions
  • 44. 44 Summary (continued) • Security ensures confidentiality, integrity, availability of information system and data • Security policy is a collection of standards, policies, and practices • Security vulnerability is a weakness in system component • Information engineering guides development of data administration strategy • CASE tools and data dictionaries translate strategic plans to operational plans