SlideShare a Scribd company logo
Database Systems: Design,
Implementation, and
Management
Eighth Edition
Chapter 15
Database Administration and Security
Database Systems, 8th
Edition 2
Objectives
• In this chapter, you will learn:
– Data are a valuable business asset requiring
careful management
– How a database plays a critical role in an
organization
– Introduction of a DBMS has technological,
managerial, and cultural organizational
consequences
Database Systems, 8th
Edition 3
Objectives (continued)
• In this chapter, you will learn: (continued)
– Database administrator’s managerial and
technical roles
– Data security, database security, and the
information security framework
– Several database administration tools and
strategies
– How various database administration technical
tasks are performed with Oracle
Database Systems, 8th
Edition 4
Data as a Corporate Asset
• Data are a valuable asset that require careful
management
• Data are a valuable resource that translate into
information
• Accurate, timely information triggers actions
that enhance company’s position and generate
wealth
Database Systems, 8th
Edition 5
Database Systems, 8th
Edition 6
The Need for and Role of Databases
in an Organization
• Database’s predominant role is to support
managerial decision making at all levels
• DBMS facilitates:
– Interpretation and presentation of data
– Distribution of data and information
– Preservation and monitoring of data
– Control over data duplication and use
• Three levels to organization management:
– Top, middle, operational
Database Systems, 8th
Edition 7
Introduction of a Database:
Special Considerations
• Introduction of a DBMS is likely to have a
profound impact
– Might be positive or negative, depending on how
it is administered
• Three aspects to DBMS introduction:
– Technological
– Managerial
– Cultural
• One role of DBA department is to educate end
users about system uses and benefits
Database Systems, 8th
Edition 8
The Evolution of the Database
Administration Function
• Data administration has its roots in the old,
decentralized world of the file system
• Advent of DBMS produced new level of data
management sophistication
– DP department evolved into information systems
(IS) department
• Data management became increasingly
complex
– Development of database administration
function
Database Systems, 8th
Edition 9
The Database Environment’s
Human Component
• Even most carefully crafted database system
cannot operate without human component
• Effective data administration requires both
technical and managerial skills
• DA must set data administration goals
• DBA is focal point for data/user interaction
• Need for diverse mix of skills
Database Systems, 8th
Edition 10
Database Systems, 8th
Edition 11
The DBA’s Managerial Role
• DBA responsible for:
– Coordinating, monitoring, allocating resources
• Resources include people and data
– Defining goals and formulating strategic plans
• Interacts with end user by providing data and
information
• Enforces policies, standards, procedures
• Manages security, privacy, integrity
• Ensures data can be fully recovered
• Ensures data distributed appropriately
Database Systems, 8th
Edition 12
The DBA’s Technical Role
• Evaluates, selects, and installs DBMS and
related utilities
• Designs and implements databases and
applications
• Tests and evaluates databases and
applications
• Operates DBMS, utilities, and applications
• Trains and supports users
• Maintains DBMS, utilities, and applications
Database Systems, 8th
Edition 13
Security
• Securing data entails securing overall
information system architecture
• Confidentiality: data protected against
unauthorized access
• Integrity: keep data consistent and free of
errors or anomalies
• Availability: accessibility of data by authorized
users for authorized purposes
Database Systems, 8th
Edition 14
Security Policies
• Database security officer secures the system
and the data
– Works with the database administrator
• Security policy: collection of standards,
policies, procedures to guarantee security
– Ensures auditing and compliance
• Security audit process identifies security
vulnerabilities
– Identifies measures to protect the system
Database Systems, 8th
Edition 15
Security Vulnerabilities
• Security vulnerability: weakness in a system
component
– Could allow unauthorized access or cause
service disruptions
• Security threat: imminent security violation
– Could occur at any time
• Security breach yields a database whose
integrity is:
• Preserved
• Corrupted
Database Systems, 8th
Edition 16
Database Systems, 8th
Edition 17
Database Systems, 8th
Edition 18
Database Security
• Refers to the use of DBMS features and other
measures to comply with security requirements
• DBA secures DBMS from installation through
operation and maintenance
• Authorization management:
– User access management
– View definition
– DBMS access control
– DBMS usage monitoring
Database Systems, 8th
Edition 19
Database Administration Tools
• Two main types of data dictionaries:
– Integrated
– Standalone
• Active data dictionary automatically updated
by the DBMS with every database access
• Passive data dictionary requires running a
batch process
• Main function: store description of all objects
that interact with database
Database Systems, 8th
Edition 20
Database Administration Tools
(continued)
• Data dictionary that includes data external to
DBMS becomes flexible tool
– Enables use and allocation of all organization’s
information
• Metadata often the basis for monitoring
database use
– Also for assigning access rights to users
• DBA uses data dictionary to support data
analysis and design
Database Systems, 8th
Edition 21
CASE Tools
• Computer-aided systems engineering
– Automated framework for SDLC
– Structured methodologies and powerful
graphical interfaces
• Front-end CASE tools provide support for
planning, analysis, and design phases
• Back-end CASE tools provide support for
coding and implementation phases
• Typical CASE tool has five components
Database Systems, 8th
Edition 22
Database Systems, 8th
Edition 23
Developing a Data
Administration Strategy
• Information engineering (IE) translates
strategic goals into data and applications
• Information systems architecture (ISA) is the
output of IE process
• Implementing IE is a costly process
– Provides a framework that includes use of
computerized, automated, and integrated tools
• Success of information systems strategy
depends on critical success factors
– Managerial, technological, and corporate culture
Database Systems, 8th
Edition 24
The DBA at Work: Using Oracle for
Database Administration
• Technical tasks handled by the DBA in a
specific DBMS:
– Creating and expanding database storage
structures
– Managing database objects
– Managing end-user database environment
– Customizing database initialization parameters
• All DBMS vendors provide programs to perform
database administrative tasks
Database Systems, 8th
Edition 25
Oracle Database Administration Tools
• In Oracle, most
DBA tasks
performed via
Oracle
Enterprise
Manager
interface
Database Systems, 8th
Edition 26
The Default Login
• Must connect to the database to perform
administrative tasks
– Username with administrative privileges
• Oracle automatically creates SYSTEM and
SYS user IDs with administrative privileges
• Define preferred credentials by clicking on
Preferences link, then Preferred Credentials
• Username and passwords are database-
specific
Database Systems, 8th
Edition 27
Ensuring an Automatic RDBMS Start
• DBA ensures database access automatically
started when computer turned on
• Service is a Windows system name for a
special program that runs automatically
– Part of the operating system
• Database instance: separate location in
memory reserved to run the database
– May have several databases running in memory
at the same time
Database Systems, 8th
Edition 28
Creating Tablespaces and Datafiles
• Database composed of one or more
tablespaces
• Tablespace is a logical storage space
– Physically stored in one or more datafiles
• Datafile physically stores the database’s data
– Each datafile can reside in a different directory
on the hard disk
• Database has 1:M relationship with tablespaces
• Tablespace has 1:M relationship with datafiles
Database Systems, 8th
Edition 29
Managing the Database Objects:
Tables, Views, Triggers, and
Procedures
• Database object: any object created by end
users
• Schema: logical section of the database that
belongs to a given user
– Schema identified by a username
– Within the schema, users create their own tables
and other objects
• Normally, users authorized to access only the
objects that belong to their own schemas
Database Systems, 8th
Edition 30
Managing Users and
Establishing Security
• User: uniquely identifiable object
– Allows a given person to log on to the database
• Role: a named collection of database access
privileges
– Authorizes a user to connect to the database
and use system resources
• Profile: named collection of settings
– Controls how much of a resource a given user
can use
Database Systems, 8th
Edition 31
Customizing the Database
Initialization Parameters
• Fine-tuning requires modification of database
configuration parameters
– Some are changed in real time using SQL
– Some affect database instance
– Others affect entire RDBMS and all instances
• Initialization parameters reserve resources
used by the database at run time
• After modifying parameters, may need to restart
the database
Database Systems, 8th
Edition 32
Creating a New Database
• General database creation format tends to be
generic
– Execution tends to be DBMS-specific
• Leading RDBMS vendors offer option to create
databases manually
– Use SQL commands or GUI-based process
• Oracle Database Configuration Assistant uses
a wizard interface
Database Systems, 8th
Edition 33
Database Systems, 8th
Edition 34
Database Systems, 8th
Edition 35
Database Systems, 8th
Edition 36
Database Systems, 8th
Edition 37
Database Systems, 8th
Edition 38
Database Systems, 8th
Edition 39
Database Systems, 8th
Edition 40
Database Systems, 8th
Edition 41
Database Systems, 8th
Edition 42
Database Systems, 8th
Edition 43
Database Systems, 8th
Edition 44
Database Systems, 8th
Edition 45
Database Systems, 8th
Edition 46
Summary
• Data management is a critical activity for any
organization
– Data should be treated as a corporate asset
• DBMS is the most commonly used electronic
tool for corporate data management
• DBMS has impact on organization’s managerial,
technological, and cultural framework
• Data administration function evolved from
centralized electronic data processing
– Applications began to share common repository
Database Systems, 8th
Edition 47
Summary (continued)
• Database administrator (DBA) is responsible
for managing corporate database
• Broader data management activity is handled
by data administrator (DA)
• DA is more managerially oriented than more
technically oriented DBA
– DA function is DBMS-independent
– DBA function is more DBMS-dependent
• When there is no DA, DBA executes all DA
functions
Database Systems, 8th
Edition 48
Summary (continued)
• Managerial services of DBA function:
– Supporting end-user community
– Defining and enforcing policies, procedures, and
standards for database function
– Ensuring data security, privacy, and integrity
– Providing data backup and recovery services
– Monitoring distribution and use of data in
database
Database Systems, 8th
Edition 49
Summary (continued)
• Technical role of DBA:
– Evaluating, selecting, and installing DBMS
– Designing and implementing databases and
applications
– Testing and evaluating databases and
applications
– Operating DBMS, utilities, and applications
– Training and supporting users
– Maintaining DBMS, utilities, and applications
Database Systems, 8th
Edition 50
Summary (continued)
• Security ensures confidentiality, integrity,
availability of information system and data
• Security policy is a collection of standards,
policies, and practices
• Security vulnerability is a weakness in system
component
• Information engineering guides development
of data administration strategy
• CASE tools and data dictionaries translate
strategic plans to operational plans

More Related Content

What's hot

Lecture 01 introduction to database
Lecture 01 introduction to databaseLecture 01 introduction to database
Lecture 01 introduction to databaseemailharmeet
 
Files Vs DataBase
Files Vs DataBaseFiles Vs DataBase
Files Vs DataBase
Dr. C.V. Suresh Babu
 
Transaction management and concurrency control
Transaction management and concurrency controlTransaction management and concurrency control
Transaction management and concurrency control
Dhani Ahmad
 
Object Oriented Database Management System
Object Oriented Database Management SystemObject Oriented Database Management System
Object Oriented Database Management System
Ajay Jha
 
Basic oracle-database-administration
Basic oracle-database-administrationBasic oracle-database-administration
Basic oracle-database-administration
sreehari orienit
 
Database systems - Chapter 2
Database systems - Chapter 2Database systems - Chapter 2
Database systems - Chapter 2
shahab3
 
3 tier data warehouse
3 tier data warehouse3 tier data warehouse
3 tier data warehouse
J M
 
Advance Database Management Systems -Object Oriented Principles In Database
Advance Database Management Systems -Object Oriented Principles In DatabaseAdvance Database Management Systems -Object Oriented Principles In Database
Advance Database Management Systems -Object Oriented Principles In Database
Sonali Parab
 
Data base security & integrity
Data base security &  integrityData base security &  integrity
Data base security & integrity
Pooja Dixit
 
Database Chapter 2
Database Chapter 2Database Chapter 2
Database Chapter 2
shahadat hossain
 
Data Models [DATABASE SYSTEMS: Design, Implementation, and Management]
Data Models [DATABASE SYSTEMS: Design, Implementation, and Management]Data Models [DATABASE SYSTEMS: Design, Implementation, and Management]
Data Models [DATABASE SYSTEMS: Design, Implementation, and Management]
Usman Tariq
 
Fundamentals of Database ppt ch03
Fundamentals of Database ppt ch03Fundamentals of Database ppt ch03
Fundamentals of Database ppt ch03Jotham Gadot
 
Oracle DBA
Oracle DBAOracle DBA
Oracle DBA
shivankuniversity
 
User, roles and privileges
User, roles and privilegesUser, roles and privileges
User, roles and privileges
Yogiji Creations
 
Physical database design(database)
Physical database design(database)Physical database design(database)
Physical database design(database)welcometofacebook
 
Dbms Introduction and Basics
Dbms Introduction and BasicsDbms Introduction and Basics
Dbms Introduction and Basics
SHIKHA GAUTAM
 
Dbms 3: 3 Schema Architecture
Dbms 3: 3 Schema ArchitectureDbms 3: 3 Schema Architecture
Dbms 3: 3 Schema Architecture
Amiya9439793168
 
Relational model
Relational modelRelational model
Relational model
Dabbal Singh Mahara
 

What's hot (20)

Lecture 01 introduction to database
Lecture 01 introduction to databaseLecture 01 introduction to database
Lecture 01 introduction to database
 
Files Vs DataBase
Files Vs DataBaseFiles Vs DataBase
Files Vs DataBase
 
Transaction management and concurrency control
Transaction management and concurrency controlTransaction management and concurrency control
Transaction management and concurrency control
 
Object Oriented Database Management System
Object Oriented Database Management SystemObject Oriented Database Management System
Object Oriented Database Management System
 
Basic oracle-database-administration
Basic oracle-database-administrationBasic oracle-database-administration
Basic oracle-database-administration
 
Database systems - Chapter 2
Database systems - Chapter 2Database systems - Chapter 2
Database systems - Chapter 2
 
3 tier data warehouse
3 tier data warehouse3 tier data warehouse
3 tier data warehouse
 
Oracle archi ppt
Oracle archi pptOracle archi ppt
Oracle archi ppt
 
Advance Database Management Systems -Object Oriented Principles In Database
Advance Database Management Systems -Object Oriented Principles In DatabaseAdvance Database Management Systems -Object Oriented Principles In Database
Advance Database Management Systems -Object Oriented Principles In Database
 
Data base security & integrity
Data base security &  integrityData base security &  integrity
Data base security & integrity
 
Database Chapter 2
Database Chapter 2Database Chapter 2
Database Chapter 2
 
Data Models [DATABASE SYSTEMS: Design, Implementation, and Management]
Data Models [DATABASE SYSTEMS: Design, Implementation, and Management]Data Models [DATABASE SYSTEMS: Design, Implementation, and Management]
Data Models [DATABASE SYSTEMS: Design, Implementation, and Management]
 
Fundamentals of Database ppt ch03
Fundamentals of Database ppt ch03Fundamentals of Database ppt ch03
Fundamentals of Database ppt ch03
 
Oracle DBA
Oracle DBAOracle DBA
Oracle DBA
 
User, roles and privileges
User, roles and privilegesUser, roles and privileges
User, roles and privileges
 
Physical database design(database)
Physical database design(database)Physical database design(database)
Physical database design(database)
 
Data administration
Data administrationData administration
Data administration
 
Dbms Introduction and Basics
Dbms Introduction and BasicsDbms Introduction and Basics
Dbms Introduction and Basics
 
Dbms 3: 3 Schema Architecture
Dbms 3: 3 Schema ArchitectureDbms 3: 3 Schema Architecture
Dbms 3: 3 Schema Architecture
 
Relational model
Relational modelRelational model
Relational model
 

Viewers also liked

Database administration and security
Database administration and securityDatabase administration and security
Database administration and securityMohd Arif
 
Database administrator
Database administratorDatabase administrator
Database administratorTech_MX
 
Data and database administration(database)
Data and database administration(database)Data and database administration(database)
Data and database administration(database)welcometofacebook
 
The Key Responsibilities of a Database Administrator
The Key Responsibilities of a Database AdministratorThe Key Responsibilities of a Database Administrator
The Key Responsibilities of a Database Administrator
dsp
 
Business intelligence and data warehouses
Business intelligence and data warehousesBusiness intelligence and data warehouses
Business intelligence and data warehouses
Dhani Ahmad
 
Advanced data modeling
Advanced data modelingAdvanced data modeling
Advanced data modeling
Dhani Ahmad
 
Database connectivity and web technologies
Database connectivity and web technologiesDatabase connectivity and web technologies
Database connectivity and web technologies
Dhani Ahmad
 
Distributed database management systems
Distributed database management systemsDistributed database management systems
Distributed database management systems
Dhani Ahmad
 
Strategic planning
Strategic planningStrategic planning
Strategic planning
Dhani Ahmad
 
Data security and Integrity
Data security and IntegrityData security and Integrity
Data security and Integrity
Zaid Shabbir
 
Database
DatabaseDatabase
Database
Dhani Ahmad
 
Introduction to project management
Introduction to project managementIntroduction to project management
Introduction to project management
Dhani Ahmad
 
Entity relationship (er) modeling
Entity relationship (er) modelingEntity relationship (er) modeling
Entity relationship (er) modeling
Dhani Ahmad
 
Project integration management
Project integration managementProject integration management
Project integration management
Dhani Ahmad
 
Types of islamic institutions and records
Types of islamic institutions and recordsTypes of islamic institutions and records
Types of islamic institutions and records
Dhani Ahmad
 
Database design, implementation, and management -chapter04
Database design, implementation, and management -chapter04Database design, implementation, and management -chapter04
Database design, implementation, and management -chapter04
Beni Krisbiantoro
 
The relational database model
The relational database modelThe relational database model
The relational database model
Dhani Ahmad
 
Information system
Information systemInformation system
Information systemDhani Ahmad
 
Database Technologies for Semantic Web
Database Technologies for Semantic WebDatabase Technologies for Semantic Web
Database Technologies for Semantic Web
José Maria Silveira Neto
 
Database design, implementation, and management -chapter02
Database design, implementation, and management -chapter02Database design, implementation, and management -chapter02
Database design, implementation, and management -chapter02
Beni Krisbiantoro
 

Viewers also liked (20)

Database administration and security
Database administration and securityDatabase administration and security
Database administration and security
 
Database administrator
Database administratorDatabase administrator
Database administrator
 
Data and database administration(database)
Data and database administration(database)Data and database administration(database)
Data and database administration(database)
 
The Key Responsibilities of a Database Administrator
The Key Responsibilities of a Database AdministratorThe Key Responsibilities of a Database Administrator
The Key Responsibilities of a Database Administrator
 
Business intelligence and data warehouses
Business intelligence and data warehousesBusiness intelligence and data warehouses
Business intelligence and data warehouses
 
Advanced data modeling
Advanced data modelingAdvanced data modeling
Advanced data modeling
 
Database connectivity and web technologies
Database connectivity and web technologiesDatabase connectivity and web technologies
Database connectivity and web technologies
 
Distributed database management systems
Distributed database management systemsDistributed database management systems
Distributed database management systems
 
Strategic planning
Strategic planningStrategic planning
Strategic planning
 
Data security and Integrity
Data security and IntegrityData security and Integrity
Data security and Integrity
 
Database
DatabaseDatabase
Database
 
Introduction to project management
Introduction to project managementIntroduction to project management
Introduction to project management
 
Entity relationship (er) modeling
Entity relationship (er) modelingEntity relationship (er) modeling
Entity relationship (er) modeling
 
Project integration management
Project integration managementProject integration management
Project integration management
 
Types of islamic institutions and records
Types of islamic institutions and recordsTypes of islamic institutions and records
Types of islamic institutions and records
 
Database design, implementation, and management -chapter04
Database design, implementation, and management -chapter04Database design, implementation, and management -chapter04
Database design, implementation, and management -chapter04
 
The relational database model
The relational database modelThe relational database model
The relational database model
 
Information system
Information systemInformation system
Information system
 
Database Technologies for Semantic Web
Database Technologies for Semantic WebDatabase Technologies for Semantic Web
Database Technologies for Semantic Web
 
Database design, implementation, and management -chapter02
Database design, implementation, and management -chapter02Database design, implementation, and management -chapter02
Database design, implementation, and management -chapter02
 

Similar to Database administration and security

Database Administration, Management & Security.pptx
Database Administration, Management & Security.pptxDatabase Administration, Management & Security.pptx
Database Administration, Management & Security.pptx
SaqibKhan60365
 
Database management system lecture notes
Database management system lecture notesDatabase management system lecture notes
Database management system lecture notes
UTSAHSINGH2
 
02010 ppt ch01
02010 ppt ch0102010 ppt ch01
02010 ppt ch01Hpong Js
 
Lecture 1 =Unit 1 Part 1.ppt
Lecture 1 =Unit 1 Part 1.pptLecture 1 =Unit 1 Part 1.ppt
Lecture 1 =Unit 1 Part 1.ppt
DeeptimaanKrishnaJad
 
Database
DatabaseDatabase
Database
Mohit Bishnoi
 
CS3270 - DATABASE SYSTEM - Lecture (1)
CS3270 - DATABASE SYSTEM -  Lecture (1)CS3270 - DATABASE SYSTEM -  Lecture (1)
CS3270 - DATABASE SYSTEM - Lecture (1)
Dilawar Khan
 
01-database-management.pptx
01-database-management.pptx01-database-management.pptx
01-database-management.pptx
dhanajimirajkar1
 
Lecture-1.ppt
Lecture-1.pptLecture-1.ppt
Lecture-1.ppt
ChSheraz3
 
Database_Design.ppt
Database_Design.pptDatabase_Design.ppt
Database_Design.ppt
NadiSarj2
 
Cp 121 lecture 01
Cp 121 lecture 01Cp 121 lecture 01
Cp 121 lecture 01
ITNet
 
02 - DatabaseConcepts.pdf
02 - DatabaseConcepts.pdf02 - DatabaseConcepts.pdf
02 - DatabaseConcepts.pdf
DheromeIngenious1
 
Dbms unit 1
Dbms unit 1Dbms unit 1
Dbms unit 1
SaiGupta18
 
Unit-I mech for studendts for btech .ppt
Unit-I mech for studendts for btech .pptUnit-I mech for studendts for btech .ppt
Unit-I mech for studendts for btech .ppt
DeepakShakya39
 
Database management system (part 1)
Database management system (part 1)Database management system (part 1)
Database management system (part 1)
KavithaA19
 
Data base chapter 2 | detail about the topic
Data base chapter 2 | detail about the topicData base chapter 2 | detail about the topic
Data base chapter 2 | detail about the topic
hoseg78377
 
CST204 DBMSMODULE1 PPT (1).pptx
CST204 DBMSMODULE1 PPT (1).pptxCST204 DBMSMODULE1 PPT (1).pptx
CST204 DBMSMODULE1 PPT (1).pptx
MEGHANA508383
 
Introduction to Database Management System.pdf
Introduction to Database Management System.pdfIntroduction to Database Management System.pdf
Introduction to Database Management System.pdf
biswajit62002
 
Overview of Data Base Systems Concepts and Architecture
Overview of Data Base Systems Concepts and ArchitectureOverview of Data Base Systems Concepts and Architecture
Overview of Data Base Systems Concepts and Architecture
Rubal Sagwal
 
Beginning Of DBMS (data base)
Beginning Of DBMS (data base)Beginning Of DBMS (data base)
Beginning Of DBMS (data base)
Surya Swaroop
 

Similar to Database administration and security (20)

Database Administration, Management & Security.pptx
Database Administration, Management & Security.pptxDatabase Administration, Management & Security.pptx
Database Administration, Management & Security.pptx
 
Database management system lecture notes
Database management system lecture notesDatabase management system lecture notes
Database management system lecture notes
 
02010 ppt ch01
02010 ppt ch0102010 ppt ch01
02010 ppt ch01
 
Lecture 1 =Unit 1 Part 1.ppt
Lecture 1 =Unit 1 Part 1.pptLecture 1 =Unit 1 Part 1.ppt
Lecture 1 =Unit 1 Part 1.ppt
 
Database
DatabaseDatabase
Database
 
CS3270 - DATABASE SYSTEM - Lecture (1)
CS3270 - DATABASE SYSTEM -  Lecture (1)CS3270 - DATABASE SYSTEM -  Lecture (1)
CS3270 - DATABASE SYSTEM - Lecture (1)
 
01-database-management.pptx
01-database-management.pptx01-database-management.pptx
01-database-management.pptx
 
Lecture-1.ppt
Lecture-1.pptLecture-1.ppt
Lecture-1.ppt
 
Database_Design.ppt
Database_Design.pptDatabase_Design.ppt
Database_Design.ppt
 
Cp 121 lecture 01
Cp 121 lecture 01Cp 121 lecture 01
Cp 121 lecture 01
 
02 - DatabaseConcepts.pdf
02 - DatabaseConcepts.pdf02 - DatabaseConcepts.pdf
02 - DatabaseConcepts.pdf
 
Dbms unit 1
Dbms unit 1Dbms unit 1
Dbms unit 1
 
Unit-I mech for studendts for btech .ppt
Unit-I mech for studendts for btech .pptUnit-I mech for studendts for btech .ppt
Unit-I mech for studendts for btech .ppt
 
Database management system (part 1)
Database management system (part 1)Database management system (part 1)
Database management system (part 1)
 
Data base chapter 2 | detail about the topic
Data base chapter 2 | detail about the topicData base chapter 2 | detail about the topic
Data base chapter 2 | detail about the topic
 
CST204 DBMSMODULE1 PPT (1).pptx
CST204 DBMSMODULE1 PPT (1).pptxCST204 DBMSMODULE1 PPT (1).pptx
CST204 DBMSMODULE1 PPT (1).pptx
 
Introduction to Database Management System.pdf
Introduction to Database Management System.pdfIntroduction to Database Management System.pdf
Introduction to Database Management System.pdf
 
Overview of Data Base Systems Concepts and Architecture
Overview of Data Base Systems Concepts and ArchitectureOverview of Data Base Systems Concepts and Architecture
Overview of Data Base Systems Concepts and Architecture
 
Dbms
DbmsDbms
Dbms
 
Beginning Of DBMS (data base)
Beginning Of DBMS (data base)Beginning Of DBMS (data base)
Beginning Of DBMS (data base)
 

More from Dhani Ahmad

Strategic information system planning
Strategic information system planningStrategic information system planning
Strategic information system planning
Dhani Ahmad
 
Opportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysisOpportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysisDhani Ahmad
 
Information resource management
Information resource managementInformation resource management
Information resource managementDhani Ahmad
 
Islamic information seeking behavior
Islamic information seeking behaviorIslamic information seeking behavior
Islamic information seeking behavior
Dhani Ahmad
 
Islamic information management
Islamic information managementIslamic information management
Islamic information management
Dhani Ahmad
 
Islamic information management sources in islam
Islamic information management sources in islamIslamic information management sources in islam
Islamic information management sources in islam
Dhani Ahmad
 
The need for security
The need for securityThe need for security
The need for security
Dhani Ahmad
 
The information security audit
The information security auditThe information security audit
The information security audit
Dhani Ahmad
 
Security technologies
Security technologiesSecurity technologies
Security technologies
Dhani Ahmad
 
Security policy
Security policySecurity policy
Security policy
Dhani Ahmad
 
Security and personnel
Security and personnelSecurity and personnel
Security and personnel
Dhani Ahmad
 
Secure
SecureSecure
Secure
Dhani Ahmad
 
Risk management ii
Risk management iiRisk management ii
Risk management ii
Dhani Ahmad
 
Risk management i
Risk management iRisk management i
Risk management i
Dhani Ahmad
 
Privacy & security in heath care it
Privacy & security in heath care itPrivacy & security in heath care it
Privacy & security in heath care it
Dhani Ahmad
 
Physical security
Physical securityPhysical security
Physical security
Dhani Ahmad
 
Legal, ethical & professional issues
Legal, ethical & professional issuesLegal, ethical & professional issues
Legal, ethical & professional issues
Dhani Ahmad
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
Dhani Ahmad
 
Information security as an ongoing effort
Information security as an ongoing effortInformation security as an ongoing effort
Information security as an ongoing effort
Dhani Ahmad
 
Implementing security
Implementing securityImplementing security
Implementing security
Dhani Ahmad
 

More from Dhani Ahmad (20)

Strategic information system planning
Strategic information system planningStrategic information system planning
Strategic information system planning
 
Opportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysisOpportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysis
 
Information resource management
Information resource managementInformation resource management
Information resource management
 
Islamic information seeking behavior
Islamic information seeking behaviorIslamic information seeking behavior
Islamic information seeking behavior
 
Islamic information management
Islamic information managementIslamic information management
Islamic information management
 
Islamic information management sources in islam
Islamic information management sources in islamIslamic information management sources in islam
Islamic information management sources in islam
 
The need for security
The need for securityThe need for security
The need for security
 
The information security audit
The information security auditThe information security audit
The information security audit
 
Security technologies
Security technologiesSecurity technologies
Security technologies
 
Security policy
Security policySecurity policy
Security policy
 
Security and personnel
Security and personnelSecurity and personnel
Security and personnel
 
Secure
SecureSecure
Secure
 
Risk management ii
Risk management iiRisk management ii
Risk management ii
 
Risk management i
Risk management iRisk management i
Risk management i
 
Privacy & security in heath care it
Privacy & security in heath care itPrivacy & security in heath care it
Privacy & security in heath care it
 
Physical security
Physical securityPhysical security
Physical security
 
Legal, ethical & professional issues
Legal, ethical & professional issuesLegal, ethical & professional issues
Legal, ethical & professional issues
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Information security as an ongoing effort
Information security as an ongoing effortInformation security as an ongoing effort
Information security as an ongoing effort
 
Implementing security
Implementing securityImplementing security
Implementing security
 

Recently uploaded

做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
axoqas
 
一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单
enxupq
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP
 
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
ewymefz
 
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
mbawufebxi
 
Q1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year ReboundQ1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year Rebound
Oppotus
 
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
Tiktokethiodaily
 
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
v3tuleee
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
ewymefz
 
Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)
TravisMalana
 
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
nscud
 
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdfSample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Linda486226
 
The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...
jerlynmaetalle
 
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
ahzuo
 
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
ahzuo
 
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
slg6lamcq
 
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
vcaxypu
 
一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单
enxupq
 
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
NABLAS株式会社
 

Recently uploaded (20)

做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
 
一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
 
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
 
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
 
Q1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year ReboundQ1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year Rebound
 
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
 
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
 
Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)
 
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
 
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdfSample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
 
The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...
 
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
 
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
 
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
 
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
 
一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单
 
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
 

Database administration and security

  • 1. Database Systems: Design, Implementation, and Management Eighth Edition Chapter 15 Database Administration and Security
  • 2. Database Systems, 8th Edition 2 Objectives • In this chapter, you will learn: – Data are a valuable business asset requiring careful management – How a database plays a critical role in an organization – Introduction of a DBMS has technological, managerial, and cultural organizational consequences
  • 3. Database Systems, 8th Edition 3 Objectives (continued) • In this chapter, you will learn: (continued) – Database administrator’s managerial and technical roles – Data security, database security, and the information security framework – Several database administration tools and strategies – How various database administration technical tasks are performed with Oracle
  • 4. Database Systems, 8th Edition 4 Data as a Corporate Asset • Data are a valuable asset that require careful management • Data are a valuable resource that translate into information • Accurate, timely information triggers actions that enhance company’s position and generate wealth
  • 6. Database Systems, 8th Edition 6 The Need for and Role of Databases in an Organization • Database’s predominant role is to support managerial decision making at all levels • DBMS facilitates: – Interpretation and presentation of data – Distribution of data and information – Preservation and monitoring of data – Control over data duplication and use • Three levels to organization management: – Top, middle, operational
  • 7. Database Systems, 8th Edition 7 Introduction of a Database: Special Considerations • Introduction of a DBMS is likely to have a profound impact – Might be positive or negative, depending on how it is administered • Three aspects to DBMS introduction: – Technological – Managerial – Cultural • One role of DBA department is to educate end users about system uses and benefits
  • 8. Database Systems, 8th Edition 8 The Evolution of the Database Administration Function • Data administration has its roots in the old, decentralized world of the file system • Advent of DBMS produced new level of data management sophistication – DP department evolved into information systems (IS) department • Data management became increasingly complex – Development of database administration function
  • 9. Database Systems, 8th Edition 9 The Database Environment’s Human Component • Even most carefully crafted database system cannot operate without human component • Effective data administration requires both technical and managerial skills • DA must set data administration goals • DBA is focal point for data/user interaction • Need for diverse mix of skills
  • 11. Database Systems, 8th Edition 11 The DBA’s Managerial Role • DBA responsible for: – Coordinating, monitoring, allocating resources • Resources include people and data – Defining goals and formulating strategic plans • Interacts with end user by providing data and information • Enforces policies, standards, procedures • Manages security, privacy, integrity • Ensures data can be fully recovered • Ensures data distributed appropriately
  • 12. Database Systems, 8th Edition 12 The DBA’s Technical Role • Evaluates, selects, and installs DBMS and related utilities • Designs and implements databases and applications • Tests and evaluates databases and applications • Operates DBMS, utilities, and applications • Trains and supports users • Maintains DBMS, utilities, and applications
  • 13. Database Systems, 8th Edition 13 Security • Securing data entails securing overall information system architecture • Confidentiality: data protected against unauthorized access • Integrity: keep data consistent and free of errors or anomalies • Availability: accessibility of data by authorized users for authorized purposes
  • 14. Database Systems, 8th Edition 14 Security Policies • Database security officer secures the system and the data – Works with the database administrator • Security policy: collection of standards, policies, procedures to guarantee security – Ensures auditing and compliance • Security audit process identifies security vulnerabilities – Identifies measures to protect the system
  • 15. Database Systems, 8th Edition 15 Security Vulnerabilities • Security vulnerability: weakness in a system component – Could allow unauthorized access or cause service disruptions • Security threat: imminent security violation – Could occur at any time • Security breach yields a database whose integrity is: • Preserved • Corrupted
  • 18. Database Systems, 8th Edition 18 Database Security • Refers to the use of DBMS features and other measures to comply with security requirements • DBA secures DBMS from installation through operation and maintenance • Authorization management: – User access management – View definition – DBMS access control – DBMS usage monitoring
  • 19. Database Systems, 8th Edition 19 Database Administration Tools • Two main types of data dictionaries: – Integrated – Standalone • Active data dictionary automatically updated by the DBMS with every database access • Passive data dictionary requires running a batch process • Main function: store description of all objects that interact with database
  • 20. Database Systems, 8th Edition 20 Database Administration Tools (continued) • Data dictionary that includes data external to DBMS becomes flexible tool – Enables use and allocation of all organization’s information • Metadata often the basis for monitoring database use – Also for assigning access rights to users • DBA uses data dictionary to support data analysis and design
  • 21. Database Systems, 8th Edition 21 CASE Tools • Computer-aided systems engineering – Automated framework for SDLC – Structured methodologies and powerful graphical interfaces • Front-end CASE tools provide support for planning, analysis, and design phases • Back-end CASE tools provide support for coding and implementation phases • Typical CASE tool has five components
  • 23. Database Systems, 8th Edition 23 Developing a Data Administration Strategy • Information engineering (IE) translates strategic goals into data and applications • Information systems architecture (ISA) is the output of IE process • Implementing IE is a costly process – Provides a framework that includes use of computerized, automated, and integrated tools • Success of information systems strategy depends on critical success factors – Managerial, technological, and corporate culture
  • 24. Database Systems, 8th Edition 24 The DBA at Work: Using Oracle for Database Administration • Technical tasks handled by the DBA in a specific DBMS: – Creating and expanding database storage structures – Managing database objects – Managing end-user database environment – Customizing database initialization parameters • All DBMS vendors provide programs to perform database administrative tasks
  • 25. Database Systems, 8th Edition 25 Oracle Database Administration Tools • In Oracle, most DBA tasks performed via Oracle Enterprise Manager interface
  • 26. Database Systems, 8th Edition 26 The Default Login • Must connect to the database to perform administrative tasks – Username with administrative privileges • Oracle automatically creates SYSTEM and SYS user IDs with administrative privileges • Define preferred credentials by clicking on Preferences link, then Preferred Credentials • Username and passwords are database- specific
  • 27. Database Systems, 8th Edition 27 Ensuring an Automatic RDBMS Start • DBA ensures database access automatically started when computer turned on • Service is a Windows system name for a special program that runs automatically – Part of the operating system • Database instance: separate location in memory reserved to run the database – May have several databases running in memory at the same time
  • 28. Database Systems, 8th Edition 28 Creating Tablespaces and Datafiles • Database composed of one or more tablespaces • Tablespace is a logical storage space – Physically stored in one or more datafiles • Datafile physically stores the database’s data – Each datafile can reside in a different directory on the hard disk • Database has 1:M relationship with tablespaces • Tablespace has 1:M relationship with datafiles
  • 29. Database Systems, 8th Edition 29 Managing the Database Objects: Tables, Views, Triggers, and Procedures • Database object: any object created by end users • Schema: logical section of the database that belongs to a given user – Schema identified by a username – Within the schema, users create their own tables and other objects • Normally, users authorized to access only the objects that belong to their own schemas
  • 30. Database Systems, 8th Edition 30 Managing Users and Establishing Security • User: uniquely identifiable object – Allows a given person to log on to the database • Role: a named collection of database access privileges – Authorizes a user to connect to the database and use system resources • Profile: named collection of settings – Controls how much of a resource a given user can use
  • 31. Database Systems, 8th Edition 31 Customizing the Database Initialization Parameters • Fine-tuning requires modification of database configuration parameters – Some are changed in real time using SQL – Some affect database instance – Others affect entire RDBMS and all instances • Initialization parameters reserve resources used by the database at run time • After modifying parameters, may need to restart the database
  • 32. Database Systems, 8th Edition 32 Creating a New Database • General database creation format tends to be generic – Execution tends to be DBMS-specific • Leading RDBMS vendors offer option to create databases manually – Use SQL commands or GUI-based process • Oracle Database Configuration Assistant uses a wizard interface
  • 46. Database Systems, 8th Edition 46 Summary • Data management is a critical activity for any organization – Data should be treated as a corporate asset • DBMS is the most commonly used electronic tool for corporate data management • DBMS has impact on organization’s managerial, technological, and cultural framework • Data administration function evolved from centralized electronic data processing – Applications began to share common repository
  • 47. Database Systems, 8th Edition 47 Summary (continued) • Database administrator (DBA) is responsible for managing corporate database • Broader data management activity is handled by data administrator (DA) • DA is more managerially oriented than more technically oriented DBA – DA function is DBMS-independent – DBA function is more DBMS-dependent • When there is no DA, DBA executes all DA functions
  • 48. Database Systems, 8th Edition 48 Summary (continued) • Managerial services of DBA function: – Supporting end-user community – Defining and enforcing policies, procedures, and standards for database function – Ensuring data security, privacy, and integrity – Providing data backup and recovery services – Monitoring distribution and use of data in database
  • 49. Database Systems, 8th Edition 49 Summary (continued) • Technical role of DBA: – Evaluating, selecting, and installing DBMS – Designing and implementing databases and applications – Testing and evaluating databases and applications – Operating DBMS, utilities, and applications – Training and supporting users – Maintaining DBMS, utilities, and applications
  • 50. Database Systems, 8th Edition 50 Summary (continued) • Security ensures confidentiality, integrity, availability of information system and data • Security policy is a collection of standards, policies, and practices • Security vulnerability is a weakness in system component • Information engineering guides development of data administration strategy • CASE tools and data dictionaries translate strategic plans to operational plans