Data and Data Administration
-
Upload
databaseguys -
Category
Documents
-
view
721 -
download
0
Transcript of Data and Data Administration
![Page 1: Data and Data Administration](https://reader035.fdocuments.net/reader035/viewer/2022062300/5549958cb4c90507608b47d0/html5/thumbnails/1.jpg)
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess
Chapter 13Chapter 13Chapter 13Chapter 13
Data and Database Data and Database AdministrationAdministration
Data and Database Data and Database AdministrationAdministration
![Page 2: Data and Data Administration](https://reader035.fdocuments.net/reader035/viewer/2022062300/5549958cb4c90507608b47d0/html5/thumbnails/2.jpg)
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess
SDLC and the database SDLC and the database development processdevelopment process
SDLC and the database SDLC and the database development processdevelopment process
SDLC Database Deliverable
Project ID
Project init
Analysis
Logical design
Physical design
Implementation
Maintenance
Enterprise model
Conceptual Model
Logical model
Data structures and storage plan
Management
Working system
![Page 3: Data and Data Administration](https://reader035.fdocuments.net/reader035/viewer/2022062300/5549958cb4c90507608b47d0/html5/thumbnails/3.jpg)
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess
Proper delivery of information not only depends on the capabilities of the computer hardware and software but also on the organization’s ability to manage data as an important resource
Proper delivery of information not only depends on the capabilities of the computer hardware and software but also on the organization’s ability to manage data as an important resource
![Page 4: Data and Data Administration](https://reader035.fdocuments.net/reader035/viewer/2022062300/5549958cb4c90507608b47d0/html5/thumbnails/4.jpg)
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess
How Does IS Manage Data?
Data Administrators: A high-level function that is responsible for the overall management of data resources in an organization, including maintaining corporate-wide definitions and standards.
Database Administrators: A technical function that is responsible for physical database design and for dealing with technical issues such as security enforcement, database performance, and backup and recovery.
Data Stewardship: Manages a specific logical data resource for all business functions. Distribute data admin. to those most knowledgeable about specific data
![Page 5: Data and Data Administration](https://reader035.fdocuments.net/reader035/viewer/2022062300/5549958cb4c90507608b47d0/html5/thumbnails/5.jpg)
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess
Data Administration Functions
Data Administration Functions
Data policies, procedures, standards
Planning
Data conflict (ownership) resolution
Internal marketing of DA concepts
Managing the data repository
Data policies, procedures, standards
Planning
Data conflict (ownership) resolution
Internal marketing of DA concepts
Managing the data repository
![Page 6: Data and Data Administration](https://reader035.fdocuments.net/reader035/viewer/2022062300/5549958cb4c90507608b47d0/html5/thumbnails/6.jpg)
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess
Database Administration Functions
Database Administration Functions
Selection of hardware and software
Managing data security, privacy, and integrity
Data backup and recovery
Fig. 13-1 is a list of DA and DBA functions
Selection of hardware and software
Managing data security, privacy, and integrity
Data backup and recovery
Fig. 13-1 is a list of DA and DBA functions
![Page 7: Data and Data Administration](https://reader035.fdocuments.net/reader035/viewer/2022062300/5549958cb4c90507608b47d0/html5/thumbnails/7.jpg)
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess
Threats to Data SecurityThreats to Data Security Accidental losses attributable to:
• Human error.
• Software failure.
• Hardware failure.
Theft and fraud.
Improper data access:
• Loss of privacy (personal data).
• Loss of confidentiality (corporate data).
Loss of data integrity.
Loss of availability (through, e.g. sabotage).
Accidental losses attributable to:
• Human error.
• Software failure.
• Hardware failure.
Theft and fraud.
Improper data access:
• Loss of privacy (personal data).
• Loss of confidentiality (corporate data).
Loss of data integrity.
Loss of availability (through, e.g. sabotage).
![Page 8: Data and Data Administration](https://reader035.fdocuments.net/reader035/viewer/2022062300/5549958cb4c90507608b47d0/html5/thumbnails/8.jpg)
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess
Possible locations of data security threats
Possible locations of data security threats
![Page 9: Data and Data Administration](https://reader035.fdocuments.net/reader035/viewer/2022062300/5549958cb4c90507608b47d0/html5/thumbnails/9.jpg)
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess
Database Security Features
Protection of the database against accidental or intentional loss, destruction or misuse
• Views
• Authorization rules
• User-defined procedures
• Encryption procedures
• Authentication schemes
![Page 10: Data and Data Administration](https://reader035.fdocuments.net/reader035/viewer/2022062300/5549958cb4c90507608b47d0/html5/thumbnails/10.jpg)
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess
Database Security Features
Views
• Restrict user access to data
• Various ways to get around so not sufficient measure
Authorization Rules
• Controls embedded in DBMS that restrict user access to data and user actions that can be enacted on data
– Who can update? Insert? Read?
![Page 11: Data and Data Administration](https://reader035.fdocuments.net/reader035/viewer/2022062300/5549958cb4c90507608b47d0/html5/thumbnails/11.jpg)
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess
Authorization matrixAuthorization matrix
![Page 12: Data and Data Administration](https://reader035.fdocuments.net/reader035/viewer/2022062300/5549958cb4c90507608b47d0/html5/thumbnails/12.jpg)
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess
Database Security Features User-Defined Procedures
• Allows system designers to add other security features
– Passwords
– Valid procedure name
Encryption
• Coding of data so that it cannot be read by humans
– Financial and military data
– WWW issues
– Government ability to decode all encryption schemes
![Page 13: Data and Data Administration](https://reader035.fdocuments.net/reader035/viewer/2022062300/5549958cb4c90507608b47d0/html5/thumbnails/13.jpg)
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess
Database Security Features
Authentication Schemes
• How to positively identify that person trying to gain access to a computer resource is “that” person
–Biometric devices--measure fingerprints, voice prints, retina prints
–Smart card would have biometric data embedded
![Page 14: Data and Data Administration](https://reader035.fdocuments.net/reader035/viewer/2022062300/5549958cb4c90507608b47d0/html5/thumbnails/14.jpg)
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess
Database Failures
Aborted Transactions
• A transaction is not completed
Incorrect Data
• data entry error, calculation error, coding error
System Failure
• Component failure, power failure
Database Destruction
• drive failure, disaster recovery
![Page 15: Data and Data Administration](https://reader035.fdocuments.net/reader035/viewer/2022062300/5549958cb4c90507608b47d0/html5/thumbnails/15.jpg)
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess
Database Recovery and Basic Recovery Facilities
Backup facilities– Periodic backup copies of entire DB
Journalizing facilities– Maintain an audit trail of transactions and DB
changes
Checkpoint facilities– DBMS suspends all processing and synchronizes
files and journals
Recovery manager– Allows the DBMS to restore the DB to correct
condition and restart
![Page 16: Data and Data Administration](https://reader035.fdocuments.net/reader035/viewer/2022062300/5549958cb4c90507608b47d0/html5/thumbnails/16.jpg)
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess Recovery and Restart
Procedures Restore/Rerun
• Reprocess the day’s transactions up to the point of failure against a backup copy of the database
• Simple
• Time to reprocess may be prohibitive
• Sequencing of transactions may be different than when originally run
–withdrawal posted prior to deposit
![Page 17: Data and Data Administration](https://reader035.fdocuments.net/reader035/viewer/2022062300/5549958cb4c90507608b47d0/html5/thumbnails/17.jpg)
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess Recovery and Restart
Procedures
Transaction Integrity
• Transaction changes are not made to the DB until the entire transaction has been completed and the changes are committed
• If transaction fails at any point, the transaction is aborted
![Page 18: Data and Data Administration](https://reader035.fdocuments.net/reader035/viewer/2022062300/5549958cb4c90507608b47d0/html5/thumbnails/18.jpg)
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess Recovery and Restart
Procedures
Backward Recovery (Rollback)
• Back out of unwanted changes to the database
• Used to reverse the changes that have been made to transactions that have been aborted
Forward Recovery (Rollforward)
• Use an earlier copy of the DB and apply after images of good transactions
• More accurate and faster than restore/rerun
![Page 19: Data and Data Administration](https://reader035.fdocuments.net/reader035/viewer/2022062300/5549958cb4c90507608b47d0/html5/thumbnails/19.jpg)
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess
Basic recovery techniques(a) Rollback
Basic recovery techniques(a) Rollback
![Page 20: Data and Data Administration](https://reader035.fdocuments.net/reader035/viewer/2022062300/5549958cb4c90507608b47d0/html5/thumbnails/20.jpg)
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess
(b) Rollforward(b) Rollforward
![Page 21: Data and Data Administration](https://reader035.fdocuments.net/reader035/viewer/2022062300/5549958cb4c90507608b47d0/html5/thumbnails/21.jpg)
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess
Concurrency Control
Concerns with preventing loss of data integrity due to interference between users in a multi-user environment
• Pessimistic approach: interference will always occur so we LOCK records
• Optimistic approach: interference will rarely occur so we VERSION records
Multiple concurrent updates to a database can lead to lost updates and therefore to errors
![Page 22: Data and Data Administration](https://reader035.fdocuments.net/reader035/viewer/2022062300/5549958cb4c90507608b47d0/html5/thumbnails/22.jpg)
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess
Lost Update Example
Time
John
Read account Balance(balance = $1,000)
.
.
.Withdraw $200(balance = $800
.
.
.Write account balance
(balance = $800)
Marsha
Read account balance(balance = $1,000)
.
.
.Withdraw $300
(balance = $700)...
Write account balance(balance = $700)
ERROR
![Page 23: Data and Data Administration](https://reader035.fdocuments.net/reader035/viewer/2022062300/5549958cb4c90507608b47d0/html5/thumbnails/23.jpg)
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess
Locking
Deny access of data to other users while an update is underway
Locking level (granularity)
Database - during backups
Table - during batch updates
Block or page - generally not used
Record - Often used
Field - Useful when only one field is likely to change
![Page 24: Data and Data Administration](https://reader035.fdocuments.net/reader035/viewer/2022062300/5549958cb4c90507608b47d0/html5/thumbnails/24.jpg)
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess
Types of Locks
Shared
• Allows others to read, but not write
• Prevents others from putting Exclusive lock on the record
Exclusive
• Denies other access to the record (even read)
• Necessary when updating the record
![Page 25: Data and Data Administration](https://reader035.fdocuments.net/reader035/viewer/2022062300/5549958cb4c90507608b47d0/html5/thumbnails/25.jpg)
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess Deadlock
(aka: Deadly Embrace)
Two or more transactions have placed locks on record(s) that the others need.
Each waits for the other(s) to release
Requires DBMS intervention
• Prevention, often not practical
• Resolution, common solution
–Detects deadlock and backs one or more transactions out, lets one finish, then restarts next transaction.
![Page 26: Data and Data Administration](https://reader035.fdocuments.net/reader035/viewer/2022062300/5549958cb4c90507608b47d0/html5/thumbnails/26.jpg)
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess
Versioning Each transaction is restricted to a view of
the database as of the transaction start time.
When transaction modifies a record, the DBMS creates a new version of record instead of overwriting old record
Changes to 2 identical views simultaneously
• First change (according to time stamp) is enacted
• Second change is informed of conflict and transaction must be performed again
![Page 27: Data and Data Administration](https://reader035.fdocuments.net/reader035/viewer/2022062300/5549958cb4c90507608b47d0/html5/thumbnails/27.jpg)
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess
Versioning
John
Read account Balance(balance = $1,000)
.
.
.Withdraw $200(balance = $800
.
.
.Commit
Marsha
Read account balance(balance = $1,000)
.
.
.Attempt to withdraw $300(Denied - balance update
conflict)..
Rollback
Restart transaction
![Page 28: Data and Data Administration](https://reader035.fdocuments.net/reader035/viewer/2022062300/5549958cb4c90507608b47d0/html5/thumbnails/28.jpg)
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess
Managing Data QualityManaging Data Quality
Security policy and disaster recovery
Personnel controls
Physical access controls
Maintenance controls (hardware & software)
Data protection and privacy
Security policy and disaster recovery
Personnel controls
Physical access controls
Maintenance controls (hardware & software)
Data protection and privacy
![Page 29: Data and Data Administration](https://reader035.fdocuments.net/reader035/viewer/2022062300/5549958cb4c90507608b47d0/html5/thumbnails/29.jpg)
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess
The case...The case... What value did ISBH obtain from the data architecture
project?
What should the next step be in order for ISBH to get the most out of the project?
What would you have done differently in conducting this project?
What was Darrell Fisher’s role? Dan Gurney’s? Were these appropriate?
What suggestions would you make to ensure that ISBH does a better job with Data Management in the future?
What value did ISBH obtain from the data architecture project?
What should the next step be in order for ISBH to get the most out of the project?
What would you have done differently in conducting this project?
What was Darrell Fisher’s role? Dan Gurney’s? Were these appropriate?
What suggestions would you make to ensure that ISBH does a better job with Data Management in the future?