Upload
databaseguys
View
718
Download
0
Embed Size (px)
Citation preview
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess
Chapter 13Chapter 13Chapter 13Chapter 13
Data and Database Data and Database AdministrationAdministration
Data and Database Data and Database AdministrationAdministration
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess
SDLC and the database SDLC and the database development processdevelopment process
SDLC and the database SDLC and the database development processdevelopment process
SDLC Database Deliverable
Project ID
Project init
Analysis
Logical design
Physical design
Implementation
Maintenance
Enterprise model
Conceptual Model
Logical model
Data structures and storage plan
Management
Working system
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess
Proper delivery of information not only depends on the capabilities of the computer hardware and software but also on the organization’s ability to manage data as an important resource
Proper delivery of information not only depends on the capabilities of the computer hardware and software but also on the organization’s ability to manage data as an important resource
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess
How Does IS Manage Data?
Data Administrators: A high-level function that is responsible for the overall management of data resources in an organization, including maintaining corporate-wide definitions and standards.
Database Administrators: A technical function that is responsible for physical database design and for dealing with technical issues such as security enforcement, database performance, and backup and recovery.
Data Stewardship: Manages a specific logical data resource for all business functions. Distribute data admin. to those most knowledgeable about specific data
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess
Data Administration Functions
Data Administration Functions
Data policies, procedures, standards
Planning
Data conflict (ownership) resolution
Internal marketing of DA concepts
Managing the data repository
Data policies, procedures, standards
Planning
Data conflict (ownership) resolution
Internal marketing of DA concepts
Managing the data repository
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess
Database Administration Functions
Database Administration Functions
Selection of hardware and software
Managing data security, privacy, and integrity
Data backup and recovery
Fig. 13-1 is a list of DA and DBA functions
Selection of hardware and software
Managing data security, privacy, and integrity
Data backup and recovery
Fig. 13-1 is a list of DA and DBA functions
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess
Threats to Data SecurityThreats to Data Security Accidental losses attributable to:
• Human error.
• Software failure.
• Hardware failure.
Theft and fraud.
Improper data access:
• Loss of privacy (personal data).
• Loss of confidentiality (corporate data).
Loss of data integrity.
Loss of availability (through, e.g. sabotage).
Accidental losses attributable to:
• Human error.
• Software failure.
• Hardware failure.
Theft and fraud.
Improper data access:
• Loss of privacy (personal data).
• Loss of confidentiality (corporate data).
Loss of data integrity.
Loss of availability (through, e.g. sabotage).
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess
Possible locations of data security threats
Possible locations of data security threats
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess
Database Security Features
Protection of the database against accidental or intentional loss, destruction or misuse
• Views
• Authorization rules
• User-defined procedures
• Encryption procedures
• Authentication schemes
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess
Database Security Features
Views
• Restrict user access to data
• Various ways to get around so not sufficient measure
Authorization Rules
• Controls embedded in DBMS that restrict user access to data and user actions that can be enacted on data
– Who can update? Insert? Read?
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess
Authorization matrixAuthorization matrix
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess
Database Security Features User-Defined Procedures
• Allows system designers to add other security features
– Passwords
– Valid procedure name
Encryption
• Coding of data so that it cannot be read by humans
– Financial and military data
– WWW issues
– Government ability to decode all encryption schemes
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess
Database Security Features
Authentication Schemes
• How to positively identify that person trying to gain access to a computer resource is “that” person
–Biometric devices--measure fingerprints, voice prints, retina prints
–Smart card would have biometric data embedded
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess
Database Failures
Aborted Transactions
• A transaction is not completed
Incorrect Data
• data entry error, calculation error, coding error
System Failure
• Component failure, power failure
Database Destruction
• drive failure, disaster recovery
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess
Database Recovery and Basic Recovery Facilities
Backup facilities– Periodic backup copies of entire DB
Journalizing facilities– Maintain an audit trail of transactions and DB
changes
Checkpoint facilities– DBMS suspends all processing and synchronizes
files and journals
Recovery manager– Allows the DBMS to restore the DB to correct
condition and restart
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess Recovery and Restart
Procedures Restore/Rerun
• Reprocess the day’s transactions up to the point of failure against a backup copy of the database
• Simple
• Time to reprocess may be prohibitive
• Sequencing of transactions may be different than when originally run
–withdrawal posted prior to deposit
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess Recovery and Restart
Procedures
Transaction Integrity
• Transaction changes are not made to the DB until the entire transaction has been completed and the changes are committed
• If transaction fails at any point, the transaction is aborted
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess Recovery and Restart
Procedures
Backward Recovery (Rollback)
• Back out of unwanted changes to the database
• Used to reverse the changes that have been made to transactions that have been aborted
Forward Recovery (Rollforward)
• Use an earlier copy of the DB and apply after images of good transactions
• More accurate and faster than restore/rerun
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess
Basic recovery techniques(a) Rollback
Basic recovery techniques(a) Rollback
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess
(b) Rollforward(b) Rollforward
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess
Concurrency Control
Concerns with preventing loss of data integrity due to interference between users in a multi-user environment
• Pessimistic approach: interference will always occur so we LOCK records
• Optimistic approach: interference will rarely occur so we VERSION records
Multiple concurrent updates to a database can lead to lost updates and therefore to errors
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess
Lost Update Example
Time
John
Read account Balance(balance = $1,000)
.
.
.Withdraw $200(balance = $800
.
.
.Write account balance
(balance = $800)
Marsha
Read account balance(balance = $1,000)
.
.
.Withdraw $300
(balance = $700)...
Write account balance(balance = $700)
ERROR
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess
Locking
Deny access of data to other users while an update is underway
Locking level (granularity)
Database - during backups
Table - during batch updates
Block or page - generally not used
Record - Often used
Field - Useful when only one field is likely to change
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess
Types of Locks
Shared
• Allows others to read, but not write
• Prevents others from putting Exclusive lock on the record
Exclusive
• Denies other access to the record (even read)
• Necessary when updating the record
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess Deadlock
(aka: Deadly Embrace)
Two or more transactions have placed locks on record(s) that the others need.
Each waits for the other(s) to release
Requires DBMS intervention
• Prevention, often not practical
• Resolution, common solution
–Detects deadlock and backs one or more transactions out, lets one finish, then restarts next transaction.
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess
Versioning Each transaction is restricted to a view of
the database as of the transaction start time.
When transaction modifies a record, the DBMS creates a new version of record instead of overwriting old record
Changes to 2 identical views simultaneously
• First change (according to time stamp) is enacted
• Second change is informed of conflict and transaction must be performed again
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess
Versioning
John
Read account Balance(balance = $1,000)
.
.
.Withdraw $200(balance = $800
.
.
.Commit
Marsha
Read account balance(balance = $1,000)
.
.
.Attempt to withdraw $300(Denied - balance update
conflict)..
Rollback
Restart transaction
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess
Managing Data QualityManaging Data Quality
Security policy and disaster recovery
Personnel controls
Physical access controls
Maintenance controls (hardware & software)
Data protection and privacy
Security policy and disaster recovery
Personnel controls
Physical access controls
Maintenance controls (hardware & software)
Data protection and privacy
Mic
hae
l F. P
rice
Co
lleg
e o
f B
usi
nes
sM
ich
ael F
. Pri
ce C
olle
ge
of
Bu
sin
ess
The case...The case... What value did ISBH obtain from the data architecture
project?
What should the next step be in order for ISBH to get the most out of the project?
What would you have done differently in conducting this project?
What was Darrell Fisher’s role? Dan Gurney’s? Were these appropriate?
What suggestions would you make to ensure that ISBH does a better job with Data Management in the future?
What value did ISBH obtain from the data architecture project?
What should the next step be in order for ISBH to get the most out of the project?
What would you have done differently in conducting this project?
What was Darrell Fisher’s role? Dan Gurney’s? Were these appropriate?
What suggestions would you make to ensure that ISBH does a better job with Data Management in the future?