chapter 12 powerpoint slides
DESCRIPTION
TRANSCRIPT
![Page 1: Chapter 12 PowerPoint Slides](https://reader035.vdocuments.net/reader035/viewer/2022081413/548b5002b4795900298b4639/html5/thumbnails/1.jpg)
Database Administration and SecurityTransparencies
1
![Page 2: Chapter 12 PowerPoint Slides](https://reader035.vdocuments.net/reader035/viewer/2022081413/548b5002b4795900298b4639/html5/thumbnails/2.jpg)
©Pearson Education 2009
ObjectivesThe distinction between data administration and
database administration.The purpose and tasks associated with data
administration and database administration.The scope of database security.Why database security is a serious concern for an
organization.The type of threats that can affect a database
system.How to protect a computer system using
computer-based controls.2
![Page 3: Chapter 12 PowerPoint Slides](https://reader035.vdocuments.net/reader035/viewer/2022081413/548b5002b4795900298b4639/html5/thumbnails/3.jpg)
©Pearson Education 2009
Data administration and database administration Data Administrator (DA) and Database
Administrator (DBA) are responsible for managing and controlling activities associated with corporate data and corporate database, respectively.
DA is more concerned with early stages of lifecycle and DBA is more concerned with later stages.
3
![Page 4: Chapter 12 PowerPoint Slides](https://reader035.vdocuments.net/reader035/viewer/2022081413/548b5002b4795900298b4639/html5/thumbnails/4.jpg)
©Pearson Education 2009
Data administrationManagement and control of corporate data,
including:database planning; development and maintenance of standards,
policies, and procedures; conceptual and logical database design.
4
![Page 5: Chapter 12 PowerPoint Slides](https://reader035.vdocuments.net/reader035/viewer/2022081413/548b5002b4795900298b4639/html5/thumbnails/5.jpg)
©Pearson Education 2009
Data administration tasks
5
![Page 6: Chapter 12 PowerPoint Slides](https://reader035.vdocuments.net/reader035/viewer/2022081413/548b5002b4795900298b4639/html5/thumbnails/6.jpg)
©Pearson Education 2009
Database administration Management and control of physical
realization of a database system, including:physical database design and
implementation; setting security and integrity controls;monitoring system performance;reorganizing the database.
6
![Page 7: Chapter 12 PowerPoint Slides](https://reader035.vdocuments.net/reader035/viewer/2022081413/548b5002b4795900298b4639/html5/thumbnails/7.jpg)
©Pearson Education 2009
Database administration tasks
7
![Page 8: Chapter 12 PowerPoint Slides](https://reader035.vdocuments.net/reader035/viewer/2022081413/548b5002b4795900298b4639/html5/thumbnails/8.jpg)
©Pearson Education 2009
Comparison of data and database administration
8
![Page 9: Chapter 12 PowerPoint Slides](https://reader035.vdocuments.net/reader035/viewer/2022081413/548b5002b4795900298b4639/html5/thumbnails/9.jpg)
©Pearson Education 2009
Database security
9
Mechanisms that protect the database against intentional or accidental threats.
Not only apply to the data held in a database. Breaches of security may affect other parts of the system, which may in turn affect the database.
Includes hardware, software, people, and data. Growing importance of security is the
increasing amounts of crucial corporate data being stored on computer.
![Page 10: Chapter 12 PowerPoint Slides](https://reader035.vdocuments.net/reader035/viewer/2022081413/548b5002b4795900298b4639/html5/thumbnails/10.jpg)
©Pearson Education 2009
Examples of threats and possible outcomes
10
![Page 11: Chapter 12 PowerPoint Slides](https://reader035.vdocuments.net/reader035/viewer/2022081413/548b5002b4795900298b4639/html5/thumbnails/11.jpg)
©Pearson Education 2009
Summary of threats to computer systems
11
![Page 12: Chapter 12 PowerPoint Slides](https://reader035.vdocuments.net/reader035/viewer/2022081413/548b5002b4795900298b4639/html5/thumbnails/12.jpg)
©Pearson Education 2009
Database securityThreat is any situation or event, whether
intentional or unintentional, that may adversely affect a system and consequently the organization.
Outcomes to avoid:theft and fraud,loss of confidentiality (secrecy),loss of privacy,loss of integrity,loss of availability.
12
![Page 13: Chapter 12 PowerPoint Slides](https://reader035.vdocuments.net/reader035/viewer/2022081413/548b5002b4795900298b4639/html5/thumbnails/13.jpg)
©Pearson Education 2009
Typical multi-user computer environment
13
![Page 14: Chapter 12 PowerPoint Slides](https://reader035.vdocuments.net/reader035/viewer/2022081413/548b5002b4795900298b4639/html5/thumbnails/14.jpg)
©Pearson Education 2009
Database securityComputer-based countermeasures include:
authorization,views,backup and recovery,integrity,encryption,redundant array of independent disks
(RAID).
14
![Page 15: Chapter 12 PowerPoint Slides](https://reader035.vdocuments.net/reader035/viewer/2022081413/548b5002b4795900298b4639/html5/thumbnails/15.jpg)
©Pearson Education 2009
Countermeasures - computer-based controlsAuthorization
The granting of a right or privilege that enables a subject to have legitimate access to a database system or a database system’s object.
AuthenticationA mechanism that determines whether a user
is, who he or she claims to be. failure.Privilege
A right granted by one user to allow another user or group of users access to a database system or an object in the database system.
15
![Page 16: Chapter 12 PowerPoint Slides](https://reader035.vdocuments.net/reader035/viewer/2022081413/548b5002b4795900298b4639/html5/thumbnails/16.jpg)
©Pearson Education 2009
Countermeasures - computer-based controlsViews
A view is a virtual table that does not necessarily exist in the database but can be produced upon request by a particular user, at the time of request.
Backup and recoveryProcess of periodically taking a copy of the
database and log file (and possibly programs) onto offline storage media.
16
![Page 17: Chapter 12 PowerPoint Slides](https://reader035.vdocuments.net/reader035/viewer/2022081413/548b5002b4795900298b4639/html5/thumbnails/17.jpg)
©Pearson Education 2009
Countermeasures - computer-based controlsJournaling
Process of keeping and maintaining a log file (or journal) of all changes made to database to enable recovery to be undertaken effectively in the event of failure.
Backup windowThe time period during which the database
can be backed up.
17
![Page 18: Chapter 12 PowerPoint Slides](https://reader035.vdocuments.net/reader035/viewer/2022081413/548b5002b4795900298b4639/html5/thumbnails/18.jpg)
©Pearson Education 2009
Countermeasures - computer-based controlsIntegrity
Prevents data from becoming invalid, and hence giving misleading or incorrect results.
EncryptionEncoding the data by a special algorithm
that renders the data unreadable by any program without the decryption key.
18
![Page 19: Chapter 12 PowerPoint Slides](https://reader035.vdocuments.net/reader035/viewer/2022081413/548b5002b4795900298b4639/html5/thumbnails/19.jpg)
©Pearson Education 2009
Countermeasures - computer-based controlsRAID
A set or array of physical disk drives that appear to the database user (and programs) as if they form one large physical storage.
Hardware that the DBMS runs on must be fault-tolerant, meaning that the DBMS should continue to operate even if one of the hardware components fails.
19
![Page 20: Chapter 12 PowerPoint Slides](https://reader035.vdocuments.net/reader035/viewer/2022081413/548b5002b4795900298b4639/html5/thumbnails/20.jpg)
©Pearson Education 2009
Network security architecture three tier database system architecture
20
![Page 21: Chapter 12 PowerPoint Slides](https://reader035.vdocuments.net/reader035/viewer/2022081413/548b5002b4795900298b4639/html5/thumbnails/21.jpg)
©Pearson Education 2009
Countermeasures - network securityNetwork security is the protect of servers
from intruders.Firewall is a server or router with two or
more network interfaces and special software that filters or selectively blocks messages traveling between networks.
De-Militarized Zone (DMZ) is a special, restricted network that is established between two firewalls.
21