29
M i c h a e l F . P r i c e C o l l e g e o f B u s i n e s s Chapter 13 Chapter 13 Data and Data and Database Database Administration Administration

Data and Data Administration

Embed Size (px)

Citation preview

Page 1: Data and Data Administration

Mic

hae

l F. P

rice

Co

lleg

e o

f B

usi

nes

sM

ich

ael F

. Pri

ce C

olle

ge

of

Bu

sin

ess

Chapter 13Chapter 13Chapter 13Chapter 13

Data and Database Data and Database AdministrationAdministration

Data and Database Data and Database AdministrationAdministration

Page 2: Data and Data Administration

Mic

hae

l F. P

rice

Co

lleg

e o

f B

usi

nes

sM

ich

ael F

. Pri

ce C

olle

ge

of

Bu

sin

ess

SDLC and the database SDLC and the database development processdevelopment process

SDLC and the database SDLC and the database development processdevelopment process

SDLC Database Deliverable

Project ID

Project init

Analysis

Logical design

Physical design

Implementation

Maintenance

Enterprise model

Conceptual Model

Logical model

Data structures and storage plan

Management

Working system

Page 3: Data and Data Administration

Mic

hae

l F. P

rice

Co

lleg

e o

f B

usi

nes

sM

ich

ael F

. Pri

ce C

olle

ge

of

Bu

sin

ess

Proper delivery of information not only depends on the capabilities of the computer hardware and software but also on the organization’s ability to manage data as an important resource

Proper delivery of information not only depends on the capabilities of the computer hardware and software but also on the organization’s ability to manage data as an important resource

Page 4: Data and Data Administration

Mic

hae

l F. P

rice

Co

lleg

e o

f B

usi

nes

sM

ich

ael F

. Pri

ce C

olle

ge

of

Bu

sin

ess

How Does IS Manage Data?

Data Administrators: A high-level function that is responsible for the overall management of data resources in an organization, including maintaining corporate-wide definitions and standards.

Database Administrators: A technical function that is responsible for physical database design and for dealing with technical issues such as security enforcement, database performance, and backup and recovery.

Data Stewardship: Manages a specific logical data resource for all business functions. Distribute data admin. to those most knowledgeable about specific data

Page 5: Data and Data Administration

Mic

hae

l F. P

rice

Co

lleg

e o

f B

usi

nes

sM

ich

ael F

. Pri

ce C

olle

ge

of

Bu

sin

ess

Data Administration Functions

Data Administration Functions

Data policies, procedures, standards

Planning

Data conflict (ownership) resolution

Internal marketing of DA concepts

Managing the data repository

Data policies, procedures, standards

Planning

Data conflict (ownership) resolution

Internal marketing of DA concepts

Managing the data repository

Page 6: Data and Data Administration

Mic

hae

l F. P

rice

Co

lleg

e o

f B

usi

nes

sM

ich

ael F

. Pri

ce C

olle

ge

of

Bu

sin

ess

Database Administration Functions

Database Administration Functions

Selection of hardware and software

Managing data security, privacy, and integrity

Data backup and recovery

Fig. 13-1 is a list of DA and DBA functions

Selection of hardware and software

Managing data security, privacy, and integrity

Data backup and recovery

Fig. 13-1 is a list of DA and DBA functions

Page 7: Data and Data Administration

Mic

hae

l F. P

rice

Co

lleg

e o

f B

usi

nes

sM

ich

ael F

. Pri

ce C

olle

ge

of

Bu

sin

ess

Threats to Data SecurityThreats to Data Security Accidental losses attributable to:

• Human error.

• Software failure.

• Hardware failure.

Theft and fraud.

Improper data access:

• Loss of privacy (personal data).

• Loss of confidentiality (corporate data).

Loss of data integrity.

Loss of availability (through, e.g. sabotage).

Accidental losses attributable to:

• Human error.

• Software failure.

• Hardware failure.

Theft and fraud.

Improper data access:

• Loss of privacy (personal data).

• Loss of confidentiality (corporate data).

Loss of data integrity.

Loss of availability (through, e.g. sabotage).

Page 8: Data and Data Administration

Mic

hae

l F. P

rice

Co

lleg

e o

f B

usi

nes

sM

ich

ael F

. Pri

ce C

olle

ge

of

Bu

sin

ess

Possible locations of data security threats

Possible locations of data security threats

Page 9: Data and Data Administration

Mic

hae

l F. P

rice

Co

lleg

e o

f B

usi

nes

sM

ich

ael F

. Pri

ce C

olle

ge

of

Bu

sin

ess

Database Security Features

Protection of the database against accidental or intentional loss, destruction or misuse

• Views

• Authorization rules

• User-defined procedures

• Encryption procedures

• Authentication schemes

Page 10: Data and Data Administration

Mic

hae

l F. P

rice

Co

lleg

e o

f B

usi

nes

sM

ich

ael F

. Pri

ce C

olle

ge

of

Bu

sin

ess

Database Security Features

Views

• Restrict user access to data

• Various ways to get around so not sufficient measure

Authorization Rules

• Controls embedded in DBMS that restrict user access to data and user actions that can be enacted on data

– Who can update? Insert? Read?

Page 11: Data and Data Administration

Mic

hae

l F. P

rice

Co

lleg

e o

f B

usi

nes

sM

ich

ael F

. Pri

ce C

olle

ge

of

Bu

sin

ess

Authorization matrixAuthorization matrix

Page 12: Data and Data Administration

Mic

hae

l F. P

rice

Co

lleg

e o

f B

usi

nes

sM

ich

ael F

. Pri

ce C

olle

ge

of

Bu

sin

ess

Database Security Features User-Defined Procedures

• Allows system designers to add other security features

– Passwords

– Valid procedure name

Encryption

• Coding of data so that it cannot be read by humans

– Financial and military data

– WWW issues

– Government ability to decode all encryption schemes

Page 13: Data and Data Administration

Mic

hae

l F. P

rice

Co

lleg

e o

f B

usi

nes

sM

ich

ael F

. Pri

ce C

olle

ge

of

Bu

sin

ess

Database Security Features

Authentication Schemes

• How to positively identify that person trying to gain access to a computer resource is “that” person

–Biometric devices--measure fingerprints, voice prints, retina prints

–Smart card would have biometric data embedded

Page 14: Data and Data Administration

Mic

hae

l F. P

rice

Co

lleg

e o

f B

usi

nes

sM

ich

ael F

. Pri

ce C

olle

ge

of

Bu

sin

ess

Database Failures

Aborted Transactions

• A transaction is not completed

Incorrect Data

• data entry error, calculation error, coding error

System Failure

• Component failure, power failure

Database Destruction

• drive failure, disaster recovery

Page 15: Data and Data Administration

Mic

hae

l F. P

rice

Co

lleg

e o

f B

usi

nes

sM

ich

ael F

. Pri

ce C

olle

ge

of

Bu

sin

ess

Database Recovery and Basic Recovery Facilities

Backup facilities– Periodic backup copies of entire DB

Journalizing facilities– Maintain an audit trail of transactions and DB

changes

Checkpoint facilities– DBMS suspends all processing and synchronizes

files and journals

Recovery manager– Allows the DBMS to restore the DB to correct

condition and restart

Page 16: Data and Data Administration

Mic

hae

l F. P

rice

Co

lleg

e o

f B

usi

nes

sM

ich

ael F

. Pri

ce C

olle

ge

of

Bu

sin

ess Recovery and Restart

Procedures Restore/Rerun

• Reprocess the day’s transactions up to the point of failure against a backup copy of the database

• Simple

• Time to reprocess may be prohibitive

• Sequencing of transactions may be different than when originally run

–withdrawal posted prior to deposit

Page 17: Data and Data Administration

Mic

hae

l F. P

rice

Co

lleg

e o

f B

usi

nes

sM

ich

ael F

. Pri

ce C

olle

ge

of

Bu

sin

ess Recovery and Restart

Procedures

Transaction Integrity

• Transaction changes are not made to the DB until the entire transaction has been completed and the changes are committed

• If transaction fails at any point, the transaction is aborted

Page 18: Data and Data Administration

Mic

hae

l F. P

rice

Co

lleg

e o

f B

usi

nes

sM

ich

ael F

. Pri

ce C

olle

ge

of

Bu

sin

ess Recovery and Restart

Procedures

Backward Recovery (Rollback)

• Back out of unwanted changes to the database

• Used to reverse the changes that have been made to transactions that have been aborted

Forward Recovery (Rollforward)

• Use an earlier copy of the DB and apply after images of good transactions

• More accurate and faster than restore/rerun

Page 19: Data and Data Administration

Mic

hae

l F. P

rice

Co

lleg

e o

f B

usi

nes

sM

ich

ael F

. Pri

ce C

olle

ge

of

Bu

sin

ess

Basic recovery techniques(a) Rollback

Basic recovery techniques(a) Rollback

Page 20: Data and Data Administration

Mic

hae

l F. P

rice

Co

lleg

e o

f B

usi

nes

sM

ich

ael F

. Pri

ce C

olle

ge

of

Bu

sin

ess

(b) Rollforward(b) Rollforward

Page 21: Data and Data Administration

Mic

hae

l F. P

rice

Co

lleg

e o

f B

usi

nes

sM

ich

ael F

. Pri

ce C

olle

ge

of

Bu

sin

ess

Concurrency Control

Concerns with preventing loss of data integrity due to interference between users in a multi-user environment

• Pessimistic approach: interference will always occur so we LOCK records

• Optimistic approach: interference will rarely occur so we VERSION records

Multiple concurrent updates to a database can lead to lost updates and therefore to errors

Page 22: Data and Data Administration

Mic

hae

l F. P

rice

Co

lleg

e o

f B

usi

nes

sM

ich

ael F

. Pri

ce C

olle

ge

of

Bu

sin

ess

Lost Update Example

Time

John

Read account Balance(balance = $1,000)

.

.

.Withdraw $200(balance = $800

.

.

.Write account balance

(balance = $800)

Marsha

Read account balance(balance = $1,000)

.

.

.Withdraw $300

(balance = $700)...

Write account balance(balance = $700)

ERROR

Page 23: Data and Data Administration

Mic

hae

l F. P

rice

Co

lleg

e o

f B

usi

nes

sM

ich

ael F

. Pri

ce C

olle

ge

of

Bu

sin

ess

Locking

Deny access of data to other users while an update is underway

Locking level (granularity)

Database - during backups

Table - during batch updates

Block or page - generally not used

Record - Often used

Field - Useful when only one field is likely to change

Page 24: Data and Data Administration

Mic

hae

l F. P

rice

Co

lleg

e o

f B

usi

nes

sM

ich

ael F

. Pri

ce C

olle

ge

of

Bu

sin

ess

Types of Locks

Shared

• Allows others to read, but not write

• Prevents others from putting Exclusive lock on the record

Exclusive

• Denies other access to the record (even read)

• Necessary when updating the record

Page 25: Data and Data Administration

Mic

hae

l F. P

rice

Co

lleg

e o

f B

usi

nes

sM

ich

ael F

. Pri

ce C

olle

ge

of

Bu

sin

ess Deadlock

(aka: Deadly Embrace)

Two or more transactions have placed locks on record(s) that the others need.

Each waits for the other(s) to release

Requires DBMS intervention

• Prevention, often not practical

• Resolution, common solution

–Detects deadlock and backs one or more transactions out, lets one finish, then restarts next transaction.

Page 26: Data and Data Administration

Mic

hae

l F. P

rice

Co

lleg

e o

f B

usi

nes

sM

ich

ael F

. Pri

ce C

olle

ge

of

Bu

sin

ess

Versioning Each transaction is restricted to a view of

the database as of the transaction start time.

When transaction modifies a record, the DBMS creates a new version of record instead of overwriting old record

Changes to 2 identical views simultaneously

• First change (according to time stamp) is enacted

• Second change is informed of conflict and transaction must be performed again

Page 27: Data and Data Administration

Mic

hae

l F. P

rice

Co

lleg

e o

f B

usi

nes

sM

ich

ael F

. Pri

ce C

olle

ge

of

Bu

sin

ess

Versioning

John

Read account Balance(balance = $1,000)

.

.

.Withdraw $200(balance = $800

.

.

.Commit

Marsha

Read account balance(balance = $1,000)

.

.

.Attempt to withdraw $300(Denied - balance update

conflict)..

Rollback

Restart transaction

Page 28: Data and Data Administration

Mic

hae

l F. P

rice

Co

lleg

e o

f B

usi

nes

sM

ich

ael F

. Pri

ce C

olle

ge

of

Bu

sin

ess

Managing Data QualityManaging Data Quality

Security policy and disaster recovery

Personnel controls

Physical access controls

Maintenance controls (hardware & software)

Data protection and privacy

Security policy and disaster recovery

Personnel controls

Physical access controls

Maintenance controls (hardware & software)

Data protection and privacy

Page 29: Data and Data Administration

Mic

hae

l F. P

rice

Co

lleg

e o

f B

usi

nes

sM

ich

ael F

. Pri

ce C

olle

ge

of

Bu

sin

ess

The case...The case... What value did ISBH obtain from the data architecture

project?

What should the next step be in order for ISBH to get the most out of the project?

What would you have done differently in conducting this project?

What was Darrell Fisher’s role? Dan Gurney’s? Were these appropriate?

What suggestions would you make to ensure that ISBH does a better job with Data Management in the future?

What value did ISBH obtain from the data architecture project?

What should the next step be in order for ISBH to get the most out of the project?

What would you have done differently in conducting this project?

What was Darrell Fisher’s role? Dan Gurney’s? Were these appropriate?

What suggestions would you make to ensure that ISBH does a better job with Data Management in the future?