Chapter 16 - DB Administration and Security

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/68

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 6:36 PM on 4/18/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

69 Terms

1
New cards

Dirty Data

Data that suffers from inaccuracies and inconsistencies

2
New cards

Data Quality

A comprehensive approach to ensuring accuracy, validity, and timeliness of data

3
New cards

Data profiling software

Programs that analyze data and metadata to determine patterns that can help assess data quality

4
New cards

Master data management (MDM) software

Software that helps prevent dirty data by coordinating common data across multiple systems

5
New cards

Database's predominant role

To support managerial decision making at all levels in the organization while preserving data privacy and security

6
New cards

Top-level management role

  • Decision-making/planning
  • Define/enforce policies
  • Reduce costs
  • Boost productivity
7
New cards

Middle-level management role

  • Deliver data for tactical planning
  • Monitor/evaluate resources and performance
  • Enforce security and privacy of data
8
New cards

Operational-level management role

  • Support/enhance company operations
  • Produce query results within specified performance levels
9
New cards

Security

Activities and measures to ensure the confidentiality, integrity and availability (CIA) of an information system and its data

10
New cards

Privacy

The rights of individuals and organizations to determine access to data about themselves

11
New cards

Enterprise Database

The company's data represntation that provides support for all present and expected future operations

12
New cards

Three aspects of introducing a DBMS

Technological, managerial, cultural

13
New cards

Technological aspect (of introducing a DBMS)

Selecting, installing, configuring, and monitoring the DBMS to ensure that it operates efficiently

14
New cards

Managerial aspect (of introducing a DBMS)

Careful planning to create an appropriate organizational structure

15
New cards

Cultural aspect (of introducing a DBMS)

Listening to people's concerns about the system and explaining its uses and benefits

16
New cards

Information Systems (IS) department

A department responsible for all information technology services and production functions in an organization; divided into application development and DB operations

17
New cards

Service function of an IS department

Provide end users with data management support

18
New cards

Production function of an IS department

Provide end users with solutions for their information needs through integrated application management or information systems

19
New cards

Database Administrator (DBA)

The person responsible for control of the centralized and shared database; general manager of the DBA department

20
New cards

Systems Administrator

The person responsible for coordinating and performing day-to-day data processing activities

21
New cards

Data Administrator (DA)

The person responsible for managing the entire data resource; has more authority and responsibility than the DBA

22
New cards

Responsibilities of DBA managerial role

  • Provide end-user support
  • Enforce policies, procedures and standards for data in the database
  • Manage data security, privacy and integrity
  • Manage data backup and recovery
  • Manage data distribution and use
23
New cards

Policy

Statement of direction used to manage company operations and support objectives

24
New cards

Standard

Detailed and specific set of instructions that describe minimum requirements for a given activity

25
New cards

Procedure

Written instructions that describe a series of steps to be followed during performance of an activity or process

26
New cards

Database Security Officer (DSO)

The person responsible for the security, integrity, backup, and recovery of the database.

27
New cards

Disaster Management

Planning, organizing and testing database contingency plans and recovery procedures following a physical disaster or a database integrity failure

28
New cards

Full backup (database dump)

A complete copy of an entire database saved and periodically updated in a separate location; ensures full recovery after physical disaster or integrity failure

29
New cards

Incremental backup

Only backs up the data that has changed since the last backup

30
New cards

Concurrent backup

A backup that takes place while one or more users are working on a database

31
New cards

What should backup and recovery measures include?

Backup identification, backup storage, physical protection of hardware/software, insurance coverage for data, and access control to DB software

32
New cards

Responsibilities of DBA technical role

  • Evaluate, select, and install DBMS
  • Design, implement, test, operate, and maintain databases and applications
  • Train and support users
33
New cards

Confidentiality

Ensuring data is protected against unauthorized access

34
New cards

Compliance

Activities that meet data privacy and security reporting guidelines

35
New cards

Integrity

Keeping data consistent and free of errors or anomalies

36
New cards

Availability

Accessibility of data whenever required by authorized users and for authorized purposes

37
New cards

Security policy

A collection of standards, policies, and procedures created to guarantee the security of a system

38
New cards

Security vulnerability

A weakness in a system component that could be exploited to allow unauthorized access or service disruptions

39
New cards

Categories of security vulnerabilities

Technical, managerial, cultural, and procedural

40
New cards

Security threat

An imminent security violation caused by unchecked security vulnerabilities

41
New cards

Security breach

An event in which a security threat is exploited to endanger the CIA of the system; leads to either preserved or corrupted databases

42
New cards

Examples of security vulnerablities

Blank or non-secure passwords
Lost data due to a natural disaster, power failure or stolen laptop
Virus, DoS, or email attacks

43
New cards

Database security

Use of DBMS features and related measures that comply with the security requirements

44
New cards

Authorization management

Procedures to protect and guarantee database security and integrity

45
New cards

Authorization management procedures

User access management
Define data views
DBMS access control
DBMS usage monitoring

46
New cards

Audit log

A DBMS security feature that automatically records a brief description of DB operations performed by all users

47
New cards

Data Dictionary

A DBMS component that stores the definition/descriptions of all data objects that interact with the DB; aka information resource dictionary

48
New cards

Active Data Dictionary

Is automatically updated by the database management system every time the database is accessed (keeps info current)

49
New cards

Passive Data Dictionary

Requires a command initiated by an end user to update its data access statistics

50
New cards

Integrated Data Dictionary

Included with the DBMS; built-in

51
New cards

Standalone Data Dictionary

Third-party systems used for DBMS' that do not have built-in data dictionaries

52
New cards

Computer-Aided Systems Engineering (CASE)

Tools to automate part or all of the SDLC

53
New cards

Front-end CASE tools

Provids support for the planning, analysis, and design phases of the SDLC

54
New cards

Back-end CASE tools

Provides support for the coding and implementation phases of the SDLC

55
New cards

Components of a CASE tool

•Graphics
•Screen painters and report generators
•Integrated repository
•Analysis segment
•Program documentation generator

56
New cards

Information Engineering (IE)

A methodology that translates a company's strategic goals into helpful data and applications.

57
New cards

Information Systems Architecture (ISA)

Output of IE process; Basis for planning, developing, and controlling future information systems

58
New cards

What does the cloud services partner company provide for DBs?

  • DBMS installation and updates
  • Server/network management
  • Backup and recovery operations
59
New cards

Oracle DBA Tools

Ensures the RDBMS starts automatically

60
New cards

Database instance

The collection of processes and data structures used to manage a specific database

61
New cards

Table space (file group)

A logical grouping space used to group related data

62
New cards

Data File

A named physical storage space where all data in a database is stored

63
New cards

SYSTEM table space

Stores the data dictionary data

64
New cards

USERS table space

Stores the table data created by the end users

65
New cards

TEMP table space

Stores the temporary tables and indexes created during the execution of SQL statements

66
New cards

UNDOTBS1 table space

Stores database transaction recovery information

67
New cards

User (in a DBMS)

A uniquely identifiable object that allows a given person/process to log on to the DB

68
New cards

Role (in a DBMS)

A named collection of DB access privileges that authorize a user to connect to a DB and use its system resources

69
New cards

Profile (in a DBMS)

A named collection of settings that controls how much of the database resource a given user can use