1/21
Flashcards covering key concepts, steps, best practices, and security measures related to database migration planning, backups, business continuity, and data security.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What is data migration?
The process of transferring data from one database to another while ensuring the data's integrity, accuracy, and consistency.
Why is a detailed data migration plan essential?
It provides a structured roadmap that preserves data integrity, minimizes disruption, identifies risks, and documents procedures for a smooth, successful transition.
List the typical high-level steps in a data migration process.
Assess source/target, plan strategy, profile & cleanse data, map & transform data, back up source, conduct test migrations, execute final migration, validate data, perform post-migration activities.
During data migration planning, what is the purpose of profiling and cleansing data?
To detect and correct inconsistencies, missing values, or anomalies so migrated data remains accurate and reliable.
What information is captured in a mapping document?
Rules that describe how each data element in the source will be transformed and placed into the corresponding structure, format, and schema of the target system.
Why must the source database be fully backed up before migration?
To create a reliable copy that prevents data loss or corruption and enables quick restoration or rollback if problems occur.
How do backups support business continuity during migration?
They allow rapid recovery from delays or failures, minimizing downtime and ensuring uninterrupted access to critical data.
Define business continuity in the context of database migration.
The ability of an organization to maintain normal operations and productivity despite planned migration activities or unexpected disruptions.
How can incremental or parallel migration approaches help maintain uptime?
By moving data in manageable batches or running old and new systems concurrently with synchronization, they reduce downtime and allow continuous monitoring.
What is a validation rule?
A constraint that prevents invalid, inaccurate, or inconsistent data from being populated into database entities.
Why perform a test migration with a subset of data?
To verify mapping and transformation rules, confirm target system functionality, and uncover issues before full migration.
After migration, what actions verify success?
Validate data completeness and accuracy, run integrity checks (e.g., checksums), perform functional testing, and monitor performance.
Why should end users be trained on the new system post-migration?
Training ensures users can operate the new database effectively, reducing errors and improving adoption and productivity.
What does the Principle of Least Privilege stipulate?
Users should be granted only the minimum permissions necessary to perform their work.
How does multifactor authentication (MFA) enhance security during migration?
It requires two or more forms of verification, reducing the risk of unauthorized access to database systems.
What is data masking and why is it used in migration?
An anonymization method that replaces sensitive data with consistent, non-sensitive values to protect PII and comply with privacy regulations during migration.
Which encryption protocols secure data in transit between databases?
TLS/SSL protocols provide encryption that prevents interception or tampering while data moves between source and target systems.
Name two methods for encrypting data at rest mentioned in the lesson.
Folder-based encryption such as NTFS Encrypting File System (EFS) and whole-disk encryption like Windows BitLocker.
Why is auditing and monitoring user activity important during migration?
It helps detect and respond to suspicious behavior, ensuring that unauthorized actions are quickly identified and mitigated.
What safety measure allows organizations to revert to the pre-migration state if major issues occur?
A robust backup and rollback capability.
What is the purpose of post-migration testing?
To ensure the target system functions correctly, meets performance requirements, and that data integrity is maintained.
Why should old data be archived or purged after a successful migration?
To free up storage, reduce redundant data, and simplify maintenance in the new environment.