Chapter 10 DB System Administration Based on G. Post, DBMS: Designing & Building Business...

21
Chapter 10 DB System Administration Based on G. Post, DBMS: Designing & Building Business Applications University of Manitoba Asper School of Business 3500 DBMS Bob Travica Updated 2015

Transcript of Chapter 10 DB System Administration Based on G. Post, DBMS: Designing & Building Business...

Page 1: Chapter 10 DB System Administration Based on G. Post, DBMS: Designing & Building Business Applications University of Manitoba Asper School of Business.

Chapter 10

DB System Administration

Based on G. Post, DBMS: Designing & Building Business Applications

University of ManitobaAsper School of Business

3500 DBMSBob Travica

Updated 2015

Page 2: Chapter 10 DB System Administration Based on G. Post, DBMS: Designing & Building Business Applications University of Manitoba Asper School of Business.

DDBB

SSYYSSTTEEMMSS

Outline

Data Administrator/Analyst (DA) Database Administrator (DBA) DBA’s duties DB system backup & recovery DB system security

2 of 22

Page 3: Chapter 10 DB System Administration Based on G. Post, DBMS: Designing & Building Business Applications University of Manitoba Asper School of Business.

DDBB

SSYYSSTTEEMMSS

Data Administration

Data make a valuable asset.

Data are used at many business levels

There are many databases and database systems in an organization.

Responsibility for managing data - Data Administrator (DA) or Data Analyst

Employees with no mgt. powers

TacticalManagement

Strategic

Management

EIS/

M

IS

DSS

TPS

Supervisory Mgt.

TPS=Transaction Processing Sys.MIS=Management Info. Sys.DSS=Decisions Support Sys.EIS=Executive Info. Sys.

3 of 21

Bus

ines

s

Ope

ratio

ns

Page 4: Chapter 10 DB System Administration Based on G. Post, DBMS: Designing & Building Business Applications University of Manitoba Asper School of Business.

DDBB

SSYYSSTTEEMMSS

Data Administration/Administrator (DA)

DA (sometimes called data architect or even business analyst) is a type of professional that resides in the IS function or in a unit interfacing with the IS function.

Focus on informing in function of business, users (reports, output forms, queries) rather than IT Data definition and integration (e.g., Customer entity in CRM

systems cutting across Sales, Marketing, R+D…).

Decision support.

Ideas for system design, involvement in system development.

Data governance and security.

4 of 21

Page 5: Chapter 10 DB System Administration Based on G. Post, DBMS: Designing & Building Business Applications University of Manitoba Asper School of Business.

DDBB

SSYYSSTTEEMMSS

Database Administrator (DBA)

DBA is focused on technology.

1. DBA actively participates in DB system life cycle (plan, develop, install, manage, upgrade…).

2. DBA manages DB system:

2.1 Users: Creating user accounts, assigning use privileges

2.2 System performance: Monitoring and tuning

2.3 Backup & recovery: Supervising backups & system restoration after crashes

2.4 Security: Monitoring

5 of 21

Page 6: Chapter 10 DB System Administration Based on G. Post, DBMS: Designing & Building Business Applications University of Manitoba Asper School of Business.

DDBB

SSYYSSTTEEMMSS

DBA: (1) System Planning & Design

Estimation & Design (logical, physical)Data storage requirements, forms & reports needed

(costs of development), hardware needs, matching

organizational needs with DBMS products

Time, labor & cost to develop

Data modeling – coordinates with Data Analyst in the domain of logical design (e.g., class diagrams, user interface). Also DA and DBA cooperate on schemas.

In charge of physical design (types of files, access structures, DBMS product, hardware)

6 of 21

Page 7: Chapter 10 DB System Administration Based on G. Post, DBMS: Designing & Building Business Applications University of Manitoba Asper School of Business.

DDBB

SSYYSSTTEEMMSS

DBA: System Development & Implementation

Defining technology standards:Programming standards.

Layout and techniques.Variable & object definition.User interface.

System testing techniques.

Loading databases. Backup and recovery plans. User and operator training.

7 of 21

Page 8: Chapter 10 DB System Administration Based on G. Post, DBMS: Designing & Building Business Applications University of Manitoba Asper School of Business.

DDBB

SSYYSSTTEEMMSS

DBA: System Upgrade

Determines need for changeSize and speed of the DB system

Usage patterns

System output:Additional reports & queries (coop. with DA and

business analysts)

Forecasting needs

8 of 21

Page 9: Chapter 10 DB System Administration Based on G. Post, DBMS: Designing & Building Business Applications University of Manitoba Asper School of Business.

DDBB

SSYYSSTTEEMMSS

DBA: (2.1) Users’ Access

Control via:

1. Operating systemAccess to directoriesAccess to filesAssigned to individuals or groups.

2. DBMS functions

(Read, write, modify… data; Administer system)

9 of 21

Page 10: Chapter 10 DB System Administration Based on G. Post, DBMS: Designing & Building Business Applications University of Manitoba Asper School of Business.

DDBB

SSYYSSTTEEMMSS

SQL Security Commands

GRANT privileges REVOKE privileges Privileges include

SELECT DELETE INSERT UPDATE

Objects include Table Table columns (SQL 92+) Query

Users include Name/Group PUBLIC

GRANT INSERTON BicycleTO OrderClerks

REVOKE DELETEON CustomerFROM Assemblers

10 of 21

Page 11: Chapter 10 DB System Administration Based on G. Post, DBMS: Designing & Building Business Applications University of Manitoba Asper School of Business.

DDBB

SSYYSSTTEEMMSS

DBA: User Identification

User identification

Accounts

Individual

Groups

Passwords

Alternative identification

Finger & hand print readers

Voice…

Disposable passwords

11 of 21

Page 12: Chapter 10 DB System Administration Based on G. Post, DBMS: Designing & Building Business Applications University of Manitoba Asper School of Business.

DDBB

SSYYSSTTEEMMSS

DBA: (2.2) System Performance: Performance Monitors

12 of 22

Page 13: Chapter 10 DB System Administration Based on G. Post, DBMS: Designing & Building Business Applications University of Manitoba Asper School of Business.

DDBB

SSYYSSTTEEMMSS

SQL Server Query Analyzer

13 of 22

Page 14: Chapter 10 DB System Administration Based on G. Post, DBMS: Designing & Building Business Applications University of Manitoba Asper School of Business.

DDBB

SSYYSSTTEEMMSS

DBA: (2.3) Database Backup

Backups are crucial! Offsite storage needed Types of backup

Full – in longer intervals (e.g., once a week); a copy of all tables made

Partial (Differential) – in shorter intervals (e.g., day); just new data are backed up; reduced risk but higher cost

BackupManager

(part of DBMS)

14 of 21

OperationalDatabase(Op DB)

CopiesEntire OpDB

BackupDatabase(Bkp DB)

Full

overwrites

time 1: copies new data from Op DB

Partial backup

time 2: copies new

data from Op DB Partial backup

time 3: copies final partial backup to BkP DB

Bkp DB

Partial

grows

Page 15: Chapter 10 DB System Administration Based on G. Post, DBMS: Designing & Building Business Applications University of Manitoba Asper School of Business.

DDBB

SSYYSSTTEEMMSS

DBA: 2.3 Database Recovery

Recovery needed if problems with software, hardware, incorrect user input, viruses, natural causes

Recovery = getting databases to correct state (previous example of transferring $ from savings to checking account)

Key facilities: Recovery Manager (part of DBMS) Transactions log (TL) file ROLLBACK procedure

Alternative: User works with operational DB, and TL engaged only if former fails.

TransactionLog (TL)

(managed by Backup

Manager)

Recovery Manager

Transactions … Savepoint

Operationaldatabasecopied to

Transactionunfinished System crash!

uses

Backupdatabases

uses

recovers

15 of 22

Page 16: Chapter 10 DB System Administration Based on G. Post, DBMS: Designing & Building Business Applications University of Manitoba Asper School of Business.

DDBB

SSYYSSTTEEMMSS

Transaction Log (TL)

Transaction Log ID

Transaction ID Pointer to previousTL record

Pointer to next

TL record

Key Table AttributeOld

valueNewvalue

Databasetask

Checkpoint (Savepoint) is when results of all new transactions are stored permanently (e.g., in Op DB). COMMIT saves changes to TL. Just the first transaction saved permanently. Recovery Mgr rolls processing back to Checkpoint and runs steps/transactions that haven’t been saved after it.

16 of 22

Page 17: Chapter 10 DB System Administration Based on G. Post, DBMS: Designing & Building Business Applications University of Manitoba Asper School of Business.

DDBB

SSYYSSTTEEMMSS

DBA: (2.4) Database Security

Physical security Protecting hardware Protecting software and

data.

Logical security Unauthorized disclosure Unauthorized modification Unauthorized withholding

Security Threats Employees (!) Programmers Visitors Consultants Business partnerships

Strategic sharing EDI (Electronic Data

Interchange & other inter-org. networks)

Hackers (Internet)

17 of 21

Page 18: Chapter 10 DB System Administration Based on G. Post, DBMS: Designing & Building Business Applications University of Manitoba Asper School of Business.

DDBB

SSYYSSTTEEMMSS

Data Privacy

• A security issue

• Who owns data? (a governance issue)

• Customer rights

• International issues (e.g., strict privacy regulations in West

Europe; Canada stricter than the US)

18 of 22

Page 19: Chapter 10 DB System Administration Based on G. Post, DBMS: Designing & Building Business Applications University of Manitoba Asper School of Business.

DDBB

SSYYSSTTEEMMSS

Physical Security

Hardware-relatedPreventing problems

(fire, water…)

Hardware backup

facilities (“Hot sites” etc.)

Telecommunication

systems for backup

Personal computers

challenge (use file servers

for backup)

Data and softwareBackups, Off-site

backups (!)

Disaster planningPlans, training & testing

19 of 21

Page 20: Chapter 10 DB System Administration Based on G. Post, DBMS: Designing & Building Business Applications University of Manitoba Asper School of Business.

DDBB

SSYYSSTTEEMMSS

Managerial Controls

Insiders Employee selection & Job termination

Monitoring suspicious behavior

Job segmentation (who can do what with data*)

Physical & Logical access limitations

Outsiders Physical access limitations

“Shadowing”

20 of 21

Page 21: Chapter 10 DB System Administration Based on G. Post, DBMS: Designing & Building Business Applications University of Manitoba Asper School of Business.

DDBB

SSYYSSTTEEMMSS

Logical Security

1. Unauthorized disclosure (e.g., letting a competitor see the strategic marketing plans)

2. Unauthorized modification (e.g., letting employees change their salary figures)

3. Unauthorized withholding (e.g., preventing a finance officer from retrieving data needed to get a bank loan)

21 of 21