Database Administration and Security PDF

Summary

This document provides information on database administration and security. It covers important concepts like data administrators, database administrators, SQL security, and database backup and recovery. It also details NoSQL systems, including key-value and graph databases.

Full Transcript

Advance Database System Database Administration and Security Data Administrator (DA) – a management-oriented role that concerns controlling the overall corporate data resources, both computerized and manual. Data Administrator (DA) are responsible to determine the contents and logical boun...

Advance Database System Database Administration and Security Data Administrator (DA) – a management-oriented role that concerns controlling the overall corporate data resources, both computerized and manual. Data Administrator (DA) are responsible to determine the contents and logical boundaries of each database. Database Administrator (DBA) – a person who maintains a successful database environment by directing or performing all related activities to keep the data secure. Database Administrators (DBA) are responsible for the design, implementation, maintenance, and security of physical structures (databases). Characteristics of Data Administrator & Database Administrator There are four (4) common concepts of SQL security as follows: Users – This represents people or programs performing actions on objects in the database. Objects – These are the things defined by SQL standards in the database that users can manipulate. This includes rows, columns, tables, indexes, and views. Privileges – This refers to the rights of users to manipulate objects. These privileges start with SELECT, INSERT, DELETE, and UPDATE, ALTER, INDEX, AND REFERENCES for database objects. Roles – is a named collection of database access privileges that authorize a user to connect to the database and use its system resources. GRANT – is a command used to provide access or privileges on the database objects to the users. REVOKE – is a command used to remove privileges from a specific user or role or from all users to perform actions on database objects. There are two types of database-level roles fixed-database roles - that are predefined in the database. user-defined database roles - that you can create on your own based on your preferences. Database Backup and Recovery Transaction log - used to keep track of all transactions that update the database. Checkpoint - is a mechanism where all the previous logs are removed from the system and stored permanently in a storage disk Convenient and safe backup storage - Multiple backups of the same data are required, and each backup copy must be stored in a different location. Database recovery - restores a database from a given state to a previous consistent state. Critical events can cause a database to stop work Human-caused incidents - This type of event can be categorized as unintentional or intentional. Unintentional failure - is caused by a careless end-user. Such errors include deleting the wrong rows from a table, pressing the wrong key on the keyboard, or shutting down the main database server by accident. Intentional events are of a more severe nature and normally indicate that the company data is at serious risk. Deferred update - When the recovery procedure uses a deferred-write technique, the transaction operations do not immediately update the physical database. Immediate update - When the recovery procedure uses a write-through technique, the database is immediately updated by transaction operations during the transaction’s execution, even before the transaction reaches its commit point. Introduction to NoSQL Database Management Systems Volume – the quantity of data to be stored, is a key characteristic of big data. The storage capacities associated with big data are extremely large. Velocity – another key characteristic of big data. This refers to the rate at which new data enters the system as well as the rate at which the data must be processed. Variety – In a big data context, it refers to the vast array of formats and structures in which the data may be captured. Key-value (KV) database: It is the simplest of the NoSQL data models. It stores data as a collection of key-value pairs. Graph databases: Graph databases are based on graph theory and represent data through nodes, edges, and properties. A node is similar to an instance of an entity in the relational model. Edges are the relationships between nodes. Graph databases excel at tracking data that are highly interrelated, such as social media data (Facebook, Instagram, Twitter). MongoDB - is a cross-platform, open-source, document-oriented database that provides high performance, high availability, automatic, and easy scalability.

Use Quizgecko on...
Browser
Browser