CH 16 Database Administration and Security

access plan

A set of instructions generated at application compilation time that is created and managed by a DBMS. The access plan predetermines how an application's query will access the database at run time.

active data dictionary

A data dictionary that is automatically updated by the database management system every time the database is accessed, thereby keeping its information current.

audit log

A security feature of a database management system that automatically records a brief description of the database operations performed by all users.

authorization management

Procedures that protect and guarantee database security and integrity. Such procedures include user access management, view definition, DBMS access control, and DBMS usage monitoring.

availability

In the context of data security, it refers to the accessibility of data whenever required by authorized users and for authorized purposes.

back-end CASE tools

A computer-aided software tool that provides support for the coding and implementation phases of the SDLC. In comparison, front-end CASE tools provide support for the planning, analysis, and design phases.

compliance

Activities that meet data privacy and security reporting guidelines or requirements.

computer-aided systems engineering (CASE)

Tools used to automate part or all of the Systems Development Life Cycle.

concurrent backup

A backup that takes place while one or more users are working on a database.

confidentiality

In the context of data security, ensuring that data are protected against unauthorized access, and if the data are accessed by an authorized user, that the data are used only for an authorized purpose.

data administrator (DA)

The person responsible for managing the entire data resource, whether it is computerized or not. The DA has broader authority and responsibility than the database administrator.

data profiling software

Programs that analyze data and metadata to determine patterns that can help assess data quality.

data quality

A comprehensive approach to ensuring the accuracy, validity, and timeliness of data.

data-profiling software

Programs that analyze data and metadata to determine patterns that can help assess data quality.

database administrator (DBA)

The person responsible for planning, organizing, controlling, and monitoring the centralized and shared corporate database. The DBA is the general manager of the database administration department.

database instance

In an Oracle DBMS, the collection of processes and data structures used to manage a specific database.

database object

Any object in a database, such as a table, view, index, stored procedure, or trigger.

database security

The use of DBMS features and other related measures to comply with the security requirements of an organization.

database security officer (DSO)

The person responsible for the security, integrity, backup, and recovery of the database.

dirty data

Data that contain inaccuracies and/or inconsistencies.

disaster management

The set of DBA activities dedicated to securing data availability following a physical disaster or a database integrity failure.

enterprise database

The overall company data representation, which provides support for present and expected future needs.

front-end CASE tools

A computer-aided software tool that provides support for the planning, analysis, and design phases of the SDLC. In comparison, back-end CASE tools provide support for the coding and implementation phases.

full backup (database dump)

A complete copy of an entire database saved and periodically updated in a separate memory location. A full backup ensures a full recovery of all data after a physical disaster or database integrity failure.

incremental backup

A process that only backs up data that has changed in the database since the last incremental or full backup.

information engineering (IE)

A methodology that translates a company's strategic goals into helpful data and applications. IE focuses on the description of corporate data instead of the processes.

information systems architecture (ISA)

The output of the information engineering process that serves as the basis for planning, developing, and controlling future information systems.

information systems (IS) department

An evolution of the data-processing department in which responsibilities are broadened to include service and production functions.

integrity

In a data security framework, refers to keeping data consistent and free of errors or anomalies.

master data management (MDM)

In business intelligence, a collection of concepts, techniques, and processes for the proper identification, definition, and management of data elements within an organization.

passive data dictionary

A DBMS data dictionary that requires a command initiated by an end user to update its data access statistics.

policies

General statements of direction that are used to manage company operations through the communication and support of the organization's objectives.

privacy

The rights of individuals and organizations to determine access to data about themselves.

procedures

Series of steps to be followed during the performance of an activity or process.

profile

In Oracle, a named collection of settings that controls how much of the database resource a given user can use.

role

In Oracle, a named collection of database access privileges that authorize a user to connect to a database and use its system resources.

schema

A logical grouping of database objects, such as tables, indexes, views, and queries, that are related to each other. Usually, a schema belongs to a single user or application.

security

Activities and measures to ensure the confidentiality, integrity, and availability of an information system and its main asset, data.

security breach

An event in which a security threat is exploited to endanger the integrity, confidentiality, or availability of the system.

security policy

A collection of standards, policies, and procedures created to guarantee the security of a system and ensure auditing and compliance.

security threat

An imminent security violation that could occur due to unchecked security vulnerabilities.

security vulnerability

A weakness in a system component that could be exploited to allow unauthorized access or cause service disruptions.

standards

A detailed and specific set of instructions that describes the minimum requirements for a given activity. Standards are used to evaluate the quality of the output.

systems administrator

The person responsible for coordinating an organization's data-processing activities.

tablespace

In a DBMS, a logical storage space used to group related data. Also known as a file group.

user

In a system, a uniquely identifiable object that allows a given person or process to log on to the database.