Chapter 16

Dirty Data

Data that contain inaccuracies and/or inconsistencies.

Data Quality

A comprehensive approach to ensuring the accuracy, validity, and timeliness of data

Data profiling software

Programs that analyze data and metadata to determine patterns that can help assess data quality

Master data management (MDM) software

Software that provides a "master copy" of entities such as customers, that appear in numerous systems throughout he organization. This software helps prevent dirty data by coordinating common data across multiple systems.

Security

Activities and measures to ensure the confidentiality, integrity, and availability of an information system and its main asset, data.

privacy

The rights of individuals and organizations to determine access to data about themselves.

Enterprise Database

The overall company data representation, which provides support for present and expected future needs.

Information Systems (IS) department

A department responsible for all information technology services and production functions in an organization.

database administrator (DBA)

The person responsible for planning, organizing, controlling, and monitoring the centralized and shared corporate database. The DBA is the general manager of the database administration department.

Data Administrator (DA)

The person responsible for managing the entire data resource, whether it is computerized or not. The DA has broader authority and responsibility than the database administrator (DBA). Also known as an information resource manager (IRM). Also known as info

Policy

General statement of direction that is used to manage company operations through the communication and support of the organization's objectives.

Standard

A detailed and specific set of instructions that describes the minimum requirements for a given activity. Standards are used to evaluate the quality of the output.

Procedure

Series of steps to be followed during the performance of an activity or process.

database security officer (DSO)

The person responsible for the security, integrity, backup and recovery of the database.

disaster management

The set of DBA activities dedicated to securing data availability following a physical disaster or a database integrity failure.

full backup (database dump)

A complete copy of an entire database saved and periodically updated in a separate memory location. A full backup ensures a full recovery of all data after a physical disaster or database integrity failure.

incremental backup

A process that only backs up data that has changed in the database since the last incremental or full backup.

Concurrent backup

A backup that takes place while one or more users are working on a database.

Access Plan

A set of instructions generated at application compilation time that is created and managed by a DBMS. The access plan predetermines how an application's query will access the database at run time.

confidentiality

In the context of data security, ensuring that data is protected against unauthorized access. and if the data is accessed by an authorized user, that the data is used only for an authorized purpose.

Compliance

Activities that meet data privacy and security reporting guidelines or requirements

Integrity

In a data security framework, refers to keeping data consistent and free of errors or anomalies.

Availability

IN the context of data security, it refers to the accessibility of data whenever required by authorized users and for authorized purposes.

Security Policy

A collection of standards, policies, and procedures created to guarantee the security of a system and ensure auditing and compliance.

Security Vulnerability

A weakness in a system component that could be exploited to allow unauthorized access or cause service disruptions

Security threat

An imminent security violation that could occur due to unchecked security vulnerabilities.

Security Breach

An event in which a security threat is exploited to endanger the integrity, confidentiality, or availability of the system.

database security

The use of DBMS features and other related measures to comply with the security requirements of an organization

Authorization management

Procedures that protect and guarantee database security and integrity. Such procedures include user access management, view definition, DBMS access control, and DBMS usage monitoring

audit log

A security feature of a database management system that automatically records a brief description of the database operations performed by all users.

active data dictionary

A data dictionary that is automatically updated by the database management system every time the database is accessed, thereby keeping its information current.

Passive Data Dictionary

A DBMS data dictionary that requires a command initiated by an end user to update its data access statistics.

Information Resource Dictionary

Another name for a data dictionary

Computer-Aided system engineering (CASE)

Tools used to automate part or all of the systems development life cycle (SDLC)

Front-end CASE tool

A computer aided software tool that provides support for the planning, analysis, and design phases of the SDLC

Back-end CASE tool

A computer-aided software tool that provides support for the coding and implementation phases of the SDLC

Information engineering (IE)

A methodology that translates a company's strategic goals into helpful data and applications. IE focused on the description of corporate data instead of the processes

Information Systems Architecture (ISA)

The output of the information engineering (IE) process that serves as the basis for planning, developing, and controlling future information systems.

Database instance

IN an oracle DBMS, the collection of processes and data structures used to manage a specific database

Tablespace

In a DBMS, a logical storage space used to group related data. Also known as a file group

datafile

A file on the hard drive or storage system where the data in a tablespace is physically stored

user

In a system, a uniquely identifiable object that allows a given person or process to log on to the database

Role

In Oracle, a named collection of database access privileges that authorize a user to connect to a database and use its system resources.

Profile

In Oracle, a named collection of settings that controls how much of the database resource a given user can use.