Dirty Data
Data that contain inaccuracies and/or inconsistencies.
Data Quality
A comprehensive approach to ensuring the accuracy, validity, and timeliness of data
Data profiling software
Programs that analyze data and metadata to determine patterns that can help assess data quality
Master data management (MDM) software
Software that provides a "master copy" of entities such as customers, that appear in numerous systems throughout he organization. This software helps prevent dirty data by coordinating common data across multiple systems.
Security
Activities and measures to ensure the confidentiality, integrity, and availability of an information system and its main asset, data.
privacy
The rights of individuals and organizations to determine access to data about themselves.
Enterprise Database
The overall company data representation, which provides support for present and expected future needs.
Information Systems (IS) department
A department responsible for all information technology services and production functions in an organization.
database administrator (DBA)
The person responsible for planning, organizing, controlling, and monitoring the centralized and shared corporate database. The DBA is the general manager of the database administration department.
Data Administrator (DA)
The person responsible for managing the entire data resource, whether it is computerized or not. The DA has broader authority and responsibility than the database administrator (DBA). Also known as an information resource manager (IRM). Also known as info
Policy
General statement of direction that is used to manage company operations through the communication and support of the organization's objectives.
Standard
A detailed and specific set of instructions that describes the minimum requirements for a given activity. Standards are used to evaluate the quality of the output.
Procedure
Series of steps to be followed during the performance of an activity or process.
database security officer (DSO)
The person responsible for the security, integrity, backup and recovery of the database.
disaster management
The set of DBA activities dedicated to securing data availability following a physical disaster or a database integrity failure.
full backup (database dump)
A complete copy of an entire database saved and periodically updated in a separate memory location. A full backup ensures a full recovery of all data after a physical disaster or database integrity failure.
incremental backup
A process that only backs up data that has changed in the database since the last incremental or full backup.
Concurrent backup
A backup that takes place while one or more users are working on a database.
Access Plan
A set of instructions generated at application compilation time that is created and managed by a DBMS. The access plan predetermines how an application's query will access the database at run time.
confidentiality
In the context of data security, ensuring that data is protected against unauthorized access. and if the data is accessed by an authorized user, that the data is used only for an authorized purpose.
Compliance
Activities that meet data privacy and security reporting guidelines or requirements
Integrity
In a data security framework, refers to keeping data consistent and free of errors or anomalies.
Availability
IN the context of data security, it refers to the accessibility of data whenever required by authorized users and for authorized purposes.
Security Policy
A collection of standards, policies, and procedures created to guarantee the security of a system and ensure auditing and compliance.
Security Vulnerability
A weakness in a system component that could be exploited to allow unauthorized access or cause service disruptions
Security threat
An imminent security violation that could occur due to unchecked security vulnerabilities.
Security Breach
An event in which a security threat is exploited to endanger the integrity, confidentiality, or availability of the system.
database security
The use of DBMS features and other related measures to comply with the security requirements of an organization
Authorization management
Procedures that protect and guarantee database security and integrity. Such procedures include user access management, view definition, DBMS access control, and DBMS usage monitoring
audit log
A security feature of a database management system that automatically records a brief description of the database operations performed by all users.
active data dictionary
A data dictionary that is automatically updated by the database management system every time the database is accessed, thereby keeping its information current.
Passive Data Dictionary
A DBMS data dictionary that requires a command initiated by an end user to update its data access statistics.
Information Resource Dictionary
Another name for a data dictionary
Computer-Aided system engineering (CASE)
Tools used to automate part or all of the systems development life cycle (SDLC)
Front-end CASE tool
A computer aided software tool that provides support for the planning, analysis, and design phases of the SDLC
Back-end CASE tool
A computer-aided software tool that provides support for the coding and implementation phases of the SDLC
Information engineering (IE)
A methodology that translates a company's strategic goals into helpful data and applications. IE focused on the description of corporate data instead of the processes
Information Systems Architecture (ISA)
The output of the information engineering (IE) process that serves as the basis for planning, developing, and controlling future information systems.
Database instance
IN an oracle DBMS, the collection of processes and data structures used to manage a specific database
Tablespace
In a DBMS, a logical storage space used to group related data. Also known as a file group
datafile
A file on the hard drive or storage system where the data in a tablespace is physically stored
user
In a system, a uniquely identifiable object that allows a given person or process to log on to the database
Role
In Oracle, a named collection of database access privileges that authorize a user to connect to a database and use its system resources.
Profile
In Oracle, a named collection of settings that controls how much of the database resource a given user can use.