chapter08

chapter08 - Concepts of Database Management, Fifth Edition...

Info iconThis preview shows pages 1–14. Sign up to view the full content.

View Full Document Right Arrow Icon
Concepts of Database  Concepts of Database  Management, Fifth Edition Management, Fifth Edition Chapter 8:  Chapter 8:  Database Administration Database Administration
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
2 Objectives Discuss the need for database administration (DBA) Explain the DBA’s responsibilities in formulating and enforcing database policies for access privileges, security, disaster planning, and archiving Discuss the DBA’s administrative responsibilities for DBMS evaluation and selection, DBMS maintenance, data dictionary management, and training
Background image of page 2
3 Objectives Discuss the DBA’s technical responsibilities for database design, testing, and performance tuning
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
4 Database Administration (DBA) Resource that supervises database and use of DBMS DBA functions are usually performed by a group May refer to one person also called a database administrator
Background image of page 4
5 Figure 8.1: DBA Responsibilities
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
6 Policy Formulation and Enforcement Access Privileges Users access the database only in ways in which they are entitled Security Access restrictions ensure database is secure Passwords, encryption, and views implement security Effective password protection critical
Background image of page 6
7 Figure 8.2: Access Privileges for Sam
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
8 Figure 8.3: Access Privileges for Paige
Background image of page 8
9 Figure 8.4: Access Privileges for Valerie
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
10 Figure 8.5: Attempted Security Violation by Brady
Background image of page 10
11 Figure 8.6: Attempted Security Violation by Paige
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
12 Figure 8.7: DBMS Supplies Security Features
Background image of page 12
13 Figure 8.8: Supplemented Security Features
Background image of page 13

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 14
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 04/17/2008 for the course IS 158 taught by Professor Moffitt during the Spring '08 term at CSU Fresno.

Page1 / 29

chapter08 - Concepts of Database Management, Fifth Edition...

This preview shows document pages 1 - 14. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online