web viewdata warehouses. a . data warehouse. is a relational database that is designed for query and...

4
DATA management of data security concerns o disaster recovery plan A disaster recovery plan (DRP) is a documented process or set of procedures to recover and protect a business IT infrastructure in the event of a disaster . Such plan, ordinarily documented in written form, specifies procedures an organization is to follow in the event of a disaster. It is "a comprehensive statement of consistent actions to be taken before, during and after a disaster." The disaster could be natural , environmental or man-made . Man-made disasters could be intentional (for example, an act of a terrorist) or unintentional (that is, accidental, such as the breakage of a man-made dam). - Risks - Preventative Strategies - Recovery Strategies o audit trail An audit trail (also called audit log) is a security-relevant chronological record, set of records, and/or destination and source of records that provide documentary evidence of the sequence of activities that have affected at any time a specific operation, procedure, or event. Audit records typically result from activities such as financial transactions, scientific research and health care data transactions, or communications by individual people, systems, accounts, or other entities. The process that creates an audit trail is typically required to always run in a privileged mode, so it can access and supervise all actions from all users; a normal user should not be allowed to stop/change it. Furthermore, for the same reason, trail file or database table with a trail should not be accessible to normal users. Another way of handling this issue is through the use of a role-based security model in the software. The software can operate with the closed-looped controls, or as a 'closed system,' as required by many companies when using audit trail functionality. types of backup techniques and archiving of data o full Full backup is a method of backup where all the files and folders selected for the backup will be backed up. It is commonly used as an initial or first backup followed with subsequent incremental or differential backups . After several incremental or differential backups, it is common to start over with a fresh full backup again. o differential Each differential backup saves the data that has changed since the last full backup. It has the advantage that only a maximum of two data sets are needed to restore the data. One disadvantage, compared to the incremental backup method, is that as time from the last full backup (and thus the accumulated changes in data) increases, so does

Upload: phungnhi

Post on 06-Feb-2018

213 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Web viewdata warehouses. A . data warehouse. is a relational database that is designed for query and analysis rather than for transaction processing

DATA management of data

security concernso disaster recovery planA disaster recovery plan (DRP) is a documented process or set of procedures to recover and protect a business IT infrastructure in the event of a disaster. Such plan, ordinarily documented in written form, specifies procedures an organization is to follow in the event of a disaster. It is "a comprehensive statement of consistent actions to be taken before, during and after a disaster." The disaster could be natural, environmental or man-made. Man-made disasters could be intentional (for example, an act of a terrorist) or unintentional (that is, accidental, such as the breakage of a man-made dam).

- Risks- Preventative Strategies- Recovery Strategies

o audit trail

An audit trail (also called audit log) is a security-relevant chronological record, set of records, and/or destination and source of records that provide documentary evidence of the sequence of activities that have affected at any time a specific operation, procedure, or event. Audit records typically result from activities such as financial transactions, scientific research and health care data transactions, or communications by individual people, systems, accounts, or other entities.

The process that creates an audit trail is typically required to always run in a privileged mode, so it can access and supervise all actions from all users; a normal user should not be allowed to stop/change it. Furthermore, for the same reason, trail file or database table with a trail should not be accessible to normal users. Another way of handling this issue is through the use of a role-based security model in the software. The software can operate with the closed-looped controls, or as a 'closed system,' as required by many companies when using audit trail functionality.

types of backup techniques and archiving of datao full Full backup is a method of backup where all the files and folders selected for the backup will be backed up.   It   is   commonly   used   as   an   initial   or   first   backup   followed   with subsequent incremental or differential backups. After several incremental or differential backups, it is common to start over with a fresh full backup again.

o differential Each differential backup saves the data that has changed since the last full backup. It has the advantage that only a maximum of two data sets are needed to restore the data. One disadvantage, compared to the incremental backup method, is that as time from the last full backup (and thus the accumulated changes in data) increases, so does the time to perform the differential backup. Restoring an entire system would require starting from the most recent full backup and then applying just the last differential backup since the last full backup.

o incrementalAn incremental style repository aims to make it more feasible to store backups from more points in time by organizing the data into increments of change between points in time. This eliminates the need to store duplicate copies of unchanged data: with full backups a lot of the data will be unchanged from what has been backed up previously. Typically, a full backup (of all files) is made on one occasion (or at infrequent  intervals) and serves as the reference point for an incremental  backup set.  After that, a number of incremental backups are made after successive time periods. Restoring the whole system to the date of the last incremental backup would require starting from the last full backup taken before the data loss, and then applying in turn each of the incremental backups since then. Additionally, some backup systems can reorganize the repository to synthesize full backups from a series of incrementals.

Page 2: Web viewdata warehouses. A . data warehouse. is a relational database that is designed for query and analysis rather than for transaction processing

o DailyHow often you make backups will depend on the type of data to be backed up. For example, if you are running a network environment with critical data stored on your servers, then even nightly backups may not be enough.

On the other hand, if you are backing up the data on your home computer then hourly backups would likely be unnecessary. You may find it helpful to consider the following points when planning your backup schedule:

The amount of time you spend on the computer. How often and by how much the data on the computer changes.

If the data you want to back up is lower priority, or subject to few changes, like music, e-mails and family photos, then weekly or even monthly backups may suffice. However, if you happen to be in the middle of a tax audit, more frequent backups may be necessary.

As a general rule, the amount of time in between backups should be no more than the amount of time you are willing to spend re-doing any lost work. For example, if spending a week re-writing lost documents is too long for you, you should back up at least once per week.

data storageMain factors which will influence whether customers are willing to store the data online:

1. Security (whether it is secure or not)2. Cost3. Accessibility4. Ease of storing, downloading and using service5. Speed6. Protection, duration and consistency of backups. 

o data warehousesA data warehouse is a relational database that is designed for query and analysis rather than for transaction processing. It usually contains historical data derived from transaction data, but it can include data from other sources. It separates analysis workload from transaction workload and enables an organization to consolidate data from several sourc0es. Purpose of a data warehouse is to provide cumulative data which is in suitable form for decision making. Highlights general trends of business.

o data miningGenerally, data mining (sometimes called data or knowledge discovery) is the process of analysing data from different perspectives and summarizing it into useful information - information that can be used to increase revenue, cuts costs, or both. Data mining software is one of a number of analytical tools for analysing data. It allows users to analyse data from many different dimensions or angles, categorize it, and summarize the relationships identified. Technically, data mining is the process of finding correlations or patterns among dozens of fields in large relational databases.

o data martsA data mart is the access layer of the data warehouse environment that is used to get data out to the users. The data mart is a subset or smaller version of the      data      warehouse    that is usually oriented to a specific business line or team. Focuses one area or single subject for business data analysis. 

o data in the cloudCloud storage is a model of data storage where the digital data is stored in logical pools, the physical storage spans multiple servers (and often locations), and the physical environment is typically owned and managed by a hosting company. These cloud storage providers are responsible for keeping the data available   and   accessible,   and   the   physical   environment   protected   and   running.   People   and 

Page 3: Web viewdata warehouses. A . data warehouse. is a relational database that is designed for query and analysis rather than for transaction processing

organizations   buy   or   lease   storage   capacity   from   the   providers   to   store   user,   organization, or application data.