This document discusses database security, management, backup, and recovery. It explains that the database administrator must secure the database using multi-tiered access controls to restrict authorized and unauthorized users. The document also outlines steps for database population, reorganization, and performance tuning. It describes backup strategies to protect against data loss and recovery procedures to restore from backups in the event of failures.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
32 views9 pages
Database Security
This document discusses database security, management, backup, and recovery. It explains that the database administrator must secure the database using multi-tiered access controls to restrict authorized and unauthorized users. The document also outlines steps for database population, reorganization, and performance tuning. It describes backup strategies to protect against data loss and recovery procedures to restore from backups in the event of failures.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 9
Database Security
At the completion of this lesson; students would be
able to demonstrate how database administrator would need further exploration if intended to function as a DBA. Students will also learn how to secure a database in a multi-tiered format as well as learning the basic recovery steps to prevent loss of data. Database Management The database must be populated with database objects. Database objects include tablespaces (specific to Oracle), tables, indexes, views, synonyms, procedures, triggers, packages, sequences, users, roles, etc. Reorganizing existing database tables and indexes Deleting unnecessary indexes or moving other objects Making alterations to the database itself Making alterations to database components (tablespaces, data files, tables, procedures, etc.) Creating additional database objects (tablespaces, data files, tables, users, indexes, procedures, etc.) Training users Backup and recovery of database objects Database performance tuning Database Security The DBA must ensure the following security measures: Access to the system is controlled. Authorized users must be able to access (insert, modify, retrieve, or delete) data that they are authorized to access. Authorized users must be restricted to the data and resources that they are duly authorized to access and nothing more. Unauthorized users must have absolutely no access. Database Backup and Recovery Backup and recovery refers to the various strategies and procedure involve in protecting a database against data loss. This backup may include important parts of the database such as the control file, data file(s), or tablespace(s); alternately, it may involve the entire database. A backup). is a safeguard against unexpected data loss and application errors. Oracle Recovery: Basic Concept
Recovery is the opposite of backup. Like backup, recovery
may involve a component or section of the database (from a control file, data file(s) or tablespace(s)), or it may involve an entire database. The restore only puts the data file back to the same point in time of when the backup was taken. Types of Failures User Error Statement Failure Process Failure Instance Failure Media (Disk) Failure Oracle’s Backup and Recovery Solutions These are of two: Recovery Manager (RMAN) and user- managed backup and recovery. . RMAN has its own syntax and is accessible either through a command-line interface or though the Oracle Enterprise Manager GUI. You can also set up an independent recovery catalog, which is a schema that contains metadata imported from the control file, in a separate recovery catalog database Oracle’s Backup and Recovery Solutions An alternative method of performing recovery is to use operating system commands for backups and SQL*Plus for recovery. Regardless of the method, physical backups can be supplemented with logical backups of schema objects made using the Oracle Export utility. Summary Depending on the DBMS being used, database creation may be complex or simple. MySQL and Oracle are at the two extreme ends of the spectrum: database creation is very simple in MySQL, and very complex in Oracle. Database security must ideally be multi-tiered. It must address access to the system, access to the system resources, and access to data. Database management must continue after database creation. It must address issues relating to the performance of the database system in the face of growing data collection and changing user needs. Database tuning is an integral part of this. Backup must be carefully planned and methodically implemented, in order to minimize or eliminate data loss due to system failures. The recovery procedures must also be reviewed as required. Like database creation, depending on the DBMS used, database removal may be trivial or complex.