0 evaluări0% au considerat acest document util (0 voturi)
284 vizualizări7 pagini
The document discusses database auditing and data management approaches. It compares the flat-file model, where each user owns private data files, to the database model where data is centralized and shared. The database model addresses problems with the flat-file approach like data redundancy, outdated information, and inability to access additional data. A database management system (DBMS) controls access to the centralized database and ensures data integrity. The DBMS uses data definition and manipulation languages to define and retrieve data. It also provides different views of the database for users, administrators, and programmers.
The document discusses database auditing and data management approaches. It compares the flat-file model, where each user owns private data files, to the database model where data is centralized and shared. The database model addresses problems with the flat-file approach like data redundancy, outdated information, and inability to access additional data. A database management system (DBMS) controls access to the centralized database and ensures data integrity. The DBMS uses data definition and manipulation languages to define and retrieve data. It also provides different views of the database for users, administrators, and programmers.
The document discusses database auditing and data management approaches. It compares the flat-file model, where each user owns private data files, to the database model where data is centralized and shared. The database model addresses problems with the flat-file approach like data redundancy, outdated information, and inability to access additional data. A database management system (DBMS) controls access to the centralized database and ensures data integrity. The DBMS uses data definition and manipulation languages to define and retrieve data. It also provides different views of the database for users, administrators, and programmers.
CHAPTER 4: AUDITING DATABASE When multiple users need the same
SYSTEMS data for different purposes, they must
obtain separated data sets The focus of this chapter is on structured to their specific needs. Sarbanes-Oxley Compliance regarding Data redundancy the replication of the security and control of essentially the same data in multiple organization databases. files. Two general approaches: Four significant problems in the - Flat-file model: used in many flat-file environment: (DaS-DU-CI- older (legacy) systems that are still TDD) in operation today. Private - Data Storage: efficient data ownership of data, which management captures and stores characterizes this model, is the root data only once and makes this cause of several problems that single source available to all users inhibit data integration. who need it, which is not possible. - Database model: there are three - Data Updating: these redundant common database models (the updating tasks add significantly to hierarchical, the network and the the cost of data management. relational model) that are - Currency of Information: if presented from the perspective of update information is not properly a centralized IT function. disseminated, the change will not o The hierarchical and network be reflected in some users data, models are called resulting in decisions based on navigational databases outdated information. because of their structure - Task-Data Dependency: the and inflexibility. users inability to obtain additional o The relational model this information as his or her needs flexible approach presents change. data in a two-dimensional format that is conceptually The Database Approach more pleasing to end users Access to the data resource is than complex navigational controlled by a database structures. management system (DBMS). Distributed data processing (DDP) DBMS a special software system empowers end users with ownership that is programmed to know which and control of IT resources, including data elements each user is authorized databases. to access. - This approach centralizes the DATA MANAGEMENT APPROACHES organizations data into a common database that is shared by other The Flat-File Approach users. Flat-files are data files that contain How problems in the flat-file records with no structured approach may be overcome relationships to other files. The flat-file through data sharing? approach is most often associated with - Elimination of Data Storage: so called legacy system. each data element is stored only The flat-file environment promotes a once, thereby eliminating data single-user view approach to data redundancy and reducing data management whereby end users own collection and storage costs. their data files rather than share them - Elimination of Data Update with other users. Problem: because each data Data files are therefore structured, element exists only in one place, it formatted, and arranges to suit the requires only a single update specific needs of the owner or primary procedure. This reduces the time user of the data. and cost of keeping the database - The DDL identifies the names and current. the relationship of all data - Elimination of Currency elements, records, and files that Problem: a single change to a constitute the database. database attribute is automatically made available to all users of the DATABASE VIEWS attribute. Internal View/Physical View the - Elimination of Task-Data physical arrangement of records in the Dependency Problem: the most database is presented through the striking difference between the internal view. database model and the flat-file - This is the lowest level of model is the pooling of data into a representation, which is one step common database that is shared removed from the physical by all organization users. database. Conceptual View/Logical View KEY ELEMENTS OF DATABASE (Schema) the schema (or ENVIRONMENT conceptual view) describes the entire database. Database Management System - this view represents the database The DBMS provides a controlled logically and abstractly, rather than environment to assist (or prevent) the way it is physically stored. access to the database and to External View/User View efficiently manage the data resource. (Subschema) the subschema or Typical features: user view defines the users section of - Program development: the the database DBMS contains application development software. Both USERS programmers and end users may employ this feature to create Formal Access: Application Interfaces applications to access. Under this mode of access, the - Backup and recovery: without presence of the DBMS is transparent the backup and recovery feature to the users. the database would be vulnerable to total destruction. Data Manipulation Language o Disk failure, program error Data manipulation language (DML) is or malicious act renders the the proprietary programming language database unusable. that a particular DBMS uses to - Database usage reporting: this retrieve, process, and store data feature captures statistics on what data are being used, when they are DBMS Operation used, and who uses them. This Illustrates how the DBMS and user information is used by the DBA to applications work together. help assign under authorization and maintain the database. Informal Access: Query Language - Database access: the most Definition important feature of a DBMS is to Query - is an ad hoc access permit authorized user access, methodology for extracting both formal and informal, to the information from a database database. - Built-in query facility: this feature allows authorized users to DATA DEFINITION LANGUAGE process data independent of Data Definition Language (DDL) professional programmers by is a programming language used to providing a friendly environment define the database to the DBMS. for integrating and retrieving data to produce ad hoc management resource, thus greatly facilitating the reports. analysis of user needs. Standard Query Language (SQL) - has emerged as the standard query The Physical Database language for both mainframe and Physical Database this is the microcomputers DBMSs. lowest level of the database and the - SQL is a fourth-generation, only level that exists in physical form. nonprocedural language (English- - The physical database consists of like commands) with many magnetic spots on metallic coated commands that allow users to disks input, retrieve, and modify data Data Structures are the bricks and easily. mortar of the database. The data - SELECT Command: is a powerful structure allows records to be located, tool for retrieving data. stored, and retrieved, and enables movement from one record to another. The Database Administrator (DBA) Data Organization The DBA is responsible for managing - Organization of a file refers to the database resource. the way records are physically The duties of the DBA fall into the arranged on the secondary storage following areas: database planning, device. This may be either database design, database sequential or random. implementation, operation and o Records in sequential maintenance, and database growth files: are stored in and change. contiguous locations that Database Planning: occupy a specified area of - Develop organizations database disk space. strategy o Records in random files: - Define database environment are stored without regard for - Define data requirements their physical relationship to - Develop data dictionary other records of the same Database Design: file. - Logical database (schema) Data Access Methods - External users views (subschema) - Access Method the techniques - Internal view of databases used to locate records and to - Database controls navigate through the database. Implementation: - Determine access policy DBMS Models - Implement security controls Data model - is an abstract - Specify tests procedures representation of the data about - Establish programming standards entities, including resources (assets), events (transactions), and agents Operation and Maintenance (personnel or customers, etc.) and - Evaluate database performance their relationship in an organization. - Reorganize database as user needs Purpose: To represent entity demand attributes in a way that is - Review standards and procedures understandable to users. Change and Growth - Plan for change and growth - Evaluate new technology Database Terminology (DERDA) Data Attribute/Field is a single Data Dictionary item of data, such as customers Data Dictionary describes every name, account balance or address. data element in the database. This Entity is a database representation enables all users (and programmers) of an individual resource, event, or to share a common view of the data agent about which we choose to collect data. Record Type (Table or File) a The Network Model group of data attributes that logically In the late 1970s, an ANSI committee define an entity. created the Committee on Database is the set of record types Development of Applied Symbolic that an organization needs to support Language (CODASYL), which formed its business processes. a database task group to develop Associations record types that standards for database design. constitute a database exist in relation CODASYL developed the network to other record types. model for databases. - One-to-one association Most popular example: IDMS - One-to-many association (Integrated Database - Many-to-many association Management System) which was introduced by Cullinane/Cullinet The Hierarchical Model Software This was a popular method of data The distinction between representation because it reflected, hierarchical model and network more or less faithfully, many aspects model is that the network model of an organization that are hierarchical permits a child records to have in relationship. multiple parents. It is constructed of sets that describe the relationship between two linked The Relational Model files. Each set contains a parent and a E.F. Codd originally proposed the child. principles of the relational model in Most prevalent example: IBMs the late 1960s. Information Management System (IMS) The formal model has its foundations Siblings files at the same level with in relational algebra and set theory, the same parent. which provide the theoretical basis for Tree structure the so called structure most of the data manipulation Root the highest level in the tree operations used. structure The most apparent difference Leaf lowest file in a particular branch between the relational model and the navigational model is the way Navigational Databases in which data associations are represented to the user. The hierarchical data model is called navigational database because Attributes (data fields) columns traversing the files requires following a forming across the top of the table. predefined path. Tuples a normalized array of data This is established through explicit that is similar, but not precisely linkages (pointers) between related equivalent, to a record in a flat-file records. system. - They are intersecting the columns The only way to access data at lower to form rows in the table. levels in the tree is from the root and via the pointers down the navigational Four characteristics of properly path to the desired records. designed tables: 1. All occurrences at the Limitations of the Hierarchical Model intersection of a row and a 1. A parent record may have one or more column are a single value. No child records. multiple values (repeating 2. No child record can have more than groups) are allowed. one parent 2. The attribute value in any column must all be of the same class. 3. Each column in a given table Deadlock Phenomenon must be uniquely named. Deadlock is a permanent condition However, different tables may that must be resolved by special contain columns with the same software that analyzes each deadlock name. condition to determine the best 4. Each row in the table must be solution. unique in at least one attribute. A deadlock occurs because there is a This attribute is the primary key. mutual exclusion to the data resource, and the transactions are in a wait DATABASES IN A DISTRIBUTED state until the locks are removed. ENVIRONMENT Two categories: Partitioned databases Deadlock Resolution and Replicated Databases. Resolving a deadlock usually involves terminating one or more transactions Centralized Databases to complete processing of the other The first approach involves retaining transactions in the deadlock. the data in a central location. Factors to consider in the decision of The actual processing of data is resolving a deadlock: performed at the remote IT unit. - The resources currently invested in The central site performs the functions the transaction of a file manager that services the - The transactions stage of data needs of the remote sites. completion - The number of deadlock associated Data Currency in a DDP Environment with the transaction During data processing, account balances pass through a state of Replicated Databases temporary inconsistency where their Are effective in companies where values are incorrectly stated. This there exists a high degree of data occurs during the execution of a sharing but no primary user. transaction. The primary justification for a Database lockout a software replicated database is to support read- control (usually a function of the only queries. DBMS) that prevent multiple simultaneous access to data. Concurrency Control Database concurrency is the Distributed Databases presence of complete and accurate Partitioned Database Approach data at all user sites. Splits the central database into A commonly used method for segments or partitions that are concurrency control is to serialize distributed to their primary users. transactions. Advantages: Two criteria in labeling each - Having data stored at local sites transaction: increases users control. 1. Special software group - Transaction processing response transactions into classes to time is improved by permitting identify potential conflicts. local access to data and reducing 2. Time- stamp each transaction. A the volume of data that must be system wide clock is used to transmitted between IT units. keep all sites, some of which - Partitioned databases can reduce may be in different time zones, the potential effects of a disaster. on the same logical time. By locating data at several sites, the loss of a single IT unit does not CONTROLLING AND AUDITING DATA eliminate all data processing by the MANAGEMENT SYSTEMS organization. Access Controls are designed to prevent Inference controls should be in unauthorized individuals from viewing, place to prevent users from inferring retrieving, corrupting, or destroying the through query features, specific data entitys data. values that they otherwise are unauthorized to access. User Views Inference controls attempt to prevent The user view or subschema is a three types of compromises to the subset of total database that defines database: the users data domain and provide 1. Positive compromise the access to the database. user determines the specific value of a data item. Data Authorization Table 2. Negative compromise the The database authorization table user determines that a data contains rules that limit the actions a item does not have a specific user can take. value. Each user is granted certain privileges 3. Approximate compromise that are coded in the authority table, the user is unable to determine which is used to verify the users the exact value of an item but is action requests. able to estimate it with sufficient accuracy to violate User-Defined Procedures the confidentiality of the data. A user-defined procedures allow the user to create a personal security Audit Objectives Relating to Database program or routine to provide more Access positive user identification than a Verify that database access authority single password. and privileges are granted to users in In addition to a password, the security accordance with their legitimate procedure asks a series of personal needs. questions (such as the users mothers maiden name), which only Audit Procedures for Testing Database the legitimate user should know. Access Controls Data Encryption Responsibility for Authority Tables and Database systems also use encryption Subschemas procedures to protect highly sensitive Appropriate Access Authority stored data, such as product formulas, Biometric Controls personnel pay rates, password files Inference Controls and certain financial data thus making Encryption Controls it unreadable to an intruder browsing the database.
Biometric Devices Backup controls ensure that in the event
The ultimate in user authentication of data loss due to unauthorized access, procedures is the use of biometric equipment failure, or physical disaster the devices, which measure various organization can recover its database. personal characteristics, such as fingerprints, voice prints, retina prints GPC Backup Technique or signature characteristics. Grandparent-Parent- Child (GPC) These user characteristics are Backup Technique is used in digitized and stored permanently in a sequential file batch systems. database security file or on an Two factors in determining the number identification card that the user of backup master files needed for each carries. application: 1. The financial significance of the Inference Controls system 2. The degree of file activity an automatic procedure that should be Direct Access File Backup performed at least once a day. Data values in direct access files are Transaction Log (Journal) changed in place through a process The transaction log feature provides called destructive replacement. an audit trail of all processed The timing of the direct access backup transactions. procedures will depend on the Checkpoint Feature processing method being used. The checkpoint facility suspends all data processing while the system Off-Site Storage reconciles the transaction log and the As an added safeguard, backup files database change log against the created under both the GPC and direct database. access approaches should be stored Recovery Module off-site in a secure location. The recovery module uses the logs and backup files to restart the system Audit Objective Relating to Flat-File after a failure. Backup Verify that backup controls in place are Audit Objective Relating to Database effective in protecting data files from Backup physical damage, loss, accidental Verify that controls over the data erasure, and data corruption through resource are sufficient to preserve the system failures sand program errors. integrity and physical security of the database. Audit Procedures for Testing Flat-File Backup Controls Audit Procedures for Testing Database Sequential File (GPC) Backup Backup Controls Backup Transaction Files The auditor should verify that backup Direct Access File Backup is performed routinely and frequently Off-Site Storage to facilitate the recovery of lost, destroyed, or corrupted data without Backup Controls in the Database excessive reprocessing. Environment The auditor should verify that Backup automatic backup procedures are in The backup feature makes a periodic place and functioning, and that copies backup of the entire database. This is of the database are stored off-site for further security.