Sunteți pe pagina 1din 7

CHAPTER 4: AUDITING DATABASE When multiple users need the same

SYSTEMS data for different purposes, they must


obtain separated data sets
The focus of this chapter is on structured to their specific needs.
Sarbanes-Oxley Compliance regarding Data redundancy the replication of
the security and control of essentially the same data in multiple
organization databases. files.
Two general approaches: Four significant problems in the
- Flat-file model: used in many flat-file environment: (DaS-DU-CI-
older (legacy) systems that are still TDD)
in operation today. Private - Data Storage: efficient data
ownership of data, which management captures and stores
characterizes this model, is the root data only once and makes this
cause of several problems that single source available to all users
inhibit data integration. who need it, which is not possible.
- Database model: there are three - Data Updating: these redundant
common database models (the updating tasks add significantly to
hierarchical, the network and the the cost of data management.
relational model) that are - Currency of Information: if
presented from the perspective of update information is not properly
a centralized IT function. disseminated, the change will not
o The hierarchical and network be reflected in some users data,
models are called resulting in decisions based on
navigational databases outdated information.
because of their structure - Task-Data Dependency: the
and inflexibility. users inability to obtain additional
o The relational model this information as his or her needs
flexible approach presents change.
data in a two-dimensional
format that is conceptually The Database Approach
more pleasing to end users Access to the data resource is
than complex navigational controlled by a database
structures. management system (DBMS).
Distributed data processing (DDP) DBMS a special software system
empowers end users with ownership that is programmed to know which
and control of IT resources, including data elements each user is authorized
databases. to access.
- This approach centralizes the
DATA MANAGEMENT APPROACHES organizations data into a common
database that is shared by other
The Flat-File Approach users.
Flat-files are data files that contain How problems in the flat-file
records with no structured approach may be overcome
relationships to other files. The flat-file through data sharing?
approach is most often associated with - Elimination of Data Storage:
so called legacy system. each data element is stored only
The flat-file environment promotes a once, thereby eliminating data
single-user view approach to data redundancy and reducing data
management whereby end users own collection and storage costs.
their data files rather than share them - Elimination of Data Update
with other users. Problem: because each data
Data files are therefore structured, element exists only in one place, it
formatted, and arranges to suit the requires only a single update
specific needs of the owner or primary procedure. This reduces the time
user of the data.
and cost of keeping the database - The DDL identifies the names and
current. the relationship of all data
- Elimination of Currency elements, records, and files that
Problem: a single change to a constitute the database.
database attribute is automatically
made available to all users of the DATABASE VIEWS
attribute. Internal View/Physical View the
- Elimination of Task-Data physical arrangement of records in the
Dependency Problem: the most database is presented through the
striking difference between the internal view.
database model and the flat-file - This is the lowest level of
model is the pooling of data into a representation, which is one step
common database that is shared removed from the physical
by all organization users. database.
Conceptual View/Logical View
KEY ELEMENTS OF DATABASE (Schema) the schema (or
ENVIRONMENT conceptual view) describes the entire
database.
Database Management System - this view represents the database
The DBMS provides a controlled logically and abstractly, rather than
environment to assist (or prevent) the way it is physically stored.
access to the database and to External View/User View
efficiently manage the data resource. (Subschema) the subschema or
Typical features: user view defines the users section of
- Program development: the the database
DBMS contains application
development software. Both USERS
programmers and end users may
employ this feature to create Formal Access: Application Interfaces
applications to access. Under this mode of access, the
- Backup and recovery: without presence of the DBMS is transparent
the backup and recovery feature to the users.
the database would be vulnerable
to total destruction. Data Manipulation Language
o Disk failure, program error Data manipulation language (DML) is
or malicious act renders the the proprietary programming language
database unusable. that a particular DBMS uses to
- Database usage reporting: this retrieve, process, and store data
feature captures statistics on what
data are being used, when they are DBMS Operation
used, and who uses them. This Illustrates how the DBMS and user
information is used by the DBA to applications work together.
help assign under authorization
and maintain the database. Informal Access: Query Language
- Database access: the most Definition
important feature of a DBMS is to
Query - is an ad hoc access
permit authorized user access,
methodology for extracting
both formal and informal, to the
information from a database
database.
- Built-in query facility: this
feature allows authorized users to
DATA DEFINITION LANGUAGE
process data independent of
Data Definition Language (DDL)
professional programmers by
is a programming language used to providing a friendly environment
define the database to the DBMS. for integrating and retrieving data
to produce ad hoc management resource, thus greatly facilitating the
reports. analysis of user needs.
Standard Query Language (SQL) -
has emerged as the standard query The Physical Database
language for both mainframe and Physical Database this is the
microcomputers DBMSs. lowest level of the database and the
- SQL is a fourth-generation, only level that exists in physical form.
nonprocedural language (English- - The physical database consists of
like commands) with many magnetic spots on metallic coated
commands that allow users to disks
input, retrieve, and modify data Data Structures are the bricks and
easily. mortar of the database. The data
- SELECT Command: is a powerful structure allows records to be located,
tool for retrieving data. stored, and retrieved, and enables
movement from one record to another.
The Database Administrator (DBA) Data Organization
The DBA is responsible for managing - Organization of a file refers to
the database resource. the way records are physically
The duties of the DBA fall into the arranged on the secondary storage
following areas: database planning, device. This may be either
database design, database sequential or random.
implementation, operation and o Records in sequential
maintenance, and database growth files: are stored in
and change. contiguous locations that
Database Planning: occupy a specified area of
- Develop organizations database disk space.
strategy o Records in random files:
- Define database environment are stored without regard for
- Define data requirements their physical relationship to
- Develop data dictionary other records of the same
Database Design: file.
- Logical database (schema) Data Access Methods
- External users views (subschema) - Access Method the techniques
- Internal view of databases used to locate records and to
- Database controls navigate through the database.
Implementation:
- Determine access policy DBMS Models
- Implement security controls Data model - is an abstract
- Specify tests procedures representation of the data about
- Establish programming standards entities, including resources (assets),
events (transactions), and agents
Operation and Maintenance (personnel or customers, etc.) and
- Evaluate database performance their relationship in an organization.
- Reorganize database as user needs Purpose: To represent entity
demand attributes in a way that is
- Review standards and procedures understandable to users.
Change and Growth
- Plan for change and growth
- Evaluate new technology Database Terminology (DERDA)
Data Attribute/Field is a single
Data Dictionary item of data, such as customers
Data Dictionary describes every name, account balance or address.
data element in the database. This Entity is a database representation
enables all users (and programmers) of an individual resource, event, or
to share a common view of the data
agent about which we choose to
collect data.
Record Type (Table or File) a The Network Model
group of data attributes that logically In the late 1970s, an ANSI committee
define an entity. created the Committee on
Database is the set of record types Development of Applied Symbolic
that an organization needs to support Language (CODASYL), which formed
its business processes. a database task group to develop
Associations record types that standards for database design.
constitute a database exist in relation CODASYL developed the network
to other record types. model for databases.
- One-to-one association Most popular example: IDMS
- One-to-many association (Integrated Database
- Many-to-many association Management System) which was
introduced by Cullinane/Cullinet
The Hierarchical Model Software
This was a popular method of data The distinction between
representation because it reflected, hierarchical model and network
more or less faithfully, many aspects model is that the network model
of an organization that are hierarchical permits a child records to have
in relationship. multiple parents.
It is constructed of sets that describe
the relationship between two linked The Relational Model
files. Each set contains a parent and a E.F. Codd originally proposed the
child. principles of the relational model in
Most prevalent example: IBMs the late 1960s.
Information Management System (IMS) The formal model has its foundations
Siblings files at the same level with in relational algebra and set theory,
the same parent. which provide the theoretical basis for
Tree structure the so called structure most of the data manipulation
Root the highest level in the tree operations used.
structure The most apparent difference
Leaf lowest file in a particular branch between the relational model and
the navigational model is the way
Navigational Databases in which data associations are
represented to the user.
The hierarchical data model is called
navigational database because Attributes (data fields) columns
traversing the files requires following a forming across the top of the table.
predefined path. Tuples a normalized array of data
This is established through explicit that is similar, but not precisely
linkages (pointers) between related equivalent, to a record in a flat-file
records. system.
- They are intersecting the columns
The only way to access data at lower
to form rows in the table.
levels in the tree is from the root and
via the pointers down the navigational Four characteristics of properly
path to the desired records. designed tables:
1. All occurrences at the
Limitations of the Hierarchical Model intersection of a row and a
1. A parent record may have one or more column are a single value. No
child records. multiple values (repeating
2. No child record can have more than groups) are allowed.
one parent 2. The attribute value in any
column must all be of the same
class.
3. Each column in a given table Deadlock Phenomenon
must be uniquely named. Deadlock is a permanent condition
However, different tables may that must be resolved by special
contain columns with the same software that analyzes each deadlock
name. condition to determine the best
4. Each row in the table must be solution.
unique in at least one attribute. A deadlock occurs because there is a
This attribute is the primary key. mutual exclusion to the data resource,
and the transactions are in a wait
DATABASES IN A DISTRIBUTED state until the locks are removed.
ENVIRONMENT
Two categories: Partitioned databases Deadlock Resolution
and Replicated Databases. Resolving a deadlock usually involves
terminating one or more transactions
Centralized Databases to complete processing of the other
The first approach involves retaining transactions in the deadlock.
the data in a central location. Factors to consider in the decision of
The actual processing of data is resolving a deadlock:
performed at the remote IT unit. - The resources currently invested in
The central site performs the functions the transaction
of a file manager that services the - The transactions stage of
data needs of the remote sites. completion
- The number of deadlock associated
Data Currency in a DDP Environment with the transaction
During data processing, account
balances pass through a state of Replicated Databases
temporary inconsistency where their Are effective in companies where
values are incorrectly stated. This there exists a high degree of data
occurs during the execution of a sharing but no primary user.
transaction. The primary justification for a
Database lockout a software replicated database is to support read-
control (usually a function of the only queries.
DBMS) that prevent multiple
simultaneous access to data. Concurrency Control
Database concurrency is the
Distributed Databases presence of complete and accurate
Partitioned Database Approach data at all user sites.
Splits the central database into A commonly used method for
segments or partitions that are concurrency control is to serialize
distributed to their primary users. transactions.
Advantages: Two criteria in labeling each
- Having data stored at local sites transaction:
increases users control. 1. Special software group
- Transaction processing response transactions into classes to
time is improved by permitting identify potential conflicts.
local access to data and reducing 2. Time- stamp each transaction. A
the volume of data that must be system wide clock is used to
transmitted between IT units. keep all sites, some of which
- Partitioned databases can reduce may be in different time zones,
the potential effects of a disaster. on the same logical time.
By locating data at several sites,
the loss of a single IT unit does not CONTROLLING AND AUDITING DATA
eliminate all data processing by the MANAGEMENT SYSTEMS
organization.
Access Controls are designed to prevent Inference controls should be in
unauthorized individuals from viewing, place to prevent users from inferring
retrieving, corrupting, or destroying the through query features, specific data
entitys data. values that they otherwise are
unauthorized to access.
User Views Inference controls attempt to prevent
The user view or subschema is a three types of compromises to the
subset of total database that defines database:
the users data domain and provide 1. Positive compromise the
access to the database. user determines the specific
value of a data item.
Data Authorization Table 2. Negative compromise the
The database authorization table user determines that a data
contains rules that limit the actions a item does not have a specific
user can take. value.
Each user is granted certain privileges 3. Approximate compromise
that are coded in the authority table, the user is unable to determine
which is used to verify the users the exact value of an item but is
action requests. able to estimate it with
sufficient accuracy to violate
User-Defined Procedures the confidentiality of the data.
A user-defined procedures allow
the user to create a personal security Audit Objectives Relating to Database
program or routine to provide more Access
positive user identification than a Verify that database access authority
single password. and privileges are granted to users in
In addition to a password, the security accordance with their legitimate
procedure asks a series of personal needs.
questions (such as the users
mothers maiden name), which only Audit Procedures for Testing Database
the legitimate user should know. Access Controls
Data Encryption Responsibility for Authority Tables and
Database systems also use encryption Subschemas
procedures to protect highly sensitive Appropriate Access Authority
stored data, such as product formulas, Biometric Controls
personnel pay rates, password files Inference Controls
and certain financial data thus making Encryption Controls
it unreadable to an intruder
browsing the database.

Biometric Devices Backup controls ensure that in the event


The ultimate in user authentication of data loss due to unauthorized access,
procedures is the use of biometric equipment failure, or physical disaster the
devices, which measure various organization can recover its database.
personal characteristics, such as
fingerprints, voice prints, retina prints GPC Backup Technique
or signature characteristics. Grandparent-Parent- Child (GPC)
These user characteristics are Backup Technique is used in
digitized and stored permanently in a sequential file batch systems.
database security file or on an Two factors in determining the number
identification card that the user of backup master files needed for each
carries. application:
1. The financial significance of the
Inference Controls system
2. The degree of file activity
an automatic procedure that should be
Direct Access File Backup performed at least once a day.
Data values in direct access files are Transaction Log (Journal)
changed in place through a process The transaction log feature provides
called destructive replacement. an audit trail of all processed
The timing of the direct access backup transactions.
procedures will depend on the Checkpoint Feature
processing method being used. The checkpoint facility suspends all
data processing while the system
Off-Site Storage reconciles the transaction log and the
As an added safeguard, backup files database change log against the
created under both the GPC and direct database.
access approaches should be stored Recovery Module
off-site in a secure location. The recovery module uses the logs
and backup files to restart the system
Audit Objective Relating to Flat-File after a failure.
Backup
Verify that backup controls in place are Audit Objective Relating to Database
effective in protecting data files from Backup
physical damage, loss, accidental Verify that controls over the data
erasure, and data corruption through resource are sufficient to preserve the
system failures sand program errors. integrity and physical security of the
database.
Audit Procedures for Testing Flat-File
Backup Controls Audit Procedures for Testing Database
Sequential File (GPC) Backup Backup Controls
Backup Transaction Files The auditor should verify that backup
Direct Access File Backup is performed routinely and frequently
Off-Site Storage to facilitate the recovery of lost,
destroyed, or corrupted data without
Backup Controls in the Database excessive reprocessing.
Environment The auditor should verify that
Backup automatic backup procedures are in
The backup feature makes a periodic place and functioning, and that copies
backup of the entire database. This is of the database are stored off-site for
further security.

S-ar putea să vă placă și