06_16 DBA & Security Flashcards
A set of instructions generated at application compilation time that is created and managed by a DBMS
access plan
The access plan predetermines how an application’s query will access the database at run time.
A data dictionary that is automatically updated by the database management system every time the database is accessed, thereby keeping its information current.
active data dictionary
A security feature of a DBMS that automatically records a brief description of the database operations performed by all users.
audit log
A computer-aided software tool that provides support for the coding and implementation phases of the SDLC.
back-end CASE tool
Activities that meet data privacy and security reporting guidelines or requirements.
compliance
Tools used to automate part or all of the SDLC.
computer-aided systems engineering (CASE)
A backup that takes place while one or more users are working on a database.
concurrent backup
In the context of data security…
Ensuring that data is protected against unauthorized access, and if the data is accessed by an authorized user, that the data is used only for an authorized purpose.
confidentiality
The person responsible for managing the entire data resource.
Whether it is computerized or not.
data administrator (DA)
or
information resource manager (IRM)
The DA has broader authority and responsibility than the DBA.
A comprehensive approach to ensuring the accuracy, validity, and timeliness of data.
data quality
The person responsible for planning, organizing, controlling, and monitoring the centralized and shared corporate database.
database administrator (DBA)
The DBA is the GM of the database administration department.
A complete copy of an entire database saved and periodically updated in a separate memory location.
full backup
or
database dump
A full backup ensures a full recovery of all data after a physical disaster or database integrity failure.
In an Oracle DBMS,
The collection of processes and data structures used to manage a specific database.
database instance
The use of DBMS features and other related measures to comply with the security requirements of an organization.
database security
The person responsible for the security, integrity, backup, recovery of the database.
database secuirty officer (DSO)
A file on the hard drive or storage system where the data in a tablespace is physically stored.
datafile
Programs that analyze data and metadata to determine patterns that can help assess data quality.
data profiling software
Data that contain inaccuracies and/or inconsistencies.
dirty data
The set of DBA activities dedicated to securing data availability following a physical disaster or a database integrity failure.
disaster management
The overall company data representation which proviides support for present and expected future needs.
enterprise database
A computer-aided software tool that provides support for the planning, analysis, and design phases of the SDLC.
front-end CASE tool
A process that only backs up data that has changed in the database since the last incremental or full backup.
incremental backup
A methodology that translates a company’s strategic goals into helpful data and applications.
information engineering (IE)
IE focuses on the description of corporate data instead of the processes.
A department responsible for all information technology services and production functions in an organization.
information systems (IS) department
The output of the IE process that serves as the basis for planning, developing, and controlling future ISs.
information systems architecture (ISA)
In a data security framework,
Keeping data consistent and free of errors or anomalies.
integrity
See also data integrity.
In business intelligence,
A collection of concepts, techniques, and processes for the proper identification, definition, and management of data elements within an organization.
master data management (MDM)
A DBMS data dictionary that requires a command initiated by an end user to update its data access statistics.
passive data dictionary
General statement of direction that is used to manage company operations through the communication and support of the organization’s objectives.
policy
The rights of individuals and organizations to determine access to data about themselves.
privacy
Series of steps to be followed during the performance of an activity or process.
procedure
In Oracle,
A named collection of settings that controls how much of the database resource a given user can use.
profile
In Oracle,
A named collection of database access privileges that authorize a user to connect to a database and use its system resources.
role
Activities and measures to ensure the CIA of an IS and its main asset, data.
security
An event in which a security threat is exploited to endanger the CIA of the system.
security breach
A collection of standards, policies, and procedures created to guarantee the security of a system and ensure auditing and compliance.
security policy
An imminent security violation that could occur due to unchecked security vulnerabilities.
security threat
A detailed and specific set of instructions that describes the minimum requirements for a given activity.
standard
Standards are used to evaluate the quality of the output.
The person responsible for coordinating and performing day-to-day data-processing activities.
systems administrator
In a DBMS,
A logical storage space used to group related data.
tablespace
or
file group
In a system,
A uniquely identifiable object that allows a given person or process to log on to the database.
user