Professional Documents
Culture Documents
*********
Data
Validation &
Security
Workforce Information
Database Training
Last update November 2006
Module 8
Data Validation & Security
Module 8
Data Validation & Security
Data Integrity
Module 8
Data Validation & Security
Data Validation
Module 8
Data Validation & Security
Module 8
Data Validation & Security
Illegal values
Violated attribute dependencies
Uniqueness violation
Referential integrity violation
Missing values
Misspellings
Cryptic values
Embedded values
Misfielded values
Module 8
Data Validation & Security
Word transpositions
Duplicate records
Contradicting records
Wrong references
Overlapping data/matching records
Name conflicts
Structural conflicts
Inconsistencies
Module 8
Data Validation & Security
Module 8
Data Validation & Security
Visual/manual
Aggregation
Reviewers guide
Auto data checks
Record counts
Spell checks
Have data provider review
Module 8
Data Validation & Security
Time to Exercise!!
Module 8
Data Validation & Security
Security Concerns:
Confidentiality
Integrity
Availability
Web security
Application
security
Production vs. test
User level
Physical security
(including backup
& restoration plan)
Network
permissions
RDBMS
ODBC
Network
(LAN/WAN)
security
Application
security
User level
Database security prevents unauthorized person(s) from viewing, destroying or altering data within the database.
Module 8
Data Validation & Security
Security Concerns:
Confidentiality
Integrity
Availability
Web security
Application
security
Production vs. test
User level
Physical security
(including backup
& restoration plan)
Network
permissions
RDBMS
ODBC
Network
(LAN/WAN)
security
Application
security
User level
Database security prevents unauthorized person(s) from viewing, destroying or altering data within the database.
Module 8
Data Validation & Security
Physical Security
Questions to ask yourself:
Where is your data actually stored?
Are you responsible for physical security?
If you are...
Module 8
Data Validation & Security
Physical Security
What physical security measures do you
have in place?
Do you have the right hardware?
Are you using obsolete hardware that is
prone to crashing or hacking? Do you
have a choice?
Module 8
Data Validation & Security
Physical Security
Do you have a database backup plan?
Do you have remote backup so if a fire
burns the building you dont lose both
your primary and backup data at the
same time?
Do you have a data restoration plan?
Does the backup plan allow for feasible
restoration?
Module 8
Data Validation & Security
Physical Security
Restoration Plan
Does your restoration plan allow for
the restoration of individual tables
or require the entire database?
Do you maintain copies of the tables
on your hard drive?
Module 8
Data Validation & Security
Physical Security
Who has access to the physical storage
location?
Is your database on a PC or server that
someone could easily kick, spill coffee
on, or accidentally reappropriate?
Module 8
Data Validation & Security
Security Concerns:
Confidentiality
Integrity
Availability
Web security
Application
security
Production vs. test
User level
Physical security
(including backup
& restoration plan)
Network
permissions
RDBMS
ODBC
Network
(LAN/WAN)
security
Application
security
User level
Database security prevents unauthorized person(s) from viewing, destroying or altering data within the database.
Module 8
Data Validation & Security
48%
Oracle
28%
Other
24%
Module 8
Data Validation & Security
Module 8
Data Validation & Security
Module 8
Data Validation & Security
Module 8
Data Validation & Security
Module 8
Data Validation & Security
iomatrix
stindprj
indprj
occprj
stoccprj
industry
oeswage
Module 8
Data Validation & Security
Module 8
Data Validation & Security
Module 8
Data Validation & Security
Security Concerns:
Confidentiality
Integrity
Availability
Web security
Application
security
Production vs. test
User level
Physical security
(including backup
& restoration plan)
Network
permissions
RDBMS
ODBC
Network
(LAN/WAN)
security
Application
security
User level
Database security prevents unauthorized person(s) from viewing, destroying or altering data within the database.
Module 8
Data Validation & Security
User Access
Three major types of user access:
PC - direct to database (ODBC or
RDBMS)
Network (LAN/WAN) through
application
Web (passive or active through
application)
Module 8
Data Validation & Security
Module 8
Data Validation & Security
Module 8
Data Validation & Security
Module 8
Data Validation & Security
Module 8
Data Validation & Security
Module 8
Data Validation & Security
Module 8
Data Validation & Security
Module 8
Data Validation & Security
Data Security
DISCUSSION