Lecture 8 Advanced Database Administration and Management
Lecture 8 Advanced Database Administration and Management
DATABASE
ADMINISTRATIO
N AND
MANAGEMENT Database Systems
through the years
K. A. SECUGAL
INTRODUCTION
2.
BACKUP RECOVERY POINT-IN-TIME
STRATEGIES: PLANNING: STEPS RECOVERY:
FULL, TO ENSURE DATA TECHNIQUES TO
INCREMENTAL, RECOVERY IN CASE RESTORE
Backup
DIFFERENTIAL OF A DATABASES TO
BACKUPS, AND CATASTROPHIC A SPECIFIC
THEIR PROS AND FAILURE. POINT IN TIME.
CONS.
and
Recovery DATA ARCHIVING:
LONG-TERM DATA
STORAGE SOLUTIONS
AND THEIR
MANAGEMENT.
Aspect Backup Archiving
Purpose Data recovery after loss Long-term data
or failure preservation
Frequency Regular (daily, weekly, Periodic (monthly,
hourly) yearly)
Retention Period Short-term Long-term
Scope Entire systems (data, Historical or
files, apps) infrequently used data
Historical or Quick recovery to Not time-sensitive
infrequently used data minimize downtime
Storage Solutions Cloud, external Tape drives, cloud
drives, tapes archiving, specialized
storage solutions
Data State Current and active data Historical and inactive
data
Indexing Strategies: How and when
to use indexes for performance
improvement.
4. High
Availabilit
Replication Techniques:
Synchronous vs. asynchronous
replication, and their use cases.
Migration migration.
Feature Description
Symmetric-key (same key for encryption and
🔑 Type
decryption)
🔢 Key Sizes 128, 192, or 256 bits
🔒 Block Size 128 bits (data is processed in 128-bit blocks)
Fast and efficient — good for encrypting large
⚡ Speed
amounts of data
Adopted by the U.S. government in 2001 to replace
🌍 Standard
DES (Data Encryption Standard)
🔁 Deterministic Same input + same key = same output every time
•🔧 How AES Works (Simplified)
•Input: Plaintext (e.g., a password)
•Encryption key: A secret key (e.g., 'mySecretKey')
•AES Algorithm: Transforms the plaintext into unreadable ciphertext
•Decryption: Uses the same key to transform ciphertext back to the original text
•🧪 Example:
•If you encrypt "hello" using AES with the key "1234567890abcdef":
•Encrypted: 0xA1B2C3D4E5F67890... (binary/hex blob)
•Decrypted (with the same key): "hello"
Why Use AES?
AES encrypt
SELECT AES_ENCRYPT('mytext', 'mykeystring’);
INSERT INTO testtable VALUE(AES_ENCRYPT('mytext','passw’));
AES decrypt
SELECT description, AES_DECRYPT(description,'passw')
•FROM testtable;