0% found this document useful (0 votes)
6 views45 pages

Lecture 8 Advanced Database Administration and Management

The document provides an in-depth overview of advanced database administration and management, covering critical topics such as database security, backup and recovery, performance tuning, data integration, and compliance with regulations. It is aimed at students with a foundational understanding of databases who wish to enhance their operational and strategic knowledge. Key areas include incident management, data migration strategies, and collaboration with other teams, along with emerging trends in database technologies.

Uploaded by

danskie0099
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views45 pages

Lecture 8 Advanced Database Administration and Management

The document provides an in-depth overview of advanced database administration and management, covering critical topics such as database security, backup and recovery, performance tuning, data integration, and compliance with regulations. It is aimed at students with a foundational understanding of databases who wish to enhance their operational and strategic knowledge. Key areas include incident management, data migration strategies, and collaboration with other teams, along with emerging trends in database technologies.

Uploaded by

danskie0099
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 45

ADVANCED

DATABASE
ADMINISTRATIO
N AND
MANAGEMENT Database Systems
through the years
K. A. SECUGAL
INTRODUCTION

This overarching topic covers all critical aspects of managing,


securing, optimizing, and maintaining a database system, as
well as integrating and migrating data, ensuring
compliance, and collaborating with other teams.

It is well-suited for students who already have a foundational


understanding of databases and are looking to deepen their
knowledge in the operational and strategic aspects of database
administration.
TOPICS
1. Database Security
2. Backup and Recovery 7. Emerging Trends and
Technologies
3. Performance Tuning and
Optimization 8. Database Maintenance
9. Incident Management
4. High Availability and
10. Data Migration
Replication
11. Collaboration with Other
5. Data Integration and ETL Teams
6. Database Compliance and
Regulations
1. Database
Security
• User Authentication and
Authorization: Techniques to ensure
only authorized users have access.

• Encryption: Methods to secure data


at rest and in transit.

• Database Auditing: Monitoring and


recording user activities to detect
unauthorized access.

• Vulnerability Assessment: Tools


and practices for identifying and
addressing database vulnerabilities.
VAPT: Vulnerability Assessment and
Penetration Testing (Types, Benefits and
Tools)
DISASTER

2.
BACKUP RECOVERY POINT-IN-TIME
STRATEGIES: PLANNING: STEPS RECOVERY:
FULL, TO ENSURE DATA TECHNIQUES TO
INCREMENTAL, RECOVERY IN CASE RESTORE

Backup
DIFFERENTIAL OF A DATABASES TO
BACKUPS, AND CATASTROPHIC A SPECIFIC
THEIR PROS AND FAILURE. POINT IN TIME.
CONS.

and
Recovery DATA ARCHIVING:
LONG-TERM DATA
STORAGE SOLUTIONS
AND THEIR
MANAGEMENT.
Aspect Backup Archiving
Purpose Data recovery after loss Long-term data
or failure preservation
Frequency Regular (daily, weekly, Periodic (monthly,
hourly) yearly)
Retention Period Short-term Long-term
Scope Entire systems (data, Historical or
files, apps) infrequently used data
Historical or Quick recovery to Not time-sensitive
infrequently used data minimize downtime
Storage Solutions Cloud, external Tape drives, cloud
drives, tapes archiving, specialized
storage solutions
Data State Current and active data Historical and inactive
data
Indexing Strategies: How and when
to use indexes for performance
improvement.

3. Query Optimization: Analyzing and


improving SQL query performance.
Performance
Tuning and Database Partitioning: Techniques to
split a large database into smaller, more
Optimization manageable pieces.

Resource Management: Managing


CPU, memory, and storage for optimal
performance.
Clustering: Setting up database
clusters for high availability.

4. High
Availabilit
Replication Techniques:
Synchronous vs. asynchronous
replication, and their use cases.

y and Load Balancing: Distributing


Replicatio database load across multiple
servers to ensure reliability.

n Failover Procedures: Automated


and manual failover processes for
minimizing downtime.
•Asynchronous replication writes
data to the primary storage array
first and then copies data to the
replica. Synchronous replication
simultaneously writes data to two
systems instead of one.
5. Data Integration and ETL

ETL Processes: Extract, Transform, Load operations and


tools.

Data Warehousing: Design and management of data


warehouses.

Data Quality Management: Ensuring the accuracy,


consistency, and reliability of data.
PLAY THE
VIDEO
PLEASE
https://www.google.com/search?
sca_esv=7b51d33765497002&sca_upv=1&rlz=1C1CHWL_enPH935PH935&q=data+
warehousing+examples+in+real+world&source=lnms&uds=ADvngMgVf5xlBlhio3zzK
Tlbu9ZroGiXywDs38SejT2djeRVMC80dao_CIjJQu_1hs26uXnoolftC2gld6xYThau7kKMpTJ
IxhtvxELPGlZIYO4mSidLUi3B1EKPH83Rg99gMr5ULWMWEEjvLwH94Tqiq0oQRA95u93r5
oBQktW9jgVEBZRW901x695whsGjtxE18ivpZh9YpMMitJ4F0Owv38rXgr-tCrdDe0Jmf-
O5XrUW_NjTBaJvyGJ4HlH1ezuRldvN_elEf7nJSUS1HdDl05GAAddjtsDNwJvKqIEypdRy3et
Yz9Migrqo6znuY1bBO45g7sdy-
prCewbuyORm0cUtBLJ8sGjxdFWHPoq91Ea42RCz9UA&sa=X&ved=2ahUKEwjA9byitsiG
AxVLzDgGHaGuJVgQ0pQJegQIERAB&biw=1536&bih=729&dpr=2.5#fpstate=ive&vld
=cid:8c6815e0,vid:h7-PMFXUi7U,st:0
6. Database Compliance and
Regulations
• GDPR, HIPAA, and other Regulations: Understanding and
implementing database compliance.

• Data Masking and Anonymization: Techniques to protect


sensitive information.

• Audit Trails: Keeping detailed logs for compliance


purposes.
• GDPR is the acronym for General Data Protection
Regulation.
• HIPAA is the acronym for the Health Insurance
Portability and Accountability Ac

The GDPR governs the use of and applies to all personal


data of the persons that fall within its scope, while HIPAA
having a much narrower scope, only applies to HIPAA
protected health information (PHI).
7. Emerging Trends and
Technologies
• NoSQL Databases: Overview and use cases for non-
relational databases.
• Cloud Databases: Managing databases in the cloud,
including AWS, Azure, and Google Cloud.
• Big Data Solutions: Integrating and managing big data
technologies like Hadoop and Spark.
• Database as a Service (DBaaS): Understanding the
benefits and challenges of DBaaS.
CLOUD DATABASES
RANKING
BY
LINKEDIN
8. Database
Maintenance
• Routine Maintenance Tasks: Regular
activities to ensure database health.
• Automation of Maintenance: Using
scripts and tools to automate routine
tasks.
• Monitoring and Alerts: Setting up
monitoring tools and alerts for proactive
database management.
• Capacity Planning: Planning for future
growth and scaling.
PLAY
ANOTHER
VIDEO
9. Incident Management
• Troubleshooting Techniques: Identifying
and resolving database issues.
• Incident Response Plans: Developing and
implementing plans to handle database
incidents.
• Root Cause Analysis: Techniques for
determining the underlying causes of
database issues.
Data Migration Strategies: Approaches for
migrating data between databases or
systems.

Data Mapping and Transformation: Ensuring


data is correctly mapped and transformed
during migration.

10. Data Testing and Validation: Techniques for


ensuring data integrity and accuracy post-

Migration migration.

Tools and Technologies: Overview of tools


available for data migration tasks.

Risk Management: Identifying and mitigating


risks during data migration.
Common Problems:
• Data Loss: Strategies to prevent and recover from data
loss.
• Downtime: Minimizing downtime during migration to
avoid business disruption.
• Compatibility Issues: Handling schema and data type
mismatches.
• Performance Degradation: Ensuring the new system
performs optimally after migration.
PLAY ME!
11. Collaboration with Other Teams

Working with Developers: Best practices for collaboration


with application development teams.

Cross-Department Coordination: Ensuring smooth


database operations across different departments.

User Training and Support: Educating users on best


practices and providing support for database-related
issues.
TAPAT…
LONG
QUIZ, GET
½
Long quiz – 5 points each
1. Discuss the importance of database security in modern
organizations. Highlight the various techniques used for
user authentication, authorization, and data encryption.
Provide examples of how a security breach can impact an
organization.
2. What is backup and archiving, and why are they
important?
3. What is data migration, and how crucial is it, What is
the most crucial part?
4. List 3 important aspects of database management.
References
• Title: "Database Administration: The Complete Guide to
DBA Practices and Procedures"Author: Craig S. Mullins
• Title: "Database Security: What Is It and Why It
Matters"Source: IBM
• Title: "Database Management Essentials"Platform:
Coursera (offered by the University of Colorado System)
• Title: "Top 10 Database Performance Tuning Tips"Source:
SolarWinds
• Title: "Designing Data-Intensive Applications"Author:
Martin Kleppmann
THE AES
🔐 What is AES?

• AES stands for Advanced Encryption Standard.


It is a symmetric encryption algorithm widely used
to secure digital data.
📌 Key Features of AES:

Feature Description
Symmetric-key (same key for encryption and
🔑 Type
decryption)
🔢 Key Sizes 128, 192, or 256 bits
🔒 Block Size 128 bits (data is processed in 128-bit blocks)
Fast and efficient — good for encrypting large
⚡ Speed
amounts of data
Adopted by the U.S. government in 2001 to replace
🌍 Standard
DES (Data Encryption Standard)
🔁 Deterministic Same input + same key = same output every time
•🔧 How AES Works (Simplified)
•Input: Plaintext (e.g., a password)
•Encryption key: A secret key (e.g., 'mySecretKey')
•AES Algorithm: Transforms the plaintext into unreadable ciphertext
•Decryption: Uses the same key to transform ciphertext back to the original text
•🧪 Example:
•If you encrypt "hello" using AES with the key "1234567890abcdef":
•Encrypted: 0xA1B2C3D4E5F67890... (binary/hex blob)
•Decrypted (with the same key): "hello"
Why Use AES?

It's very secure — used by banks,


governments, and big tech companies.

AES-256 is strong enough for military-


grade encryption.

It's built into MariaDB, MySQL, PHP,


Java, Python, etc.
Sample syntax:
• INSERT INTO tbl_address VALUES
(3, AES_ENCRYPT('lottila','mykey'), 'district
1', 'sibalom', 'antique’)

AES encrypt
SELECT AES_ENCRYPT('mytext', 'mykeystring’);
INSERT INTO testtable VALUE(AES_ENCRYPT('mytext','passw’));
AES decrypt
SELECT description, AES_DECRYPT(description,'passw')
•FROM testtable;

You might also like