1 / 71

Data Management Technologies

Data Management Technologies. Ohm Sornil Department of Computer Science National Institute of Development Administration. Information Architecture. Web-Survey System. Survey Creation. Create New Questions. Create Question (Multi-choice). Multi-choice Question. Create Question (Matrix).

Télécharger la présentation

Data Management Technologies

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Data Management Technologies Ohm Sornil Department of Computer Science National Institute of Development Administration

  2. Information Architecture

  3. Web-Survey System

  4. Survey Creation

  5. Create New Questions

  6. Create Question (Multi-choice)

  7. Multi-choice Question

  8. Create Question (Matrix)

  9. Matrix Question

  10. Databases • is a structured collection of records or data that is stored in a computer so that a computer program can consult it to answer queries • The computer program used to manage and query a database is known as a database management system (DBMS).

  11. Database Design and E-R Diagram

  12. SQL • It is the standard language for relational systems • Supports • Data definition • CREATE TABLE, ALTER TABLE • Data manipulation • SELECT, INSERT, DELETE, UPDATE

  13. Business Intelligence (BI) • Make use of enterprise-wide data to enable strategic decision making

  14. Data Warehousing • A database • is designed and optimized) to record • Using complex SQL queries takes a lot of time on such a system • A data warehouse • is designed (and optimized) to respond to analysis questions that are critical for your business (i.e., read-optimized)

  15. E-R Diagram (DB Data Model) Dimension Model (DW Data Model)

  16. Data Warehousing • Separate from application databases ensure that business intelligence (BI) solution is scalable • Answer questions far more efficiently and frequently • Reduces the 'cost-per-analysis'

  17. Other sources Extract Transform Load Operational DBs Multi-Tiered Architecture OLAP Server Analysis Query Reports Data mining Serve Data Warehouse Data Sources Data Storage OLAP Engine Front-End Tools

  18. A Data Warehouse • is a subject-oriented, integrated, time-variant, non-updatable collection of data used in support of management decision-making processes (W.H. Inmon, 1980)

  19. Data Warehouse Implementation • Dimension modeling • Extraction • Transformation • Data Quality • Loading

  20. Extraction, Transformation, Loading (ETL)

  21. Extraction Issues

  22. Transformation Issues • Format Revisions • Decoding of Fields • Calculated and Derived Values • Splitting of Single Fields • Merging of Information • Character Set Conversion • Conversion of Units of Measurements • Date/Time Conversion • Summarization • Key Restructuring • Deduplication

  23. Loading Issues • Initial Load: populating all the data warehouse tables for the very first time • Incremental Load: applying ongoing changes as necessary in a periodic manner • Full Refresh: completely erasing the contents of one or more tables and reloading with fresh data (initial load is a refresh of all the tables)

  24. Loading Issues (Paulraj Ponniah, 2001)

  25. Data Quality • Accuracy • Domain Integrity • Consistency • Redundancy • Conformance to Business Rules • Structural Definiteness • Data Anomaly • Clarity • Timely • Usefulness

  26. OLAP • Is a category of software technology that enables analysts, managers and executives to gain insight into data through fast, consistent, interactive access in a wide variety of possible views of information that has been transformed from raw data to reflect the real dimensionality of the enterprise as understood by the user (The OLAP council)

  27. Multidimensional Concept

  28. A Multidimensional View

  29. OLAP Tool

  30. OLAP Tool

  31. Thought Process and OLAP

  32. Another OLAP Session

  33. Computer Security • Processes and technologies that ensure confidentiality, integrity, and availability (CIA) of information-system assets • Assets • Hardware, software, firmware, and information being processed, stored, and communicated

  34. How Are Computers and Networks Attacked? • Take advantages of vulnerabilities inside operating systems, applications, protocols, communication channels, and human

  35. Motivations of Attackers • Money • Entertainment • Entrance to social groups/status • Cause/malice Source: Kilger M., Arkin O. and Stutzman J., Profiling. In The honeynet project know your enemy: learning about security threats (second edition). Boston: Addison, 2004.

  36. Internal Security Attacks • Far greater cost per occurrence and total potential cost than attacks from outside • Employees, ex-employees, contractors and business partners • Trust and physical access • Motives • Challenge/curiosity • Revenge • Financial gain Source: Kristin Gallina Lovejoy (April 2006) http://www.csoonline.com/read/040106/caveat041206_pf.html

  37. Common Internal Attacks • Sabotage of information or systems • Theft of information or computing assets • Introduction of bad code: time bombs or logic bombs • Viruses • Installation of unauthorized software or hardware • Manipulation of protocol design flaws • Manipulation of operating system design flaws • Social engineering Source: Kristin Gallina Lovejoy (April 2006) http://www.csoonline.com/read/040106/caveat041206_pf.html

  38. Attacking Phases

  39. IPP Printer Overflow Attack

  40. IPP Printer Overflow Attack

  41. IPP Printer Overflow Attack

  42. Malicious Programs

  43. Virus Structure

  44. Compression Viruses

  45. Inherent Technology Weaknesses • Many of these problems can be traced back to weaknesses in the technology • Hackers have exploited many vulnerabilities found in network protocols • For example (TCP/IP) • Inability to verify the identity of communicating parties • Inability to protect the privacy of data on a network • Some products also have inherent security weaknesses (because not all product developers make security a design priority)

  46. Configuration Weaknesses • Insecure user accounts (such as guest logins or expired user accounts) • System accounts with widely known default, unchanged passwords • Misconfigured Internet services • Insecure default settings within products

  47. Policy Weaknesses • Policy is a set of rules by which we operate computer systems • Generally include • Physical access controls • Logical access controls • Security administration • Security monitoring and audit • Software and hardware change management • Disaster recovery and backup • Business continuity • No single solution should be viewed as providing all the protection you need

More Related