Diagram a distributed database environment in Microsoft Visio. Include the following in your diagram:-A production database-A data warehouse-Two data marts -Security and maintenance elements annotated







Eric Case

DAT 380

April 15, 2019

Individual: Database Operations and Data Recovery









Security and Maintenance Component for an Object-Oriented Database

A database model is a vital component of an information system that determines the manner through which information is logically stored in a system and how it is retrieved, manipulated and organized. The search for a database that is standardized, secure and responsive is a longstanding pedagogic pursuit in Information System scholarly. Protecting data from attacks is an important factor while considering the design and implementation of a database, because there is no system that is not immune to attack. This paper highlights and defines the necessary security and maintenance component for the object-oriented database as developed in the Dream home case study data needs. In addition, it defines the data replication model.

Object-Oriented Database

This type of database uses the object programming language to create object databases that overcome the challenge of converting information based on their representation such as tables and their definite representation in program application. This problem is also known as relational-object impedance incompatibility. Object-oriented databases utilize special SQL query language mainly because common programming language lacks the capacity to identify objects.

Security and Maintenance Components

Database security involves the use of information security control to protect data stored in a database and the database itself including the database servers. There are numerous risks that database is vulnerable to. Security measures that are needed protect against challenges such as overhead, unauthorized access to the confidential and privileged account, malware infection, and physical damage, design flow and loss of data due to corruption.

Security and maintenance strategies can broadly be divided into technological, administrative and physical. Technological components include layering of privileges. They are two broad categories of privileges mainly object privileges and system privileges. Window active directories are one of the software components that can enhance authorization and authentication protocols that define the sets of system and object privileges.

The second form of security and maintenance needed for the object-oriented database as presented in the Dream Home case study is real-time database monitoring software. The database also needs to be actively monitored to ensure that the system is safe and normal. Window has an inbuilt set of programs that can aid in analyzing logs and traffic to establish whether a system is compromised or not. They are also several software agents that can be used to analyze SQL or protocol traffic. Several databases, including the object-oriented database also come with native audit applications that can also be used to continuously monitor a database for signs of attacks. In addition, to the measures, it is also important to ensure that the system is protected by updated anti-malware software, and correct patching work and design of software is ensured. Finally, physical security measures are needed such as barriers to ensure that the servers are protected from physical risks.

Data Replication or Retrieval

Even though all measures are taken to protect a database system, it should never be forgotten that there is no system or database that is immune from attack. The fact that the dream home database hosts sensitive and confidential information, it is a lucrative target for cybercriminals. It is hence important for the organization to apprehend best practices for retrieval of data once compromised. Data replication should be done at the level of cloud technologies as well as through the management of a data center to remotely host the data for the company. Constant back up of the data should also be done daily and confidential information downloaded into external hard disks.