7/23/2019 07312006DataValidSecurityRev.ppt
1/37
Module 8*********
DataValidation &
SecurityWorkforce Information
Database TrainingLast update November 2006
7/23/2019 07312006DataValidSecurityRev.ppt
2/37
Providing Accurate Data Consistently
Data validation allows us to provide data
with confidence in its accuracy, and wecan consistently provide this data byimplementing thorough security
Module 8
Data Validation & Security
7/23/2019 07312006DataValidSecurityRev.ppt
3/37
Data Integrity!alidity, consistency, and accuracy ofthe data in a database
Table"level#ield"level$elationship"level
%usiness $ules
Module 8
Data Validation & Security
7/23/2019 07312006DataValidSecurityRev.ppt
4/37
Module 8
Data Validation & Security
Data !alidationThe process of determining if anupdate to a value in a table&s data cell
is within a preestablished range or is amember of a set of allowable values
7/23/2019 07312006DataValidSecurityRev.ppt
5/37
What are some common data'uality problems that affect
data integrity and validation(
Module 8
Data Validation & Security
7/23/2019 07312006DataValidSecurityRev.ppt
6/37
Common Data )uality Problems
Illegal values
!iolated attribute dependencies *ni'ueness violation $eferential integrity violation +issing values
+isspellings Cryptic values mbedded values +isfielded values
Module 8
Data Validation & Security
7/23/2019 07312006DataValidSecurityRev.ppt
7/37
Common Data )uality Problemscontinued-
Word transpositions Duplicate records Contradicting records Wrong references .verlapping data/matching records 0ame conflicts 1tructural conflicts
Inconsistencies
Module 8
Data Validation & Security
7/23/2019 07312006DataValidSecurityRev.ppt
8/37
What are some methods forchecking for data validity(
Module 8
Data Validation & Security
7/23/2019 07312006DataValidSecurityRev.ppt
9/37
+ethods for checkingfor data validity
!isual/manual Aggregation $eviewers guide Auto data checks $ecord counts 1pell checks 2ave data provider review
Module 8
Data Validation & Security
7/23/2019 07312006DataValidSecurityRev.ppt
10/37
Time to 3ercise44
Module 8
Data Validation & Security
7/23/2019 07312006DataValidSecurityRev.ppt
11/37
7/23/2019 07312006DataValidSecurityRev.ppt
12/37
Network
permissions
Physical security
(including backup& restoration plan)
Data Storage Access
(Server or PC)Websecurity
Application
securityUserlevel
ALMIS atabase Security !onsiderations
Database security prevents unauthorized person(s) from vieing! destroying or altering data ithin the database"
Security Concerns#
!on"identialityIntegrity
Availability
UserlevelUserlevel
Application
security#$MS%$!
Suppression "lagsata aggregation issues
$etor%
(&A$'WA$)
security
'e contact in my state is
*roduction vs+ test *roduction vs+ test
Module 8
Data Validation & Security
7/23/2019 07312006DataValidSecurityRev.ppt
13/37
Network
permissions
Physical security
(including backup& restoration plan)
Data Storage Access
(Server or PC)Websecurity
Application
securityUserlevel
ALMIS atabase Security !onsiderations
Database security prevents unauthorized person(s) from vieing! destroying or altering data ithin the database"
Security Concerns#
!on"identialityIntegrity
Availability
UserlevelUserlevel
Application
security#$MS%$!
Suppression "lagsata aggregation issues
$etor%
(&A$'WA$)
security
'e contact in my state is
*roduction vs+ test *roduction vs+ test
Module 8
Data Validation & Security
7/23/2019 07312006DataValidSecurityRev.ppt
14/37
Physical 1ecurity
)uestions to ask yourself5
Where is your data actually stored(
Are you responsible for physical security(
If you are...
Module 8
Data Validation & Security
7/23/2019 07312006DataValidSecurityRev.ppt
15/37
Physical 1ecurity
What physical security measures do you
have in place(
Do you have the right hardware(
Are you using obsolete hardware that isprone to crashing or hacking( Do youhave a choice(
Module 8
Data Validation & Security
7/23/2019 07312006DataValidSecurityRev.ppt
16/37
Physical 1ecurity
Do you have a database backup plan(
Do you have remote backup so if a fireburns the building you don&t lose bothyour primary and backup data at the
same time(
Do you have a data restoration plan(Does the backup plan allow for feasible
restoration(
Module 8
Data Validation & Security
7/23/2019 07312006DataValidSecurityRev.ppt
17/37
Physical 1ecurity
$estoration Plan
Does your restoration plan allow forthe restoration of individual tablesor re'uire the entire database(
Do you maintain copies of the tableson your hard drive(
Module 8
Data Validation & Security
7/23/2019 07312006DataValidSecurityRev.ppt
18/37
Physical 1ecurity
Who has access to the physical storagelocation(
Is your database on a PC or server thatsomeone could easily kick, spill coffeeon, or accidentally reappropriate(
If you are not responsible for physicalIf you are not responsible for physical
security, ask these 'uestions of thosesecurity, ask these 'uestions of those
who are4who are4
Module 8
Data Validation & Security
7/23/2019 07312006DataValidSecurityRev.ppt
19/37
Network
permissions
Physical security
(including backup& restoration plan)
Data Storage Access
(Server or PC)Websecurity
Application
securityUserlevel
ALMIS atabase Security !onsiderations
Database security prevents unauthorized person(s) from vieing! destroying or altering data ithin the database"
Security Concerns#
!on"identialityIntegrity
Availability
UserlevelUserlevel
Application
security#$MS%$!
Suppression "lagsata aggregation issues
$etor%
(&A$'WA$)
security
'e contact in my state is
*roduction vs+ test *roduction vs+ test
Module 8
Data Validation & Security
7/23/2019 07312006DataValidSecurityRev.ppt
20/37
Data 1torage Access
What software are you using to store the
database(
1)6 1erver, .racle, #o3Pro, Access(
1urvey says51)6 1erver 789
.racle :89
.ther :79
Module 8
Data Validation & Security
7/23/2019 07312006DataValidSecurityRev.ppt
21/37
Data 1torage Access
What can be done at the server level to
provide for security(
Confidentiality, Integrity, Availability
DO apply advanced security to the mostsensitive data, but DONT applyadvanced security to non-sensitive data
Module 8
Data Validation & Security
7/23/2019 07312006DataValidSecurityRev.ppt
22/37
Data 1torage Access
1ecurity at the server and/or databaselevel-
Permissions
What kind of permissions e3ist(
$ead only, 1A, etc
Who sets those permissions(
Who has those permissions(
Module 8
Data Validation & Security
7/23/2019 07312006DataValidSecurityRev.ppt
23/37
A6+I1 Database 1ecurity
1ecurity at the data level-
1uppression
1uppression flags
1uppression can be handled at the
database level or the application level
Module 8
Data Validation & Security
7/23/2019 07312006DataValidSecurityRev.ppt
24/37
A6+I1 Database Data 1ecurity
Two approaches5
; A6+I1 Database contains 0. confidentialdata
7/23/2019 07312006DataValidSecurityRev.ppt
25/37
A6+I1 Database 1ecurity
Tables that have suppression flags
ces
indprj
industry
iomatrix
occprj
oesa!e
stindprj
stoccprj
0.T5 tablesstfirmsand a!ehave nosuppression flags but may contain confidential data
Module 8
Data Validation & Security
7/23/2019 07312006DataValidSecurityRev.ppt
26/37
A6+I1 Database Data 1ecurity
Issues to consider regarding suppression5
If your database doesn&t containsuppressed records, detailed data won&taggregate to totals
7/23/2019 07312006DataValidSecurityRev.ppt
27/37
A6+I1 Database Data 1ecurity
A note on confidential data5
If you are checking :>: data
7/23/2019 07312006DataValidSecurityRev.ppt
28/37
Network
permissions
Physical security
(including backup& restoration plan)
Data Storage Access
(Server or PC)Websecurity
Application
securityUserlevel
ALMIS atabase Security !onsiderations
Database security prevents unauthorized person(s) from vieing! destroying or altering data ithin the database"
Security Concerns#
!on"identialityIntegrity
Availability
UserlevelUserlevel
Application
security#$MS%$!
Suppression "lagsata aggregation issues
$etor%
(&A$'WA$)
security
'e contact in my state is
*roduction vs+ test *roduction vs+ test
Module 8
Data Validation & Security
7/23/2019 07312006DataValidSecurityRev.ppt
29/37
*ser Access
Three ma?or types of user access5
PC " direct to database
7/23/2019 07312006DataValidSecurityRev.ppt
30/37
*ser Access via the Web
2ow do Web users access the data from thedatabase(
"assive #static tables automaticallyupdated to eb pa!es$
%ctive #&uery throu!h application$
Module 8
Data Validation & Security
7/23/2019 07312006DataValidSecurityRev.ppt
31/37
*ser Access via the Web
)uestions to ask yourself5
What kind of web server are you using(What are the security considerations withthat choice(
What kind of firewall do you have(
Module 8
Data Validation & Security
7/23/2019 07312006DataValidSecurityRev.ppt
32/37
*ser Access via the Web
Does your web interface havesecurity/confidentiality suppression(
Do you display suppressed data to certainusers( If so, how is access managed(Passwords( IP address(
Module 8
Data Validation & Security
7/23/2019 07312006DataValidSecurityRev.ppt
33/37
*ser Access via a 0etwork
7/23/2019 07312006DataValidSecurityRev.ppt
34/37
*ser Access via a 0etwork
7/23/2019 07312006DataValidSecurityRev.ppt
35/37
*ser Access via direct connection
)uestions to ask yourself5
Is local access machine passwordprotected(
Who has access to your machine(
Is there a backup plan for your accessmachine(
Is the source data for your database
secure( %ackup plan( $estorable(
Module 8
Data Validation & Security
7/23/2019 07312006DataValidSecurityRev.ppt
36/37
A6+I1 Database Data 1ecurity
Documentation
It may prove beneficial to keep detailedrecords on-
2ow security is done Where security e3ists Who is responsible for security Who has access/permissions to what tc
Module 8
Data Validation & Security
7/23/2019 07312006DataValidSecurityRev.ppt
37/37
Data 1ecurityDI1C*11I.0
Module 8
Data Validation & Security