Tag Archives: databases

Introduction to Database Processing and Information

Database processing is one of the most important courses in the information systems curriculum. There are several reasons for this. First, databases can store large volumes of corporate operational data. Such databases become the heart of many transaction processing applications, such as order entry, inventory control, and general ledger accounting. Due to the advantages of database systems over file processing systems, many companies have converted (or are converting) their older file processing systems to database systems. Second, databases can be queried on an ad hoc basis, making them the foundation for decision-support systems (DSS). Data stored in a database can be readily accessed and processed. Consequently, users can get answers to their questions much faster if the data is stored in a database than they would if it were stored in files. Further, database query languages allow users to be more self-sufficient. Users often obtain answers to their questions without the assistance of an information systems professional. Third, databases can be implemented on computers of all sizes, making them feasible for almost any business or organization. Thus, the likelihood that you will employ database processing during your information systems or business career is almost certain. But perhaps the most fundamental reason for studying database technology is that it facilitates the production of information.

Information

The word information comes from the Latin word informare, which means “to build form” or “to give structure.” Information systems build structures from data by processing it to reveal patterns, trends, and tendencies. These patterns, trends, and so forth are the information that users need in order to perform their jobs. If we did not derive information from the huge volumes of facts we store in our computers (the data), then users would be overwhelmed with details, floundering about to find the knowledge they need. They would drown in a sea of facts. People strive to make order in their world. Think about the first time you endured the add/drop process during class registration (or the first time you went to an airport, or the first time you did anything new). If your college is like most, the room was large, hot, noisy, and chaotic. People were moving all around you and you didn’t know quite what to do. Probably your anxiety level was high as you tried to make any meaning out of the scene before you. Unconsciously, you gathered data through sight and sound, related this data to prior knowledge (such as knowing how people line up and wait their turns or take numbers and wait to be called), compared this new data to your goal (dropping a course, for example), and decided on a course of action (to get into the line marked “DROP COURSE”). The key element in this scenario is the processing of your perceptions. As you gathered data by examining the room, you built patterns and structures in your mind and tried to relate them to structures you already had. You looked for clues in people’s behavior. You might have asked somebody for help. If so, your plea was a request for information. You wanted someone who had already processed the scene and built patterns and structures to tell you what they were. As you gained information about the add/drop process, your uncertainty decreased. When you entered the room, you did not even know in which direction to turn. Once you knew which line to join, you became more sure of yourself. Information reduced your uncertainty. Computer systems provide a similar function for users. One of the main reasons for information systems is to reduce the user’s uncertainty.

Introduction to Database Processing and Information

Database processing is one of the most important courses in the information systems curriculum. There are several reasons for this. First, databases can store large volumes of corporate operational data. Such databases become the heart of many transaction processing applications, such as order entry, inventory control, and general ledger accounting. Due to the advantages of database systems over file processing systems, many companies have converted (or are converting) their older file processing systems to database systems. Second, databases can be queried on an ad hoc basis, making them the foundation for decision-support systems (DSS). Data stored in a database can be readily accessed and processed. Consequently, users can get answers to their questions much faster if the data is stored in a database than they would if it were stored in files. Further, database query languages allow users to be more self-sufficient. Users often obtain answers to their questions without the assistance of an information systems professional. Third, databases can be implemented on computers of all sizes, making them feasible for almost any business or organization. Thus, the likelihood that you will employ database processing during your information systems or business career is almost certain. But perhaps the most fundamental reason for studying database technology is that it facilitates the production of information.

Information

The word information comes from the Latin word informare, which means “to build form” or “to give structure.” Information systems build structures from data by processing it to reveal patterns, trends, and tendencies. These patterns, trends, and so forth are the information that users need in order to perform their jobs. If we did not derive information from the huge volumes of facts we store in our computers (the data), then users would be overwhelmed with details, floundering about to find the knowledge they need. They would drown in a sea of facts. People strive to make order in their world. Think about the first time you endured the add/drop process during class registration (or the first time you went to an airport, or the first time you did anything new). If your college is like most, the room was large, hot, noisy, and chaotic. People were moving all around you and you didn’t know quite what to do. Probably your anxiety level was high as you tried to make any meaning out of the scene before you. Unconsciously, you gathered data through sight and sound, related this data to prior knowledge (such as knowing how people line up and wait their turns or take numbers and wait to be called), compared this new data to your goal (dropping a course, for example), and decided on a course of action (to get into the line marked “DROP COURSE”). The key element in this scenario is the processing of your perceptions. As you gathered data by examining the room, you built patterns and structures in your mind and tried to relate them to structures you already had. You looked for clues in people’s behavior. You might have asked somebody for help. If so, your plea was a request for information. You wanted someone who had already processed the scene and built patterns and structures to tell you what they were. As you gained information about the add/drop process, your uncertainty decreased. When you entered the room, you did not even know in which direction to turn. Once you knew which line to join, you became more sure of yourself. Information reduced your uncertainty. Computer systems provide a similar function for users. One of the main reasons for information systems is to reduce the user’s uncertainty.

Effective database activity monitoring (Page 1 of 2)

There are a number of reasons for organisations to deploy Database Activity Monitoring or DAM solutions, which can range anywhere from compliance to cover overall security.

DAM is a data centre technology, which monitors how the data that is stored in core databases and file servers is being accessed; it works on analyzing access behaviour to detect data breaches, if any; and takes action accordingly to mitigate them.

Various rules and regulations, compliance laws, etc also are increasingly forcing organisations to tighten their control over sensitive data they store, and have a verifiable audit trail that can be signed off, if required, by the appropriate organisational executives.

Database Activity Monitoring Architecture

Different DAM vendors have different ways of tracking activities in a database and therefore implementation of architecture is also slightly different.

A DAM with single appliance or single server architecture provides 1-to-1 mapping of a database server with a monitoring appliance; thus it acts both as a sensor and a collector of appropriate data. DAM with this configuration is good for a small database; however, for larger databases it might not be enough effective. Then there is DAM with 2-tier architecture, consisting of a centralised management server; this server collects information from a set of remote sensors or collection points. With this architecture there is a better degree of system scalability.

DAM with hierarchical architecture builds further onto the 2-tier architecture; this system is best suited for larger organizations; these DAMs are capable of supporting a larger number of sensors and collectors, distributed across a large enterprise.

Advanced Database Activity Monitoring Techniques

The process through which all SQL traffic to a database is monitored is called Network monitoring. Network monitoring allows monitoring multiple databases simultaneously; all the commands that are sent across to databases under scrutiny, are kept track of. The activities of users that are logged directly into the server via a local console are not recorded. Performance of a database is not affected by network monitoring, as no overhead is placed over the database directly.

In remote monitoring, a SQL collector is placed on the database with administrative privileges; the native database auditing is also enabled. The collector aggregates all activity collected by the auditing tools. This type of monitoring imposes an overhead on the database as logging is enabled on the database server, causing it to work more. The advantage of remote monitoring is that all database activities are collected, including that of a user who is logged directly into the server.

One can install local agents on each database that is being monitored, but it is not necessary that they would be successful in detecting all database activity; it would depend on how these agents have been configured, and how much closer to the database they are allowed to sit.