Database Administration Strategies
Essay by kirk1970 • May 3, 2013 • Research Paper • 924 Words (4 Pages) • 1,421 Views
Database Administration Strategies
Executive Summary
Smith Consulting is in need of a secure and efficient tracking system. The database being used to track data must be efficient, responsive, and easily modifiable for optimal categorization. A physical design of the database will be implemented accompanied by a diagram and strategic plan. Security of the database will be taken into consideration by implementing automated security utilities and tools. Proper assigning of privileges and access will also ensure optimal security and performance. By implementing the proposed database design, Smith Consulting will be able to track data and ensure future success.
Database Administration Strategies
The general administration strategies involved in implementing a client project tracking system include designing architecture, creating a physical design diagram, outlining performance and security, and developing a cost-benefit analysis. Before beginning these stages, it is important to understand the project goals and deliverables. The client project tracking system and its deliverables consist of the following:
* Design a user friendly interface
* Incorporate relational tracking
* Eliminate data redundancies
* Ability to retrieve user defined reports
* Ability to retrieve reports with predetermined variables
* Instantly retrieve complete data
* Enables all appropriate staff to search and share data
In addition to managing the projects deliverables, other administrative duties will include server installation, server maintenance, monitoring and security, setting up backup/restore options, performance tuning, and advanced management. Due to the importance of client data and management, strict access control will be enforced and managed by appropriate personnel.
To provide reliable and efficient service, the client tracking system will incorporate current and compatible hardware in addition to custom reporting. Although the systems biggest asset will be returning any type of user-defined data in a quick manner, the system will increase efficiency by including a custom reporting utility designed specifically for end users. This utility will allow the user to sort, filter, and save predetermined fields that will be available for future use.
Performance and Security
Specify the security measures that will be of most benefit to Smith System Consulting:
The starting point for any security strategy is to guarantee that security ethics and guidelines are in place to protect the system from outside attacks and unauthorized inside usage. Securing computer assets, applications, and associated data is an essential part of securing an enterprise. Securing a system includes applying a set of procedures, practices, and technologies to protect the information technology (IT) structure as well as software and related data throughout the organization.
It is important to recognize that you can design many security barriers to prevent unapproved users from getting into the network. However, it is still possible that someone will get through. Using network encryption safeguards that if they do get through, they still cannot read the data they find. Some of the key encryption strategies that should be well-thought-out are S/MIME, Digital Certificates, Authenticode
...
...