(Notes) Chapter 4 - Auditing Database Systems
(Notes) Chapter 4 - Auditing Database Systems
Flat File
Note:
- used in older (legacy) systems
- characterized by private ownership of data
- cause of several problems that inhibit data integration
- resolved through data sharing and centralized control of data
Data Redundancy: flat-file approach demands that different groups of users make copies of
essentially the same data/document
Database Approach
- Characterized by the use of DBMS
- Resolves the traditional problems of flat-file environments
Database Management System (DBMS): special software that is programmed to know which
data elements each user is authorized to access.
- solution for the problems of a flat-file environment
- characterized by data sharing
Database
Data Definition Language (DDL): programming language used to define the database to the
DBMS
- Has three levels, called views: (1) physical internal view, (2) conceptual view or schema,
and (3) user view or subschema
Database Views
1. Internal/Physical View: lowest level of representation, describes the structure of data
records, links between files, and physical arrangement of records in a file
2. Conceptual/Logical View: describes the entire database, represents the database
logically and abstractly
3. External/User View: defines the user’s section of the database
Users
Data Manipulation Language (DML): the proprietary programming language that a particular
DBMS uses to retrieve, process, and store data. Entire user programs may be written in the
DML or, alternatively, selected DML commands can be inserted into programs that are written in
universal languages, such as JAVA, C++, and even older languages such as COBOL and
FORTRAN.
DBMS Operation:
1. User sends request for data to DBMS
2. DBMS analyzes request by matching data elements with user and conceptual views
3. DBMS determines data structure parameters from internal view and passes them to
OS
4. The OS interacts with the disk to retrieve data
5. OS stores data in main memory buffer
6. DBMS transfers data to user’s work location in main memory
7. After completion, steps 4-6 are reversed to restore processed data to the database
Structured Query Language or SQL: query language that allows users to input, retrieve, and
modify data easily
Data Dictionary: describes every data element in the database. This enables all users (and
programmers) to share a common view of the data resource, thus greatly facilitating the analysis
of user needs.
Note:
- Important function of a DBA
Data Structures: brick and mortar of a database, allows records to be located, stored, and
retrieved.
Data Organization: refers to the way records are physically arranged on the secondary storage
device, may either be sequential or random
Data Access Method: the technique used to locate records and to navigate through the
database
Database Terminology:
1. Data Attribute or Field - a single item of data
2. Entity - database representation of an individual resource, event, or agent
3. Record Type (Table or File) - data attributes that are grouped together, which logically
define an entity
4. Database - set of record types that an organization needs to support its business
processes
5. Associations - relationships between record types
a. One-to-one
b. One-to-many
c. Many-to-many
Navigational Databases:
1. Hierarchical
2. Network
Note:
- called navigational because of explicit links among their data elements
- characterized their structure and inflexibility
- used in late-era legacy systems, still in use today
Hierarchical Model:
- Most popular example is IBM’s IMS
- Characterized by parent and child relationships
- Files at the same level are called siblings
- Entire structure is called tree structure
- Highest level in the segment is the root segment, while the lowest is the leaf.
Network Model
- An ANSI committee created CODASYL or Committee on Development of Applied
Symbolic Languages
- Most popular example is IDMS or Integrated Data Management System by Cullinet
Software
- Distinguished from Hierarchical by allowing a child record to have more than one parents
Relational Model:
Note:
- Principles are initially proposed by E.F. Codd, with foundations in relational algebra and
set theory
- used in newer accounting information systems
- presents data in two-dimensional format, which is easy for end users to understand and
work with
- supports entity-wide data integration when properly implemented
- Relations are formed by attributes common to both tables
Third Section: Database Technology in Distributed Environment
Temporary inconsistency: values are incorrectly stated during the execution of a transaction
Database lockout: a software control (by the DBMS) that prevents multiple simultaneous
access to data
Partitioned Database Approach: splits the central database into segments or partitions that
are distributed to their primary users
Advantages:
- Increase users’ control by having data stored at local sites
- Improve TPS time
- Reduce potential effects of a disaster
Deadlock Phenomenon: In a distributed environment, it is possible for multiple sites to lock out
each other from the database, thus preventing each from processing its transactions.
- Deadlock: a permanent condition that must be resolved by special software that
analyzes each deadlock condition to determine the best solution
- Deadlock Resolution: usually involves terminating one or more transactions to
complete processing of the other transactions in the deadlock. Thereafter, preempted
transactions have to be re-initiated. Factors: (1) resources in the transaction, (2)
transaction’s stage of completion, and (3) number of deadlocks
Replicated Databases: effective in companies where there exists a high degree of data sharing
but no primary user. Since common data is replicated at each IT unit site, the data traffic
between sites is reduced considerably.
Concurrency Control: mechanism of enforcing the presence of complete and accurate data at
all user sites. A commonly used method is serialization of transactions.
Fourth (Final) Section: Control and Audit Issues of Data Management
Audit Objective on Database Access: verify that database access authority and privileges are
granted to users in accordance with their legitimate needs.
Backup Controls: ensure that in the event of data loss due to unauthorized access, equipment
failure, or physical disaster the organization can recover its database.
Audit Objective related to Flat-File Backup Controls: verify that backup controls in place are
effective in protecting data files from physical damage, loss, accidental erasure, and data
corruption through system failures and program errors.
Audit Objective related to Database Backup: verify that controls over data resources are
sufficient to preserve integrity and physical security of the database.