Database Reference
In-Depth Information
9. Security : A number of security levels exist in a multiple-user inter-
face: network, platform, and data. Security levels are based on user
requirements both internal and external to applications (e.g., data-
bases). To help implement security access levels, a review process
should be established.
Network security pertains to the different levels of security
throughout the computer network and with firewall(s) management.
Platform security relates directly to access privileges according to
the platform(s) you are operating on (e.g., IBM, DG, Prime, PCs,
and associated operating systems). Here is where the issue of data
access restrictions appear—normally set by the system administra-
tor. Because data security is application specific, data stewards must
determine the ownership requirements, and DBAs must then imple-
ment the requirements (e.g., RWE [read, write, execute], RW, or R
access).
10. Metadata : Metadata management requires proper documentation
throughout the life cycle of any data set. Technically, metadata is
data about data. Although similar, data dictionaries do not apply to
this definition.
11. Training : Appropriate training is imperative for those collecting data,
those entering data, those designing database(s), and certainly for those
persons involved in the data management process. A certification pro-
cesses for some roles can be very valuable to ensure that consistent,
sound, and accurate data is being collected and entered into the corpo-
rate database.
GUIDELINES
These guidelines are intended to provide a guide in the evaluation, selec-
tion, design, construction, and implementation of a data warehouse.
Guideline 1: Information is valued as an asset, which must be capable
of being shared.
1. A policy pertaining to information stewardship will have to be
developed. This entails determining responsibility for accuracy,
Search WWH ::




Custom Search