DEVELOPMENT OF DATABASE FOR EXPERT SYSTEMS OF INFORMATION SECURITY AUDITING
|
|
|
- Ashlie Morris
- 9 years ago
- Views:
Transcription
1 Computer Modelling and New Technologies, 2011, Vol.15, No.4, Transport and Telecommunication Institute, Lomonosov 1, LV-1019, Riga, Latvia DEVELOPMENT OF DATABASE FOR EXPERT SYSTEMS OF INFORMATION SECURITY AUDITING A. Bekezhanova 1, L. Atymtayeva 2 1 Kazakh-British Technical University Department of Computer Engineering Tole bi 59, , Almaty, Kazakhstan [email protected] 2 Kazakh-British Technical University Department of Computer Engineering Tole bi 59, , Almaty, Kazakhstan [email protected] In this era of high technology, the information is involved in almost every aspect of human lives. Due to rapid growth of information technologies, came the need for increasing the security of information. Information security auditing plays key role in providing any organization s good security level. But, the security of information technologies is one of the difficult and comprehensive systems. The main problem lies in the data organization, collection and its processing methods. One of the solutions could be development of expert system that will reduce cost, speed up and facilitate the process of Information Security auditing. The valuable item in developing such system could be database development. This paper presents the study of information security at international and national standards and guidelines for the management of IT, audit and IT-security (such as ISO 27001, COBIT 4.1 and ITIL V3) and the structure of database for expert systems of information security auditing. Keywords: information security, information security auditing, standards for auditing information security, expert systems, database, UML, Transact-SQL 1. Introduction The main goal of this study is based on the development of database of expert system, which will be fully audited information security and will be guided by the information that underlies the international standards ISO 27001, COBIT 4.1 and ITIL V3 [1]. Figure 1. The structure of providing information security via standards/frameworks 52
2 The best global practices in the field of information security management are described in international standards that ensure compliance, assurance and audit of information security (see Fig. 1). We have also developed software implementation of database for expert systems of information security auditing in the language of queries Transact-SQL with the use of tool for developing relational database Microsoft SQL Server 2005 Management Studio Express. 2. Information Security Auditing Firstly, let us focus your attention on the main concepts of information security. Information security is defined by the absence of unacceptable risk of information leakage via technical channels, unauthorized and unintended effects on the data and other resources used in information systems (IS) [8]. Secondly, we should define the main characteristics of the audit of information security. An audit is an independent examination of specific areas of organizational functioning. The objectives of the safety audit are [5]: - The risk analysis; - The assess the current level of protection of IS; - The IS assessment of conformity with existing standards of Information Security; - To develop recommendations for security mechanisms for IS. For a professional approach to the issues of information security we should be guided by the regulating documents, such as standards. During the development of database for Expert Systems of information security auditing (ESISA) addressed the following international information security standards, such as ISO 27001, ITIL V3 and COBIT 4.1. ISO was developed by the International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC). ISO consists of 11 targets and monitoring mechanisms, which organize the protection of their information resources by establishing requirements for information security management system (ISMS). On the basis of ITIL V3 laid process approach, consisting of seven volumes. It focuses on achieving business goals, analysing key performance indicators, as well as the resources expended to achieve those goals. COBIT 4.1 consists of 34 high-level processes, which are aimed at business managers, IT managers and owners of business processes [7]. This approach is designed to extract maximum benefit from the use of information technology in organizations. 3. The Structure of the Expert Systems of Information Security Auditing Expert System (ES) is an intellectual computer program that can give advice, counsel and analysis. The use of ES in the control and security management IS, and in the information security audit can facilitate the process of auditing [2]. The developed ES generates a report and recommendations based on the standards of information security and experts opinions. Go to the dignity of the ES also attribute to the possibility to describe the experience of information security professionals in a form accessible to the analysis of the rules If (condition) Then (Corollary). The structure ESISA consists of: a user interface, subsystem explanations, inference systems, the knowledge base and database. Structural elements of the expert system perform the following functions: The user interface exists for direct interaction between ESISA and user, such as data entry and displays the results of the processed data. The subsystem of explanations exists to clarify for the users the actions of the expert systems logic. The data from subsystem of explanations stored in database table Recommendation. The system of logical inference (SLI) carries a substitution of values from the database in the field of parcel If (condition) of the rules knowledge base and in the case of filling in all the parcels are ready to activate the processing rules, forming a conclusion in accordance with part Then (Investigation) regulations [6]. In the developing system SLI executes an application that created the language of logic programming Fril. Knowledge Base (KB) is the core of the expert system. In the developing ES knowledge base is the main decision-making tool, the basic structure, which takes into account international experience and documents on the safety audit of IS, such as ISO 27001, ITIL V3 and the COBIT
3 The relationship between the standards shown in Table 1, a fragment of which is shown below. Table1 is the source of the work [3]. Table 1. There are a few questions from the established knowledge base, which is focused on the three categories of users: Govern G, Admin A, User U (Table 2). Table 2. Question Category Security Policy 1 How often do changes/additions to the security policy in your company? А 2 Have an occasion to inform outside parties documented information security policy of your company? G Resource management 3 Is there an inventory of all the important resources in your company? G,А,U 4 Does your company support an inventory of all critical resources? G,А 4. Development of Database The database is a collection of organized data, stored in a computer memory. For creating, maintaining and sharing databases between many users used the set language and software tools, called a database management system (DBMS). DBMS supports various methods of logical organization of data. The best-known data models are hierarchical, network and relational models. To develop ESISA database has been used a relational model. The basic concepts of relational databases are the normalization, keys, entities and relationships. The principles of normalization [4]: Each database table must not include repeated fields; Each table must have a unique identifier (primary key); Each primary key value must match the sufficient information about the type or nature of the object table; Change the values in the table should not affect the information in other fields. Keys: The key is a column or multiple columns to be added to the table and allow establishing a connection with the records in another table. There are two types of keys: primary and secondary. The primary key is used to relate a table to foreign keys in other tables. A foreign key indicates how to join with other tables. There are many types of relation, such as of one-to-one, one-to-many and many-to-many. In the design process of ESISA determined the structure of a relational database, which contains 14 tables. Each table in DB consists of columns, data types, sizes and keys of table: 54
4 - ISO, - ITIL, - COBIT, - Category, - Questionnaire, - Test, - Report, - Recommendation, - TesterReport, - Tester, - Expert, - Govern, - Admin, - Users. For creating a database used development tools such as the Star UML and MS SQL StarUML is a software modelling tool that supports the Unified Modelling Language (UML). Below are given the relationships between data tables in a database of association, direct association, generalization and composition in the development environment StarUML (Fig. 2). Figure 2. Model DB for ESISA in StarUML Microsoft SQL Server is a DBMS developed by Microsoft. The primary query language used here is Transact-SQL. The advantage of SQL Server 2005 is the manageability, availability, scalability and security [4]. Let s consider the main points of application and work environment in MS SQL Server First of all, for creating a database in MS SQL we use the operator to create a database: CREATE DATABASE databasename; 55
5 Then, the following queries are executed for creating tables and primary keys, which are defined for each table (queries for some tables are illustrated in the work area MS SQL Server 2005) (Fig. 3): Figure 3. Queries for some DB tables in MS SQL Server 2005 The last step is filling tables with user s data. In MS SQL Server 2005 data filling is made through queries or manual entry of information. 5. Conclusions This article focuses on the development of database for expert systems of information security auditing. The result of research is developed review and analysis of information security in accordance with international standards and guidelines for the management of IT, audit and IT-security, such as ISO27001, COBIT 4.1 and ITIL V3. Together, these standards contain requirements for information security for the creation, development and maintenance of information security management system. The knowledge base for ESISA was created on the basis of the best international practices in the management of information security. It includes questions about the security of information and presented in the form of a questionnaire, the relevant standards of ISO27001, COBIT 4.1 and ITIL V3. Structure of the database was designed on the Unified Modeling Language in the development environment StarUML. Software implementation is made in the queries language Transact-SQL with the use of Relational Database Management MS SQL Server Database tables have been designed according to knowledge base for ESISA. Let us note that nowadays in Kazakhstan the research is conducted towards the development and implementation of expert system in security auditing. This framework of project named as Development of intelligent systems for management and auditing of information security is being financed by Ministry of education and science of Republic of Kazakhstan for years. In conclusion, we would like to note that the research results can be used in conjunction with the developing expert system in the auditing companies and any organizations interested in the proper functioning of safety systems. 56
6 References Computer Modelling 1. Atymtayeva, L., Akzhalova, A., Kozhakhmet, K., Naizabayeva, L. (2011). Development of Intelligent Systems for Information Security Auditing and Management: Review and Assumptions Analysis. In Proceedings of the 5 th International Conference on Application of Information and Communication Technologies, October, 2011 (pp.87 91). Baku, Azerbaijan: Qafqaz University. 2. Giarratano, J.C., Riley, G.D. (2004). Expert Systems: Principles and Programming, 4 th ed. Course Technology. Boston: PWS Publ. Co. 3. Appendix III Mapping Cobi T 4.1 Control Objectives and ITIL V3 with ISO/IEC In Gary Hardy, Jimmy Heschl, Jim Clinch (Eds.), A Management Briefing From ITGI and OGC (pp ). Rolling Meadows, IL USA: IT Governance Institute. 4. Vieira, R. (2007). Professional SQL Server 2005 programming. USA, Hoboken, New Jersey: Wiley Publishing, Inc. 5. Clinch, J. ITIL V3 and Information Security. Clinch consulting (pp ). Retrieved May, 2009, from 6. Safonov, V. O. (1992). Expert systems intelligent advisors of human experts. St. Petersburg: Knowledge Publishers. (In Russian) 7. Cobit4.0 The newest evolution of control objectives for information and related technology. The world s leading IT control and Governance framework (2007). IT Governance Institute Kiountouzis, E. A., Kokolakos, S.A. (1996). An analyst's view of IS security. In Sokratis Katsikas & Dimitris Gritzalis (Eds.), Information systems security: facing the information society of the 21 st century, IFIP SEC '96 Conference (pp ). London: Chapman & Hall, Ltd. Received on the 21 st of December
ANALYSIS OF WEB-BASED APPLICATIONS FOR EXPERT SYSTEM
Computer Modelling and New Technologies, 2011, Vol.15, No.4, 41 45 Transport and Telecommunication Institute, Lomonosov 1, LV-1019, Riga, Latvia ANALYSIS OF WEB-BASED APPLICATIONS FOR EXPERT SYSTEM N.
Foundations of Business Intelligence: Databases and Information Management
Chapter 5 Foundations of Business Intelligence: Databases and Information Management 5.1 Copyright 2011 Pearson Education, Inc. Student Learning Objectives How does a relational database organize data,
5.5 Copyright 2011 Pearson Education, Inc. publishing as Prentice Hall. Figure 5-2
Class Announcements TIM 50 - Business Information Systems Lecture 15 Database Assignment 2 posted Due Tuesday 5/26 UC Santa Cruz May 19, 2015 Database: Collection of related files containing records on
Databases and Information Management
Databases and Information Management Reading: Laudon & Laudon chapter 5 Additional Reading: Brien & Marakas chapter 3-4 COMP 5131 1 Outline Database Approach to Data Management Database Management Systems
TIM 50 - Business Information Systems
TIM 50 - Business Information Systems Lecture 15 UC Santa Cruz March 1, 2015 The Database Approach to Data Management Database: Collection of related files containing records on people, places, or things.
Microsoft. Course 20463C: Implementing a Data Warehouse with Microsoft SQL Server
Course 20463C: Implementing a Data Warehouse with Microsoft SQL Server Length : 5 Days Audience(s) : IT Professionals Level : 300 Technology : Microsoft SQL Server 2014 Delivery Method : Instructor-led
Implement a Data Warehouse with Microsoft SQL Server 20463C; 5 days
Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Implement a Data Warehouse with Microsoft SQL Server 20463C; 5 days Course
Benchmark of controls over IT activities. 2011 Report. ABC Ltd
www.pwc.com/cy Benchmark of controls over IT activities 2011 Report ABC Ltd... 2012 Scope and approach We wish to provide you with our IT Benchmarking report over IT activities at ABC Ltd (the Company)
Implementing a Data Warehouse with Microsoft SQL Server
This course describes how to implement a data warehouse platform to support a BI solution. Students will learn how to create a data warehouse 2014, implement ETL with SQL Server Integration Services, and
COURSE 20463C: IMPLEMENTING A DATA WAREHOUSE WITH MICROSOFT SQL SERVER
Page 1 of 8 ABOUT THIS COURSE This 5 day course describes how to implement a data warehouse platform to support a BI solution. Students will learn how to create a data warehouse with Microsoft SQL Server
Implementing a Data Warehouse with Microsoft SQL Server
Page 1 of 7 Overview This course describes how to implement a data warehouse platform to support a BI solution. Students will learn how to create a data warehouse with Microsoft SQL 2014, implement ETL
Physical Database Design Process. Physical Database Design Process. Major Inputs to Physical Database. Components of Physical Database Design
Physical Database Design Process Physical Database Design Process The last stage of the database design process. A process of mapping the logical database structure developed in previous stages into internal
Implementing a Data Warehouse with Microsoft SQL Server
Course Code: M20463 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Implementing a Data Warehouse with Microsoft SQL Server Overview This course describes how to implement a data warehouse platform
Implementing a Data Warehouse with Microsoft SQL Server MOC 20463
Implementing a Data Warehouse with Microsoft SQL Server MOC 20463 Course Outline Module 1: Introduction to Data Warehousing This module provides an introduction to the key components of a data warehousing
COURSE OUTLINE MOC 20463: IMPLEMENTING A DATA WAREHOUSE WITH MICROSOFT SQL SERVER
COURSE OUTLINE MOC 20463: IMPLEMENTING A DATA WAREHOUSE WITH MICROSOFT SQL SERVER MODULE 1: INTRODUCTION TO DATA WAREHOUSING This module provides an introduction to the key components of a data warehousing
Release: 1. ICADBS412A Build a database
Release: 1 ICADBS412A Build a database ICADBS412A Build a database Modification History Release Release 1 Comments This Unit first released with ICA11 Information and Communications Technology Training
Implementing a Data Warehouse with Microsoft SQL Server
CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! Course 20463 Implementing a Data Warehouse with Microsoft SQL Server Length: 5 Days Audience: IT Professionals
Data Model s Role in DaaS...3. The SQL Azure Use Case...4. Best Practices and Guidelines...5
Introduction..... 3 Data Model s Role in DaaS....3 The SQL Azure Use Case.......4 Best Practices and Guidelines.......5 Conclusion...... 9 Glossary.....9 References.....10 About the Author.....10 PAGE
Release: 1. ICADBS601A Build a data warehouse
Release: 1 ICADBS601A Build a data warehouse ICADBS601A Build a data warehouse Modification History Release Release 1 Comments This Unit first released with ICA11 Information and Communications Technology
Implementing a Data Warehouse with Microsoft SQL Server 2012 (70-463)
Implementing a Data Warehouse with Microsoft SQL Server 2012 (70-463) Course Description Data warehousing is a solution organizations use to centralize business data for reporting and analysis. This five-day
Data Gathering Instrument Service Portfolio Management
Data Gathering Instrument Service Portfolio Management Information Technology Services Strategy Case studies in Nicaraguan municipal governments ALP (provisionally hidden) PhD Student National University
GOVERNING INFORMATION SECURITY IN CONJUNCTION WITH COBIT AND ISO 27001
1 GOVERNING INFORMATION SECURITY IN CONJUNCTION WITH COBIT AND ISO 27001 Tolga MATARACIOGLU 1 and Sevgi OZKAN 2 1 TUBITAK National Research Institute of Electronics and Cryptology (UEKAE), Department of
Course 10777A: Implementing a Data Warehouse with Microsoft SQL Server 2012
Course 10777A: Implementing a Data Warehouse with Microsoft SQL Server 2012 OVERVIEW About this Course Data warehousing is a solution organizations use to centralize business data for reporting and analysis.
Implementing a Data Warehouse with Microsoft SQL Server 2012
Course 10777A: Implementing a Data Warehouse with Microsoft SQL Server 2012 Length: Audience(s): 5 Days Level: 200 IT Professionals Technology: Microsoft SQL Server 2012 Type: Delivery Method: Course Instructor-led
Course 20463:Implementing a Data Warehouse with Microsoft SQL Server
Course 20463:Implementing a Data Warehouse with Microsoft SQL Server Type:Course Audience(s):IT Professionals Technology:Microsoft SQL Server Level:300 This Revision:C Delivery method: Instructor-led (classroom)
MS 20467: Designing Business Intelligence Solutions with Microsoft SQL Server 2012
MS 20467: Designing Business Intelligence Solutions with Microsoft SQL Server 2012 Description: This five-day instructor-led course teaches students how to design and implement a BI infrastructure. The
Foundations of Business Intelligence: Databases and Information Management
Foundations of Business Intelligence: Databases and Information Management Content Problems of managing data resources in a traditional file environment Capabilities and value of a database management
Introduction to Computing. Lectured by: Dr. Pham Tran Vu [email protected]
Introduction to Computing Lectured by: Dr. Pham Tran Vu [email protected] Databases The Hierarchy of Data Keys and Attributes The Traditional Approach To Data Management Database A collection of
Implementing a Data Warehouse with Microsoft SQL Server 2012
Course 10777 : Implementing a Data Warehouse with Microsoft SQL Server 2012 Page 1 of 8 Implementing a Data Warehouse with Microsoft SQL Server 2012 Course 10777: 4 days; Instructor-Led Introduction Data
Beta: Implementing a Data Warehouse with Microsoft SQL Server 2012
CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! Course 10777: Beta: Implementing a Data Warehouse with Microsoft SQL Server 2012 Length: 5 Days Audience:
The CMDB at the Center of the Universe
The CMDB at the Center of the Universe Reg Harbeck CA Wednesday, February 27 Session 5331 Purpose Clarify origin of CMDB concept and what it is Understand difference and equivalence between CMDB and Asset
Course 103402 MIS. Foundations of Business Intelligence
Oman College of Management and Technology Course 103402 MIS Topic 5 Foundations of Business Intelligence CS/MIS Department Organizing Data in a Traditional File Environment File organization concepts Database:
Database Management. Technology Briefing. Modern organizations are said to be drowning in data but starving for information p.
Technology Briefing Database Management Modern organizations are said to be drowning in data but starving for information p. 509 TB3-1 Learning Objectives TB3-2 Learning Objectives TB3-3 Database Management
This three-day instructor-led course provides existing SQL Server database professionals with the knowledge
Course 40008A: Updating your Database Skills to Microsoft SQL Server 2012 OVERVIEW About this Course This three-day instructor-led course provides existing SQL Server database professionals with the knowledge
APPLICATION OF INFORMATION TECHNOLOGY SERVICE MANAGEMENT WITHIN SELECTED LOGISTICS AND TRANSPORT SERVICES
Proceedings of the 13 th International Conference Reliability and Statistics in Transportation and Communication (RelStat 13), 16 19 October 2013, Riga, Latvia, p. 363 369. ISBN 978-9984-818-58-0 Transport
Updating your Database skills to Microsoft SQL Server 2012
Page 1 of 5 Overview Who should attend? This three-day instructor-led course provides existing SQL Server database professionals with the knowledge and skills to use new and enhanced capabilities in SQL.
n Assignment 4 n Due Thursday 2/19 n Business paper draft n Due Tuesday 2/24 n Database Assignment 2 posted n Due Thursday 2/26
Class Announcements TIM 50 - Business Information Systems Lecture 14 Instructor: John Musacchio UC Santa Cruz n Assignment 4 n Due Thursday 2/19 n Business paper draft n Due Tuesday 2/24 n Database Assignment
1. INTRODUCTION TO RDBMS
Oracle For Beginners Page: 1 1. INTRODUCTION TO RDBMS What is DBMS? Data Models Relational database management system (RDBMS) Relational Algebra Structured query language (SQL) What Is DBMS? Data is one
MS 10977B Upgrading Your SQL Server Skills to Microsoft SQL Server 2014
MS 10977B Upgrading Your SQL Server Skills to Microsoft SQL Server 2014 Description: Days: 5 Prerequisites: This five-day instructor-led course teaches students how to use the enhancements and new features
How To Migrate Qi Analyst To A New Database On A Microsoft Access 7.2.2 (Windows) From A New Version Of Qi.Io To A Newer Version Of A New Qi 8.0 (Windows 7.3
Tech Note 915 Migrating QI Analyst Databases from Access to SQL All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty of any kind. See the Terms of Use for more
Implementing a Data Warehouse with Microsoft SQL Server 2012 MOC 10777
Implementing a Data Warehouse with Microsoft SQL Server 2012 MOC 10777 Course Outline Module 1: Introduction to Data Warehousing This module provides an introduction to the key components of a data warehousing
For Sales Kathy Hall 402-963-4466 [email protected]
IT4E Schedule 13939 Gold Circle Omaha NE 68144 402-431-5432 Course Number 10777 For Sales Chris Reynolds 402-963-4465 [email protected] www.it4e.com For Sales Kathy Hall 402-963-4466 [email protected] Course
Foundations of Business Intelligence: Databases and Information Management
Chapter 6 Foundations of Business Intelligence: Databases and Information Management 6.1 2010 by Prentice Hall LEARNING OBJECTIVES Describe how the problems of managing data resources in a traditional
MS 20465: Designing Database Solutions for Microsoft SQL Server 2012
MS 20465: Designing Database Solutions for Microsoft SQL Server 2012 Description: This course describes how to design and monitor high performance, highly available data solutions with SQL Server 2012.
Designing Business Intelligence Solutions with Microsoft SQL Server 2012 Course 20467A; 5 Days
Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Designing Business Intelligence Solutions with Microsoft SQL Server 2012
Planning the Installation and Installing SQL Server
Chapter 2 Planning the Installation and Installing SQL Server In This Chapter c SQL Server Editions c Planning Phase c Installing SQL Server 22 Microsoft SQL Server 2012: A Beginner s Guide This chapter
AN OVERVIEW OF INFORMATION SECURITY STANDARDS
AN OVERVIEW OF INFORMATION SECURITY STANDARDS February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced
Chapter 6 FOUNDATIONS OF BUSINESS INTELLIGENCE: DATABASES AND INFORMATION MANAGEMENT Learning Objectives
Chapter 6 FOUNDATIONS OF BUSINESS INTELLIGENCE: DATABASES AND INFORMATION MANAGEMENT Learning Objectives Describe how the problems of managing data resources in a traditional file environment are solved
Implementing a Data Warehouse with Microsoft SQL Server 2014
Implementing a Data Warehouse with Microsoft SQL Server 2014 MOC 20463 Duración: 25 horas Introducción This course describes how to implement a data warehouse platform to support a BI solution. Students
Prognoz Payment System Data Analysis. Description of the solution
Description of the solution Prognoz, 2015 Content 1. Goals and Tasks. 3 2. Proposed Architecture... 4 3. Functionality... 5 3.1 Payment system operation analysis... 5 3.2 Cash flow monitoring and analysis
ISO 27000 Information Security Management Systems Foundation
ISO 27000 Information Security Management Systems Foundation Professional Certifications Sample Questions Sample Questions 1. is one of the industry standards/best practices in Service Management and Quality
Establish and maintain Center of Excellence (CoE) around Data Architecture
Senior BI Data Architect - Bensenville, IL The Company s Information Management Team is comprised of highly technical resources with diverse backgrounds in data warehouse development & support, business
Business Intelligence: Effective Decision Making
Business Intelligence: Effective Decision Making Bellevue College Linda Rumans IT Instructor, Business Division Bellevue College [email protected] Current Status What do I do??? How do I increase
Turning Data into Knowledge: Creating and Implementing a Meta Data Strategy
EWSolutions Turning Data into Knowledge: Creating and Implementing a Meta Data Strategy Anne Marie Smith, Ph.D. Director of Education, Principal Consultant [email protected] PG 392 2004 Enterprise
Migrating QI 8.0 Admin and Process Databases from Microsoft Access to Microsoft SQL Server
Tech Note 915 Migrating QI Analyst Databases from Access to SQL All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty of any kind. See the Terms of Use for more
Data. Data and database. Aniel Nieves-González. Fall 2015
Data and database Aniel Nieves-González Fall 2015 Data I In the context of information systems, the following definitions are important: 1 Data refers simply to raw facts, i.e., facts obtained by measuring
Linking BPMN, ArchiMate, and BWW: Perfect Match for Complete and Lawful Business Process Models?
Linking BPMN, ArchiMate, and BWW: Perfect Match for Complete and Lawful Business Process Models? Ludmila Penicina Institute of Applied Computer Systems, Riga Technical University, 1 Kalku, Riga, LV-1658,
East Asia Network Sdn Bhd
Course: Analyzing, Designing, and Implementing a Data Warehouse with Microsoft SQL Server 2014 Elements of this syllabus may be change to cater to the participants background & knowledge. This course describes
Microsoft SQL Server: MS-10980 Performance Tuning and Optimization Digital
coursemonster.com/us Microsoft SQL Server: MS-10980 Performance Tuning and Optimization Digital View training dates» Overview This course is designed to give the right amount of Internals knowledge and
SQM. Maintaining Microsoft SQL for Broadcast Engineers. Training Course Outline
SQM Maintaining Microsoft SQL for Broadcast Engineers Training Course Outline 2015 Marcangelo Limited Copyright 2015 www.marcangelo.co.uk SQM : Duration: 2 Days Maintaining Microsoft SQL for Broadcast
BUILDING OLAP TOOLS OVER LARGE DATABASES
BUILDING OLAP TOOLS OVER LARGE DATABASES Rui Oliveira, Jorge Bernardino ISEC Instituto Superior de Engenharia de Coimbra, Polytechnic Institute of Coimbra Quinta da Nora, Rua Pedro Nunes, P-3030-199 Coimbra,
ITIL's IT Service Lifecycle - The Five New Silos of IT
The workable, practical guide to Do IT Yourself Vol. 4.01 January 1, 2008 ITIL's IT Service Lifecycle - The Five New Silos of IT By Rick Lemieux In my last article I spoke about IT s evolution from its
THE USE OF INFORMATION TECHNOLOGIES IN BA SCHOOL OF BUSINESS AND FINANCE INNER WEB PORTAL
INNOVATIVE INFOTECHNOLOGIES FOR SCIENCE, BUSINESS AND EDUCATION THE USE OF INFORMATION TECHNOLOGIES IN BA SCHOOL OF BUSINESS AND FINANCE INNER WEB PORTAL Maira Dumpe* BA School of Business and Finance,
Foundations of Business Intelligence: Databases and Information Management
Chapter 5 Foundations of Business Intelligence: Databases and Information Management 5.1 See Markers-ORDER-DB Logically Related Tables Relational Approach: Physically Related Tables: The Relationship Screen
Administering a Microsoft SQL Server 2000 Database
Aug/12/2002 Page 1 of 5 Administering a Microsoft SQL Server 2000 Database Catalog No: RS-MOC2072 MOC Course Number: 2072 5 days Tuition: $2,070 Introduction This course provides students with the knowledge
Data Warehouse Snowflake Design and Performance Considerations in Business Analytics
Journal of Advances in Information Technology Vol. 6, No. 4, November 2015 Data Warehouse Snowflake Design and Performance Considerations in Business Analytics Jiangping Wang and Janet L. Kourik Walker
MS-50401 - Designing and Optimizing Database Solutions with Microsoft SQL Server 2008
MS-50401 - Designing and Optimizing Database Solutions with Microsoft SQL Server 2008 Table of Contents Introduction Audience At Completion Prerequisites Microsoft Certified Professional Exams Student
Developing Microsoft SQL Server Databases 20464C; 5 Days
Developing Microsoft SQL Server Databases 20464C; 5 Days Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Course Description
Release: 1. ICADBS502A Design a database
Release: 1 ICADBS502A Design a database ICADBS502A Design a database Modification History Release Release 1 Comments This Unit first released with ICA11 Information and Communications Technology Training
Course Outline. Module 1: Introduction to Data Warehousing
Course Outline Module 1: Introduction to Data Warehousing This module provides an introduction to the key components of a data warehousing solution and the highlevel considerations you must take into account
ISM 318: Database Systems. Objectives. Database. Dr. Hamid R. Nemati
ISM 318: Database Systems Dr. Hamid R. Nemati Department of Information Systems Operations Management Bryan School of Business Economics Objectives Underst the basics of data databases Underst characteristics
Microsoft SQL Server Beginner course content (3-day)
http://www.multimediacentre.co.za Cape Town: 021 790 3684 Johannesburg: 011 083 8384 Microsoft SQL Server Beginner course content (3-day) Course Description This three-day Microsoft SQL Server Beginners
Implementing Data Models and Reports with Microsoft SQL Server 20466C; 5 Days
Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Implementing Data Models and Reports with Microsoft SQL Server 20466C; 5
DATABASE MANAGEMENT SYSTEM
REVIEW ARTICLE DATABASE MANAGEMENT SYSTEM Sweta Singh Assistant Professor, Faculty of Management Studies, BHU, Varanasi, India E-mail: [email protected] ABSTRACT Today, more than at any previous
Saskatoon Business College Corporate Training Centre 244-6340 [email protected] www.sbccollege.ca/corporate
Microsoft Certified Instructor led: Querying Microsoft SQL Server (Course 20461C) Date: October 19 23, 2015 Course Length: 5 day (8:30am 4:30pm) Course Cost: $2400 + GST (Books included) About this Course
Query Optimization in Teradata Warehouse
Paper Query Optimization in Teradata Warehouse Agnieszka Gosk Abstract The time necessary for data processing is becoming shorter and shorter nowadays. This thesis presents a definition of the active data
Microsoft s Compliance Framework for Online Services
Microsoft s Compliance Framework for Online Services Online Services Security and Compliance Executive summary Contents Executive summary 1 The changing landscape for online services compliance 4 How Microsoft
Oracle Data Integrator: Administration and Development
Oracle Data Integrator: Administration and Development What you will learn: In this course you will get an overview of the Active Integration Platform Architecture, and a complete-walk through of the steps
Optimal Planning Software Platform Development with Cloud Computing Technology
Optimal Planning Software Platform Development with Cloud Computing Technology Anton Shabaev, Vladimir Kuznetsov, Dmitry Kositsyn Petrozavodsk State University (PetrSU) Petrozavodsk, Russia {ashabaev,
High-Volume Data Warehousing in Centerprise. Product Datasheet
High-Volume Data Warehousing in Centerprise Product Datasheet Table of Contents Overview 3 Data Complexity 3 Data Quality 3 Speed and Scalability 3 Centerprise Data Warehouse Features 4 ETL in a Unified
Tuning Microsoft SQL Server for SharePoint. Daniel Glenn
Tuning Microsoft SQL Server for SharePoint Daniel Glenn Daniel Glenn @DanielGlenn http://knowsp.com SharePoint and Collaboration Practice Leader @ InfoWorks, Inc. www.infoworks-tn.com PASS Nashville Business
Ursuline College Accelerated Program
Ursuline College Accelerated Program CRITICAL INFORMATION! DO NOT SKIP THIS LINK BELOW... BEFORE PROCEEDING TO READ THE UCAP MODULE, YOU ARE EXPECTED TO READ AND ADHERE TO ALL UCAP POLICY INFORMATION CONTAINED
A Proposed Information Technology Audit Framework For Microfinance Kumasi
A Proposed Information Technology Audit Framework For Microfinance Kumasi Dr. Thomas Yeboah ABSTRACT Information Technology Audit (ITA) has become very important aspect in the Information Technology (IT)
20464C: Developing Microsoft SQL Server Databases
20464C: Developing Microsoft SQL Server Databases Course Details Course Code: Duration: Notes: 20464C 5 days This course syllabus should be used to determine whether the course is appropriate for the students,
Course Outline: Course: Implementing a Data Warehouse with Microsoft SQL Server 2012 Learning Method: Instructor-led Classroom Learning
Course Outline: Course: Implementing a Data with Microsoft SQL Server 2012 Learning Method: Instructor-led Classroom Learning Duration: 5.00 Day(s)/ 40 hrs Overview: This 5-day instructor-led course describes
DESIGN AND DEVELOPING ONLINE IRAQI BUS RESERVATION SYSTEM BY USING UNIFIED MODELING LANGUAGE
DESIGN AND DEVELOPING ONLINE IRAQI BUS RESERVATION SYSTEM BY USING UNIFIED MODELING LANGUAGE Asaad Abdul-Kareem Al-Hijaj 1, Ayad Mohammed Jabbar 2, Hayder Naser Kh 3 Basra University, Iraq 1 Shatt Al-Arab
Administering a Microsoft SQL Server 2000 Database
Administering a Microsoft SQL Server 2000 Database Course 2072 - Five days - Instructor-led - Hands-On Introduction This course provides students with the knowledge and skills required to install, configure,
Making Reporting Relevant - Automating capacity scorecards in Microsoft Excel
Making Reporting Relevant - Automating capacity scorecards in Microsoft Excel Thomas Barns, Senior Consultant, Capacitas 1 Background Capacity reporting Automation Grouping Colouring Diagrams Beyond Excel
Introduction to Databases
Page 1 of 5 Introduction to Databases An introductory example What is a database? Why do we need Database Management Systems? The three levels of data abstraction What is a Database Management System?
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 5 Database Security First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Database Security 1 Relational Databases constructed
