As we have been learning in this class, it is important to create database models in order to ensure that only well-planned and structured databases are created. Advantages of imploring this kind of logic include data consistencies and homogenualities that make other features such as relationship building possible. One additional feature that arises from data modeling that you may or may not realize is database security. An example of this can be seen in law enforcement and U.S. government intelligence agencies. There have been recent pressures for government agencies to share data among different office sites in order for convenience and central access. However, no matter how you approach it sharing data always exposes sensitive database information to possible hostile environments. One technique that has been developed to combat this issue is data replication. A single centralized server becomes the main source of updated information. Whenever information from new accounts is created or when current information is updated, the changes are made in the designated server’s database. Verification and security checks are performed on that server and an image of the updated information is made. The image intentionally lacks formatting as it will later be shared among heterogeneous platforms. It is then sent to a second server where the data image is copied. From the second server, other servers from localized networks belonging to specific agency offices can then access the information.
The challenge is the fact that the data replicated is entirely unformatted. This is for the purpose of being able to share the data among the different platforms of the specific branch offices. The database administrators of the different agency offices must have a single unified model that they all agree upon. When data updates are downloaded and the unformatted information is received, the database administrators sort the data and place them to their intended locations within the database based on the models they developed and follow. This is relevant to what we have been talking about in the class because it emphasizes the importance of understanding data models.
It was interesting to learn that database mode allow security features such as this to become possible. I enjoy seeing how the lessons we are taught in class apply to what is going on in the actual IT industry.
Gallagher, Sean. (2010, September 10). Gotcha! secure information sharing. Retrieved on January 22, 2012 from http://www.pcmag.com/article2/0,2817,1260937,00.asp