Page 97 - DCAP208_Management Support Systems
P. 97
Management Support Systems
Notes system services. As far as auditing is concerned, the techniques provided by DBMS servers are
not generally appropriate for this scope. For this reason, you must take advantage of the systems
implemented by OLAP engines. From the viewpoint of users profile–based data access, basic
requirements are related to hiding whole cubes, specific cube slices, and specific cube measures.
Sometimes you also have to hide cube data beyond a given detail level.
Effective security in a data warehouse should focus on four main areas:
Establishing effective corporate and security policies and procedures
Implementing logical security procedures and techniques to restrict access
Limiting physical access to the data center environment
Establishing an effective internal control review process with an emphasis on security and
privacy
Self Assessment
Fill in the blanks:
14. ....................... is a person responsible for the administration and management of a data
warehouse.
15. Security is particularly relevant to data warehouse projects, because data warehouses are
used to manage information crucial for strategic ....................... processes.
Case Study Large Data Warehouse
noware was instrumental in developing one of the first major data warehouse in
New Zealand, starting in 1996. It is still one of the largest data warehouses in New
KZealand. It takes data from multiple source systems, supports over 100 analysts in
five different government departments, and provides customised reporting to several
thousand users through an Intranet.
It records a full unit record history of all events for all systems. With this history it can
recreate reports as at any given point in time, and track all events, for all clients, through
any period of time and across all data systems.
Verification processes regularly prove that the data in the warehouse is correct. Metadata
is generated and maintained by the data warehouse system to support the work of the
business analysts. It documents the rules on how to use the data, and guarantees the
quality of the information. Security controls appropriate access to the data to ensure that
analysts see only the data they need to do their work.
Front line staff around the country can access information without the need to learn
complex software, data or systems. They can point and click, slice and dice, drill down, and
explore. For the client, this has created a whole new way of managing and operating their
business.
Portals provides secure access to case load and case management information for around
4,000 frontline staff in service centres around the country. Staff can generate standard
reports when they like; or customize and filter their own information.
Contd....
90 LOVELY PROFESSIONAL UNIVERSITY