SlideShare une entreprise Scribd logo
1  sur  31
ByBy
Adedayo S.OAdedayo S.O
Abubakar S.AAbubakar S.A
Mbeari IjeomaMbeari Ijeoma
Energy Information System Department. ECN. Abuja
Energy Databank:
Management ,Technology and
Security
A Paper Delivered During the Training of EIS Staff of Features & Administration of the National Energy
Databank Portal, 2nd
– 13th
June , 2014, at Computer Training Room, ECN
Outline
1. Definitions
2. Why Databank?
3. National Energy Databank
4. Staff Relevance
5. Security
1. Definitions
a. Data: intelligence, signal or fact in its raw form (number,
text, sound, colour etc)
b. Information: Processed data (data with added value
c. Knowledge: is the awareness gotten through information,
facts, ideas, truths etc
d. Database: systematically organised collection of data
(manual or electronic), structured so that it can be
automatically retrieved or manipulated (processed)
3
1. Definitions cont’d
 Relational Databases: text in tables
 Transactional Databases: numerical and
alphanumerical
 Multimedia Databases: text + picture + graphical
+ sound + video
 Spatial Databases: text + graphical + picture
 Time-Series Databases: text + numerical
 Document Managements: digital objects + text
4
1. Definitions1. Definitions cont’dcont’d
Document Management Databases
5
2. Why Databank2. Why Databank
Data is the most powerful resource for decision
making. It passes through the process of:
1. Data Collection
2. Data Processing
3. (Data Storage)
4. Data Analyses
5. Information Generation
6. Information Dissemination/Xchange
7. Decision Making by User
2.2. Why DatabankWhy Databank ContdContd
 Technology has changed how things are done, making them
easier, cheaper and faster.
 Databank is one of the technologies for handling information
in such a way as to enjoy the benefits of contemporary
technologies, in decision making.
7
SYNC
Application
Scientific
Information
Technology
2. Why Databank2. Why Databank ContdContd
8
Computerised Databank Technology is preferred
because:
1. Computer based Databank is convenient and versatile.
It is presently the best way to manage any activity.
2. Scalable
3. Controllable
4. Integrity
5. Preservable/ storage
6. Interchangeable
7. Easily shared
8. Easily packaged
9. Manpower easily developed with specializations
10. Support (software, hardware and expertise) ubiquitous
11.Global vogue
2. Why Databank2. Why Databank ContdContd
OTHER ISSUES IN DATABANK
 Security (protection, recovery)
 Archiving
 Infrastructure
 Manpower development
DELIVERABLES
With databank, you can achieve good planning
(implementations) through:
 Scenario studies (for predictions)
 Deviation discovery (for intervention)
 Data mining (information discovery from data)
 Classification discovery
 Functional Relations (e.g. y=mx+c)
 Direct Inferences 9
3. National Energy Databank
 Energy Commission of Nigeria (ECN)
 Established by the Act No. 62 of 1979, as
amended by Act No.32 of 1988 and Act No.19
of 1989
 ECN has a mandate, among others, to:
 serve as a centre for gathering and dissemination
of information relating to national policy in the
field of energy development; and
 collate, analyze and publish information related
to the field of energy from all sources, where
such information is relevant to the discharge of
its functions under the Act.
10
3. National Energy Databank Cont’dont’d
 Birth of The NEDB:
 Stakeholders meeting 11 years ago
 Included Ministers, NPC,NASENI, Ministries, Oil
companies, Foreign Missions etc
 Decisions taken among many, are:
 A well-structured National energy databank be established that will use modern
information management technology;
 The establishment of a NEDB be made a top priority by government;
 Adequate funds be provided to ECN for the establishment, management and
operation of an effective, computer based, National Energy Data Bank
11
3. National Energy Databank
Cont’dont’d
 ECN formed an NEDB Committee in- house
 Worked with NBS (Formerly FOS) and Nat. Databank of
the Nat. Planning Commission;
 Organized interactive presentations by expert firms, to
share expertise and possibility of consultancy
contracts;
 Mounted seminars for capacity building of ECN staff etc
 It is one major mandate of the Energy Information
System Department
12
3. National Energy Databank
Cont’dont’d
13
-Data Warehouse
-Data Bank
-Web-Driven Energy
info Portal
-Survey Instrument Design
-Data Gathering
-Data Collation
-Data Processing
-Data Interpretation
-Energy and related
Document Storage
-Reference Documents
-Electronic Library
• Including:
• Publications Committee
• Public Awareness Committee
3. National Energy Databank Cont’dont’d Data
Format
Table 1.
SN FORMAT FREQUENC
Y
EXAMPLES
1 Text Zero,
Monthly
Annual
Policies, Regulations, Acts etc
Sales, Production, Consumptions etc
Sunshine, Export, Import etc
2 Pictures Zero
Oil wells, Wind Mills, Turbines etc
3 Numerical Zero
Monthly
Annual
Installations, Technologies, Units,
Deposits etc
Energy Production (oil, electricity) etc
Energy Production (oil, electricity) etc
4 Graphical Zero Maps, Graphs, Charts etc
5
Sound Zero Speeches, Energy News etc
6 Video Zero Events, energy accident scenes etc
14
3. National Energy Databank
Cont’dont’d
SOURCES OF ENERGY DATA
 Primary (surveys, project data capture, etc)
 Secondary ( from relevant stakeholders)
 Tertiary (from a publication, news media, etc )
15
3. National Energy Databank Cont’dont’d
16
SOME MILESTONES
1. Web-driven, Live NEDB Portal
3. National Energy Databank
Cont’d
 The appearance of the interface is as shown
above.
 Two levels of users(front end);
 Guest (can view many, but not all available data)
 Subscriber (has access to more items).
 Back end has three levels-
 Data Entry
 Data Manager
 Administrator
 The NEDB is to be linked to the ECN website
www.energy.gov.ng
17
3. National Energy Databank Cont’dont’d
2. NEDB Room
18
3. National Energy Databank Cont’dont’d
3. FACILITIES
 Proxy server on Fedora (Linux).
 Mail service on Commission’s own domain .
 250 – Port LAN all internet connected (scalable).
 Database server. Microsoft SQL server 2003 software is being installed.
 Over 150 computers.
 Servers have minimum of 1GB RAM.
 A website www.energy.gov.ng that is content driven (based on joomla software)
 Thirty four-man Information System Department
 An equipped computer training room
 Hardware of high quality (Cisco,3Com, HP)
 HP servers, desktops and laptops
 A server room
 An ICT maintenance workshop
 A Databank Room
 A web-Driven NEDB Portal 19
4. Staff Relevance
All can participate in Energy Databank management because Data management is the
development, execution and supervision of plans, policies, programs and practices that
control, protect, deliver and enhance the value of data and information assets (that has
value to an organization) 
Staff are engaged in the NEDB through:
a. Website management team (EIS)
b. Programming team (EIS)
c. NEDB Committee (All Departments)
d. Various data gathering/survey projects on-going and proposed (All staff, temp &
perm)
20
5. Database security
 Database security concerns the use of a broad range of
information security controls to protect databases.
 Potentially including the data, the database applications or stored
functions, the database systems, the database servers and the
associated network links against compromises of their
confidentiality, integrity and availability.
 It involves various types or categories of controls, such as
technical, procedural/administrative and physical. 
21
5. Security (Cont)

Loss of privacy
 Loss of integrity
 Loss of availability
Threat is
any intentional or accidental
event that may adversely
affect the system.
5. Security (Cont)
Security risks to database systems :
- Using another person’s log-in name to
access data
- Unauthorized copying data
- Program/Data alteration
- Illegal entry by hacker
- Viruses
- Etc.
5. Security (Cont)
 Access control
 Auditing
 Authentication
 Encryption
 Integrity controls
 Backups
 Application security
 Database Security applying Statistical Method
24
Types of information security control
Countermeasures
Computer-Based Controls:
- Authorization
- Views
- Backup and Recovery
- Integrity
- Encryption
- RAID Technology
Authorization
The granting of a privilege that enable a user to have a legitimate access to a
system.
They are sometimes referred as access controls.
The process of authorization involves authenticating the user requesting
access to objects.
Authenticating
Means a mechanism that determines whether a user is who
he/she claim to be.
A system administrator is responsible for allowing users to
have access to the system by creating individual user
accounts.
Benefits of The Project
 Facilitate the process of building the right institutional infrastructure (especially in energy sector) to
support the development process;
 Improve government’s resource allocation, by diminishing the influence of politics;
 Enhance transparency in governance;
 Improve recruitment and utilization;
 Ensure better planning and management;
 Mitigate wasteful spending;
 Resolve national unrest issues such as Niger-Delta crises and fuel/electricity scarcity
 Job opportunity for so many personnel
28
Challenges And Opportunities
 Low ICT penetration on the part of users
especially government agencies;
 Shortage in ICT technical personnel;
 Low level of commitment of government in
funding etc, resulting in avoidable project
duration extension;
 Inadequate power supply;
 Paucity of data and knowledge of data types
required and inconsistency of data when
available;
 Poor cooperation during data gathering, on the
part of respondents;
 Cost of infrastructures e.g. bandwidth for
internet connectivity.
29
Challenges And Opportunities
cont’d
 Further works still in progress in the areas of:
 Power back up
 Data gathering
 Integration of the NEDB application with other
ECN’s applications (e.g. project management)
 Detailed training of staff as stipulated by the SoR
 Opportunities exist for IT Pros in the areas of:
 Consultancy
 Job opportunities
 Research opportunities for the academia
 IT reporting opportunities for those in the news
sector
30
Thank You
God Bless
31

Contenu connexe

Similaire à Energy Databank in Nigeria: Management ,Technology and Security

IRJET- A Novel Framework for Three Level Isolation in Cloud System based ...
IRJET-  	  A Novel Framework for Three Level Isolation in Cloud System based ...IRJET-  	  A Novel Framework for Three Level Isolation in Cloud System based ...
IRJET- A Novel Framework for Three Level Isolation in Cloud System based ...IRJET Journal
 
Seminar Introduction Information Technology
Seminar Introduction Information Technology Seminar Introduction Information Technology
Seminar Introduction Information Technology Egidio A Magno Ximenes
 
Databases & Challenges of a Digital Age
Databases & Challenges of a Digital AgeDatabases & Challenges of a Digital Age
Databases & Challenges of a Digital AgeWendy Lile
 
BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIES
BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIESBIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIES
BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIESijcsit
 
Big Data in Cloud Computing Review and Opportunities
Big Data in Cloud Computing Review and OpportunitiesBig Data in Cloud Computing Review and Opportunities
Big Data in Cloud Computing Review and OpportunitiesAIRCC Publishing Corporation
 
8 Ways Utility Networks Can Meet Data Demands
8 Ways Utility Networks Can Meet Data Demands8 Ways Utility Networks Can Meet Data Demands
8 Ways Utility Networks Can Meet Data DemandsSafe Software
 
Quality of Groundwater in Lingala Mandal of YSR Kadapa District, Andhraprades...
Quality of Groundwater in Lingala Mandal of YSR Kadapa District, Andhraprades...Quality of Groundwater in Lingala Mandal of YSR Kadapa District, Andhraprades...
Quality of Groundwater in Lingala Mandal of YSR Kadapa District, Andhraprades...IRJET Journal
 
An Overview of General Data Mining Tools
An Overview of General Data Mining ToolsAn Overview of General Data Mining Tools
An Overview of General Data Mining ToolsIRJET Journal
 
Overall System Architecture of Big Data of Wind Power Based on IoT_20161...
Overall System Architecture of Big Data of Wind Power Based on IoT_20161...Overall System Architecture of Big Data of Wind Power Based on IoT_20161...
Overall System Architecture of Big Data of Wind Power Based on IoT_20161...元 黄
 
Are Your PCs and Laptops Recovery and Discovery Ready?
Are Your PCs and Laptops Recovery and Discovery Ready?Are Your PCs and Laptops Recovery and Discovery Ready?
Are Your PCs and Laptops Recovery and Discovery Ready?Iron Mountain
 
Self-Tuning Data Centers
Self-Tuning Data CentersSelf-Tuning Data Centers
Self-Tuning Data CentersReza Rahimi
 
Field Data Gathering Services — A Cloud-Based Approach
Field Data Gathering Services — A Cloud-Based ApproachField Data Gathering Services — A Cloud-Based Approach
Field Data Gathering Services — A Cloud-Based ApproachSchneider Electric
 
DEVELOPING A KNOWLEDGE MANAGEMENT SPIRAL FOR THE LONG-TERM PRESERVATION SYSTE...
DEVELOPING A KNOWLEDGE MANAGEMENT SPIRAL FOR THE LONG-TERM PRESERVATION SYSTE...DEVELOPING A KNOWLEDGE MANAGEMENT SPIRAL FOR THE LONG-TERM PRESERVATION SYSTE...
DEVELOPING A KNOWLEDGE MANAGEMENT SPIRAL FOR THE LONG-TERM PRESERVATION SYSTE...cscpconf
 
Cloud & Big Data - Digital Transformation in Banking
Cloud & Big Data - Digital Transformation in Banking Cloud & Big Data - Digital Transformation in Banking
Cloud & Big Data - Digital Transformation in Banking Sutedjo Tjahjadi
 
Overview of GovCloud Today
Overview of GovCloud TodayOverview of GovCloud Today
Overview of GovCloud TodayGovCloud Network
 
It Capabilities.2009
It Capabilities.2009It Capabilities.2009
It Capabilities.2009Diontealley
 
Innovative-Consulting Technology Capabilities. Statement
Innovative-Consulting Technology Capabilities. StatementInnovative-Consulting Technology Capabilities. Statement
Innovative-Consulting Technology Capabilities. StatementDiontealley
 
Capabilities of Computing Technology
Capabilities of Computing TechnologyCapabilities of Computing Technology
Capabilities of Computing TechnologyBimpe Animashaun
 

Similaire à Energy Databank in Nigeria: Management ,Technology and Security (20)

IRJET- A Novel Framework for Three Level Isolation in Cloud System based ...
IRJET-  	  A Novel Framework for Three Level Isolation in Cloud System based ...IRJET-  	  A Novel Framework for Three Level Isolation in Cloud System based ...
IRJET- A Novel Framework for Three Level Isolation in Cloud System based ...
 
ISM Unit 1.pdf
ISM Unit 1.pdfISM Unit 1.pdf
ISM Unit 1.pdf
 
Seminar Introduction Information Technology
Seminar Introduction Information Technology Seminar Introduction Information Technology
Seminar Introduction Information Technology
 
Databases & Challenges of a Digital Age
Databases & Challenges of a Digital AgeDatabases & Challenges of a Digital Age
Databases & Challenges of a Digital Age
 
BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIES
BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIESBIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIES
BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIES
 
Big Data in Cloud Computing Review and Opportunities
Big Data in Cloud Computing Review and OpportunitiesBig Data in Cloud Computing Review and Opportunities
Big Data in Cloud Computing Review and Opportunities
 
8 Ways Utility Networks Can Meet Data Demands
8 Ways Utility Networks Can Meet Data Demands8 Ways Utility Networks Can Meet Data Demands
8 Ways Utility Networks Can Meet Data Demands
 
Network Structure of a Office
Network Structure of a OfficeNetwork Structure of a Office
Network Structure of a Office
 
Quality of Groundwater in Lingala Mandal of YSR Kadapa District, Andhraprades...
Quality of Groundwater in Lingala Mandal of YSR Kadapa District, Andhraprades...Quality of Groundwater in Lingala Mandal of YSR Kadapa District, Andhraprades...
Quality of Groundwater in Lingala Mandal of YSR Kadapa District, Andhraprades...
 
An Overview of General Data Mining Tools
An Overview of General Data Mining ToolsAn Overview of General Data Mining Tools
An Overview of General Data Mining Tools
 
Overall System Architecture of Big Data of Wind Power Based on IoT_20161...
Overall System Architecture of Big Data of Wind Power Based on IoT_20161...Overall System Architecture of Big Data of Wind Power Based on IoT_20161...
Overall System Architecture of Big Data of Wind Power Based on IoT_20161...
 
Are Your PCs and Laptops Recovery and Discovery Ready?
Are Your PCs and Laptops Recovery and Discovery Ready?Are Your PCs and Laptops Recovery and Discovery Ready?
Are Your PCs and Laptops Recovery and Discovery Ready?
 
Self-Tuning Data Centers
Self-Tuning Data CentersSelf-Tuning Data Centers
Self-Tuning Data Centers
 
Field Data Gathering Services — A Cloud-Based Approach
Field Data Gathering Services — A Cloud-Based ApproachField Data Gathering Services — A Cloud-Based Approach
Field Data Gathering Services — A Cloud-Based Approach
 
DEVELOPING A KNOWLEDGE MANAGEMENT SPIRAL FOR THE LONG-TERM PRESERVATION SYSTE...
DEVELOPING A KNOWLEDGE MANAGEMENT SPIRAL FOR THE LONG-TERM PRESERVATION SYSTE...DEVELOPING A KNOWLEDGE MANAGEMENT SPIRAL FOR THE LONG-TERM PRESERVATION SYSTE...
DEVELOPING A KNOWLEDGE MANAGEMENT SPIRAL FOR THE LONG-TERM PRESERVATION SYSTE...
 
Cloud & Big Data - Digital Transformation in Banking
Cloud & Big Data - Digital Transformation in Banking Cloud & Big Data - Digital Transformation in Banking
Cloud & Big Data - Digital Transformation in Banking
 
Overview of GovCloud Today
Overview of GovCloud TodayOverview of GovCloud Today
Overview of GovCloud Today
 
It Capabilities.2009
It Capabilities.2009It Capabilities.2009
It Capabilities.2009
 
Innovative-Consulting Technology Capabilities. Statement
Innovative-Consulting Technology Capabilities. StatementInnovative-Consulting Technology Capabilities. Statement
Innovative-Consulting Technology Capabilities. Statement
 
Capabilities of Computing Technology
Capabilities of Computing TechnologyCapabilities of Computing Technology
Capabilities of Computing Technology
 

Plus de Love Steven

Job and Task Analysis
Job and Task AnalysisJob and Task Analysis
Job and Task AnalysisLove Steven
 
Malicious Software ,Good Internet Habits and ICT general Application usage
Malicious Software ,Good Internet Habits and ICT general Application usageMalicious Software ,Good Internet Habits and ICT general Application usage
Malicious Software ,Good Internet Habits and ICT general Application usageLove Steven
 
Cyber Security – Virus and the Internet
Cyber Security –  Virus and the Internet Cyber Security –  Virus and the Internet
Cyber Security – Virus and the Internet Love Steven
 
Personnel Management Software Developing and Processes
Personnel Management Software Developing and ProcessesPersonnel Management Software Developing and Processes
Personnel Management Software Developing and ProcessesLove Steven
 
Information warfare, assurance and security in the energy sectors
Information warfare, assurance  and security in the energy sectorsInformation warfare, assurance  and security in the energy sectors
Information warfare, assurance and security in the energy sectorsLove Steven
 
Internet Explorer and Outlook Express
Internet  Explorer and Outlook ExpressInternet  Explorer and Outlook Express
Internet Explorer and Outlook ExpressLove Steven
 
Information and Communications Technology (ICT) General Application Software
 Information and Communications Technology (ICT)  General Application Software Information and Communications Technology (ICT)  General Application Software
Information and Communications Technology (ICT) General Application SoftwareLove Steven
 
Linux fundamentals Training
Linux fundamentals TrainingLinux fundamentals Training
Linux fundamentals TrainingLove Steven
 

Plus de Love Steven (8)

Job and Task Analysis
Job and Task AnalysisJob and Task Analysis
Job and Task Analysis
 
Malicious Software ,Good Internet Habits and ICT general Application usage
Malicious Software ,Good Internet Habits and ICT general Application usageMalicious Software ,Good Internet Habits and ICT general Application usage
Malicious Software ,Good Internet Habits and ICT general Application usage
 
Cyber Security – Virus and the Internet
Cyber Security –  Virus and the Internet Cyber Security –  Virus and the Internet
Cyber Security – Virus and the Internet
 
Personnel Management Software Developing and Processes
Personnel Management Software Developing and ProcessesPersonnel Management Software Developing and Processes
Personnel Management Software Developing and Processes
 
Information warfare, assurance and security in the energy sectors
Information warfare, assurance  and security in the energy sectorsInformation warfare, assurance  and security in the energy sectors
Information warfare, assurance and security in the energy sectors
 
Internet Explorer and Outlook Express
Internet  Explorer and Outlook ExpressInternet  Explorer and Outlook Express
Internet Explorer and Outlook Express
 
Information and Communications Technology (ICT) General Application Software
 Information and Communications Technology (ICT)  General Application Software Information and Communications Technology (ICT)  General Application Software
Information and Communications Technology (ICT) General Application Software
 
Linux fundamentals Training
Linux fundamentals TrainingLinux fundamentals Training
Linux fundamentals Training
 

Dernier

Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 

Dernier (20)

Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 

Energy Databank in Nigeria: Management ,Technology and Security

  • 1. ByBy Adedayo S.OAdedayo S.O Abubakar S.AAbubakar S.A Mbeari IjeomaMbeari Ijeoma Energy Information System Department. ECN. Abuja Energy Databank: Management ,Technology and Security A Paper Delivered During the Training of EIS Staff of Features & Administration of the National Energy Databank Portal, 2nd – 13th June , 2014, at Computer Training Room, ECN
  • 2. Outline 1. Definitions 2. Why Databank? 3. National Energy Databank 4. Staff Relevance 5. Security
  • 3. 1. Definitions a. Data: intelligence, signal or fact in its raw form (number, text, sound, colour etc) b. Information: Processed data (data with added value c. Knowledge: is the awareness gotten through information, facts, ideas, truths etc d. Database: systematically organised collection of data (manual or electronic), structured so that it can be automatically retrieved or manipulated (processed) 3
  • 4. 1. Definitions cont’d  Relational Databases: text in tables  Transactional Databases: numerical and alphanumerical  Multimedia Databases: text + picture + graphical + sound + video  Spatial Databases: text + graphical + picture  Time-Series Databases: text + numerical  Document Managements: digital objects + text 4
  • 5. 1. Definitions1. Definitions cont’dcont’d Document Management Databases 5
  • 6. 2. Why Databank2. Why Databank Data is the most powerful resource for decision making. It passes through the process of: 1. Data Collection 2. Data Processing 3. (Data Storage) 4. Data Analyses 5. Information Generation 6. Information Dissemination/Xchange 7. Decision Making by User
  • 7. 2.2. Why DatabankWhy Databank ContdContd  Technology has changed how things are done, making them easier, cheaper and faster.  Databank is one of the technologies for handling information in such a way as to enjoy the benefits of contemporary technologies, in decision making. 7 SYNC Application Scientific Information Technology
  • 8. 2. Why Databank2. Why Databank ContdContd 8 Computerised Databank Technology is preferred because: 1. Computer based Databank is convenient and versatile. It is presently the best way to manage any activity. 2. Scalable 3. Controllable 4. Integrity 5. Preservable/ storage 6. Interchangeable 7. Easily shared 8. Easily packaged 9. Manpower easily developed with specializations 10. Support (software, hardware and expertise) ubiquitous 11.Global vogue
  • 9. 2. Why Databank2. Why Databank ContdContd OTHER ISSUES IN DATABANK  Security (protection, recovery)  Archiving  Infrastructure  Manpower development DELIVERABLES With databank, you can achieve good planning (implementations) through:  Scenario studies (for predictions)  Deviation discovery (for intervention)  Data mining (information discovery from data)  Classification discovery  Functional Relations (e.g. y=mx+c)  Direct Inferences 9
  • 10. 3. National Energy Databank  Energy Commission of Nigeria (ECN)  Established by the Act No. 62 of 1979, as amended by Act No.32 of 1988 and Act No.19 of 1989  ECN has a mandate, among others, to:  serve as a centre for gathering and dissemination of information relating to national policy in the field of energy development; and  collate, analyze and publish information related to the field of energy from all sources, where such information is relevant to the discharge of its functions under the Act. 10
  • 11. 3. National Energy Databank Cont’dont’d  Birth of The NEDB:  Stakeholders meeting 11 years ago  Included Ministers, NPC,NASENI, Ministries, Oil companies, Foreign Missions etc  Decisions taken among many, are:  A well-structured National energy databank be established that will use modern information management technology;  The establishment of a NEDB be made a top priority by government;  Adequate funds be provided to ECN for the establishment, management and operation of an effective, computer based, National Energy Data Bank 11
  • 12. 3. National Energy Databank Cont’dont’d  ECN formed an NEDB Committee in- house  Worked with NBS (Formerly FOS) and Nat. Databank of the Nat. Planning Commission;  Organized interactive presentations by expert firms, to share expertise and possibility of consultancy contracts;  Mounted seminars for capacity building of ECN staff etc  It is one major mandate of the Energy Information System Department 12
  • 13. 3. National Energy Databank Cont’dont’d 13 -Data Warehouse -Data Bank -Web-Driven Energy info Portal -Survey Instrument Design -Data Gathering -Data Collation -Data Processing -Data Interpretation -Energy and related Document Storage -Reference Documents -Electronic Library • Including: • Publications Committee • Public Awareness Committee
  • 14. 3. National Energy Databank Cont’dont’d Data Format Table 1. SN FORMAT FREQUENC Y EXAMPLES 1 Text Zero, Monthly Annual Policies, Regulations, Acts etc Sales, Production, Consumptions etc Sunshine, Export, Import etc 2 Pictures Zero Oil wells, Wind Mills, Turbines etc 3 Numerical Zero Monthly Annual Installations, Technologies, Units, Deposits etc Energy Production (oil, electricity) etc Energy Production (oil, electricity) etc 4 Graphical Zero Maps, Graphs, Charts etc 5 Sound Zero Speeches, Energy News etc 6 Video Zero Events, energy accident scenes etc 14
  • 15. 3. National Energy Databank Cont’dont’d SOURCES OF ENERGY DATA  Primary (surveys, project data capture, etc)  Secondary ( from relevant stakeholders)  Tertiary (from a publication, news media, etc ) 15
  • 16. 3. National Energy Databank Cont’dont’d 16 SOME MILESTONES 1. Web-driven, Live NEDB Portal
  • 17. 3. National Energy Databank Cont’d  The appearance of the interface is as shown above.  Two levels of users(front end);  Guest (can view many, but not all available data)  Subscriber (has access to more items).  Back end has three levels-  Data Entry  Data Manager  Administrator  The NEDB is to be linked to the ECN website www.energy.gov.ng 17
  • 18. 3. National Energy Databank Cont’dont’d 2. NEDB Room 18
  • 19. 3. National Energy Databank Cont’dont’d 3. FACILITIES  Proxy server on Fedora (Linux).  Mail service on Commission’s own domain .  250 – Port LAN all internet connected (scalable).  Database server. Microsoft SQL server 2003 software is being installed.  Over 150 computers.  Servers have minimum of 1GB RAM.  A website www.energy.gov.ng that is content driven (based on joomla software)  Thirty four-man Information System Department  An equipped computer training room  Hardware of high quality (Cisco,3Com, HP)  HP servers, desktops and laptops  A server room  An ICT maintenance workshop  A Databank Room  A web-Driven NEDB Portal 19
  • 20. 4. Staff Relevance All can participate in Energy Databank management because Data management is the development, execution and supervision of plans, policies, programs and practices that control, protect, deliver and enhance the value of data and information assets (that has value to an organization)  Staff are engaged in the NEDB through: a. Website management team (EIS) b. Programming team (EIS) c. NEDB Committee (All Departments) d. Various data gathering/survey projects on-going and proposed (All staff, temp & perm) 20
  • 21. 5. Database security  Database security concerns the use of a broad range of information security controls to protect databases.  Potentially including the data, the database applications or stored functions, the database systems, the database servers and the associated network links against compromises of their confidentiality, integrity and availability.  It involves various types or categories of controls, such as technical, procedural/administrative and physical.  21
  • 22. 5. Security (Cont)  Loss of privacy  Loss of integrity  Loss of availability Threat is any intentional or accidental event that may adversely affect the system.
  • 23. 5. Security (Cont) Security risks to database systems : - Using another person’s log-in name to access data - Unauthorized copying data - Program/Data alteration - Illegal entry by hacker - Viruses - Etc.
  • 24. 5. Security (Cont)  Access control  Auditing  Authentication  Encryption  Integrity controls  Backups  Application security  Database Security applying Statistical Method 24 Types of information security control
  • 25. Countermeasures Computer-Based Controls: - Authorization - Views - Backup and Recovery - Integrity - Encryption - RAID Technology
  • 26. Authorization The granting of a privilege that enable a user to have a legitimate access to a system. They are sometimes referred as access controls. The process of authorization involves authenticating the user requesting access to objects.
  • 27. Authenticating Means a mechanism that determines whether a user is who he/she claim to be. A system administrator is responsible for allowing users to have access to the system by creating individual user accounts.
  • 28. Benefits of The Project  Facilitate the process of building the right institutional infrastructure (especially in energy sector) to support the development process;  Improve government’s resource allocation, by diminishing the influence of politics;  Enhance transparency in governance;  Improve recruitment and utilization;  Ensure better planning and management;  Mitigate wasteful spending;  Resolve national unrest issues such as Niger-Delta crises and fuel/electricity scarcity  Job opportunity for so many personnel 28
  • 29. Challenges And Opportunities  Low ICT penetration on the part of users especially government agencies;  Shortage in ICT technical personnel;  Low level of commitment of government in funding etc, resulting in avoidable project duration extension;  Inadequate power supply;  Paucity of data and knowledge of data types required and inconsistency of data when available;  Poor cooperation during data gathering, on the part of respondents;  Cost of infrastructures e.g. bandwidth for internet connectivity. 29
  • 30. Challenges And Opportunities cont’d  Further works still in progress in the areas of:  Power back up  Data gathering  Integration of the NEDB application with other ECN’s applications (e.g. project management)  Detailed training of staff as stipulated by the SoR  Opportunities exist for IT Pros in the areas of:  Consultancy  Job opportunities  Research opportunities for the academia  IT reporting opportunities for those in the news sector 30