Overview

Identifying who has access to the database
Helping build the structure and design of the database
Implementing security measures for the data
Restoring lost data
Building test versions and testing for bugs
Merging databases when necessary
Updating systems when necessary and creating data backups
Continually monitoring database systems