Implementing database security policies

Assignment Help Other Subject
Reference no: EM132276328

Tasks Objectives:

1. Create and maintain a database server

2. Implementing Database security policies

Task # 1 Submit a work proposal for this assignment which must include:

• Understanding of deliverables - a detail description of deliverables
• General overview of proposed plan - initial understanding of solution for the task-2 and task-3.
• Resources identified

The work proposal must be submitted in a word file through the Turnitin link available in Moodle.

Task # 2 ABC University is one of the leading University in the Oman. It is established in the year 2002 and has a current student strength of over 25000 students. The student belong to different parts of the world. It employs full-time and part-time personnel. It offers various undergraduate courses in the field of Business and Engineering programs. The University has an online system operational round the clock.

As a Database Administrator (DBA) working for ABC University, discuss the following:

a) Discuss the various reasons with relevant examples of your own that can lead to ineffective data administration in the ABC University.
b) Discuss the two-tier and three-tier database architecture and suggest suitable architecture with appropriate reasons for implementing database application for the ABC University.
Note: Solution for this task must be written in your own words with relevant examples wherever necessary and to be written in maximum
of five pages.

Task # 3 a) The web link to the following research paper is given in the college Moodle web page:

Sharma, N., Garg, P., Security Policies in Modern Database System, International Journal of Computer Applications (IJCA), 2011.

Discuss the key security features available in the data management software that can be applied for the scenario given in task 2a.

Note: The solution must be written in your own words with relevant examples not exceeding 3 pages. The given research paper is for your reference only and your answer should not be limited to this research paper only. You may refer various other resources and provided references for the same.

b) Consider the scenario given in task-2a and create any four users (e.g. User1, User2, User3, and User4) in the ABC University database and assign the privilege to connect to the database. Out of the four users, one user (i.e. User1) is for faculty and two users (i.e. User2 and User3) are for the managers. The fourth user (i.e. User4) is for the admin staff.

Create two roles with the following privileges:
• Data_Entry: can only insert and view the records on the table created by User4.
• HoD: can only edit and delete the records on the table created by User4.
Assign the roles created above to the users as indicated below:
• Assign the role Data_Entry to the faculty (i.e. User1)
• Assign the role LM to the managers (i.e. User2 and User3)
• For the admin staff (i.e. User4) assign the privilege to create a new table (should not be able to insert records). You may create any new table relevant to the task-2a scenario.

Your solution must include the necessary SQL commands as screenshots and brief explanation for each of the steps.

Note:
• The names of the four users must be based on your first name. For example, if your name is Ahmed, the user names should be Ahmed1, Ahmed2, Ahmed3 and Ahmed4.
• If the user names are inappropriate, marks shall be deducted
accordingly.

Attachment:- Database Administration.rar

Reference no: EM132276328

Questions Cloud

Write an essay comparing or contrasting the two topics : Write an essay comparing or contrasting the two topics in your selection using EITHER the point-by-point OR the subject-by-subject method to organize.
Describe the industry that you currently work in or plan : Describe the industry that you currently work in or plan to work in along with a discussion of your vision of what collaboration will be like for your industry.
Describe the nurse practice act : CS/SB 614 ARNP disciplinary sanctions are added to the bill in s. 456.072, F.S., (Section 5) to mirror a physician's sanctions for prescribing or dispensing.
What challenges does bilingual and intercultural education : What are the advantages of bilingual education in the context of Mexico? What could potentially be the disadvantages?
Implementing database security policies : Database Administration (COMP 30021) - Middle East College Create and maintain a database server and Implementing Database security policies
How important is intercultural communication in a globalized : How important is intercultural communication in a globalized world?Can intercultural education achieve this?
What makes the curriculum international : The school was the first to offer the International Baccalaureate in the late 1960s, and so has a unique perspective on what international education is.
What are the goals and objectives of the program : While planning may begin in different ways each plan must identify the problem, analyze the data, and focus on making decisions.
Post a strategy for the clinical issue : Post your background questions and your strategy for getting a comprehensive understanding of the clinical issue. As you work on your capstone project proposal.

Reviews

len2276328

4/6/2019 12:07:32 AM

Deliverables Aspects 0-6 7-17 18-25 Task 3a Implementing database security policies. Poor / weak analysis some concepts are clear / limited analysis Good / very good / excellent understanding of the concepts Deliverables 0-4 5-13 14-20 Task 3b Commands - Incorrect / mostly incorrect Commands – few correct / fairly correct with fair explanation Mostly commands are correct/ explanation is fair/clear

len2276328

4/6/2019 12:07:25 AM

Deliverables Aspects 0-6 7-17 18-25 Task 2a Create & maintain database server Poor / weak / mostly incomplete analysis of ineffective data administration some concepts are clear / limited / fair analysis of ineffective data administration Good / very good / excellent understanding of the concepts of ineffective data administration Deliverables 0-4 5-13 14-20 Task 2b Poor / weak / mostly incomplete analysis of architecture some concepts are clear / limited / fair analysis of architecture Good / very good / excellent understanding of the concepts of architecture

len2276328

4/6/2019 12:07:18 AM

Deliverables Aspects 0-10 Marks Task 1 Submission of work proposal • Objectives of the Assignment clearly identified: poor/ fair / clear • Initial understanding of Task -2 and Task-3: poor/fair/clear • Resources identified: poor/fair/clear • Timeline: not given/ partially relevant / relevant

len2276328

4/6/2019 12:06:52 AM

Guidelines Follow the guidelines mentioned below for your assignment: Code developed (Soft Copy) should be included. Assignment must be submitted through Moodle and it will undergo plagiarism detection test through turnitin (a plagiarism detection tool). Handwritten assignments / hard copy will not be accepted. Use Page Number & proper References. Assignment should have a Title Page. Title Page should contain the following information. Assignment Name Section Name Student name Student ID Number Faculty Name The Table of Contents Should have, each deliverable task number, content, page number Assignment should be typed in your own words using Times New Roman font size 12. Heading should be with Font Size 14, Bold, Underline Feedback shall be given in Moodle within four days from the last date of submission of work proposal and within one week after submission of final assignment document.

Write a Review

Other Subject Questions & Answers

  Discuss about the prison overcrowding

The various components of the criminal justice system really do not act independently of one another. The system is directly impacted by each component.

  Describe the factors which led to formation of hmoprepaid

show in your paper the evolution of the health care system in america.1. begin with how medical care was paid for a

  Modeling discrete time systems

To convert from the analog signal to a discrete-time signal we replace the time t with nT where n is a sample index. What is T?

  Individual assignment on risk management paper

Individual Assignment Risk Management

  What does plato cave analogy tell about nature of language

What does Plato's cave analogy tell us about the nature of language? If we venture out to see the sun, why must we return to the cave

  Technique used to deal with overeating-drug or alcohol abuse

So called ____________ is a technique used to deal with overeating, drug or alcohol abuse.

  Develop policy argument that is definitive using crime

Develop a policy argument or claim that is definitive, designative, evaluative, and advocative, using one of these terms: (a) crime, (b) pollution, (c) terrorism, (d) quality of life, (e) global warming, (f) fiscal crisis.

  What do you do differently to ensure success

What do you do differently to ensure success in your educational life here in college?What can the college do to support you in your personal educational goals?

  Commonly used law office technologies

Identify at least (2) commonly used law office technologies. Next, explain the main reasons why you think computer skills are essential for the paralegal

  Describe the characteristics of this research design

BUS703 :Describe the characteristics of this research design and evaluate its appropriateness. Was this design sufficient to address the research objective.

  How to tie a shoe or brush our teeth

Allow yourself to be creative. For example, we probably already know how to tie a shoe or brush our teeth!

  Define the nurse instruct the patient to place the tablet

A patient is experiencing chest pain and needs to take a sublingual form of nitroglycerin. where does the nurse instruct the patient to place the tablet

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd