2 hands-on problem questions from Database security textbook https://www.amazon.com/gp/product/ XXXXXXXXXX/ref=oh_aui_search_detailpage?ie=UTF8&psc=1 Hands-On Project 2-2: Building a Relational...


2 hands-on problem questions from Database security textbook https://www.amazon.com/gp/product/1435453905/ref=oh_aui_search_detailpage?ie=UTF8&psc=1 Hands-On Project 2-2: Building a Relational Database, page 76 You have been hired to design a relational database for a convenience store which is located within an apartment complex. The goal of the database is to keep track of the inventory sold in hopes of using the data to better meet the customers’ convenience store needs. Up until your arrival, the store kept track of each customer’s purchases using a flat database log, as shown in the follow- ing table. Using the information provided, build a relational database that will allow for querying things such as products sold, customer purchases, total apartment purchases, and total spent per apartment. Include any created tables and identify the keys and key types that are used. Identify all relation- ships, labeling them 1:1, 1:N, or M:N. Hands-On Project 1-1: Assessing and Prioritizing Risks, page 40 You have been hired as the security professional in your current work or school environment. Your department has experienced a recent breach within its database architecture. Your manager feels it is time to reassess the network as a first step in a phased approach to hardening the network security. You have been delegated to lead this assessment. Research your organization or school to determine its database architecture. Write a paper describing your assessment process. Include the following information in your paper: • Define who would be included in the assessment of the database environment. • Identify the assets that you are protecting. • Define the threats you are protecting yourself against. • Using the following table, assign a risk value to each threat, based on its likelihood and cost to the company. • Prioritize your threats based on their risk value (5 being the highest risk and 1 being the lowest).





Oct 07, 2019
SOLUTION.PDF

Get Answer To This Question

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here