How selected method can used to minimize database security


Case Study Assignment: Database Development

Read the following articles available in the ACM Digital Library:

Note: The ACM Digital Library is a Strayer Library database located in iCampus > Campus & Library > Learning Resource Center > Databases.

Dual Assessment of Data Quality in Customer Databases, Journal of Data and Information Quality (JDIQ), Volume 1 Issue 3, December 2009, Adir Even, G. Shankaranarayanan.

Process-centered review of object oriented software development methodologies, ACM Computing Surveys (CSUR), Volume 40 Issue 1, February 2008, Raman Ramsin, and Richard F. Paige.

Write a two to three page paper in which you:

1. Recommend at least three specific tasks that could be performed to improve the quality of datasets, using the Software Development Life Cycle (SDLC) methodology. Include a thorough description of each activity per each phase.

2. Recommend the actions that should be performed in order to optimize record selections and to improve database performance from a quantitative data quality assessment.

3. Suggest three maintenance plans and three activities that could be performed in order to improve data quality.

4. From the software development methodologies described in the article titled, "Process-centered Review of Object Oriented Software Development Methodologies," complete the following.

1. Evaluate which method would be efficient for planning proactive concurrency control methods and lock granularities. Assess how your selected method can be used to minimize the database security risks that may occur within a multiuser environment.

2. Analyze how the verify method can be used to plan out system effectively and ensure that the number of transactions do not produce record-level locking while the database is in operation.

Format your assignment according to the following formatting requirements:

1. The answer should be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.

2. The response also include a cover page containing the title of the assignment, the student's name, the course title, and the date. The cover page is not included in the required page length.

3. Also Include a reference page. The Citations and references should follow APA format. The reference page is not included in the required page length.

The specific course learning outcomes associated with this assignment are:

• Prepare database design documents using the data definition, data manipulation, and data control language components of the SQL language.

• Describe the basic mechanisms for accessing relational databases from various types of application development environments.

• Explain the key principles of data security and identify data security risk and violations in data management system design.

• Use technology and information resources to research issues in the strategic implications and management of database systems.

• Write clearly and concisely about topics related to the strategic planning for database systems using proper writing mechanics and technical style conventions.

Solution Preview :

Prepared by a verified Expert
Management Information Sys: How selected method can used to minimize database security
Reference No:- TGS02112680

Now Priced at $40 (50% Discount)

Recommended (98%)

Rated (4.3/5)