Question

In: Computer Science

Discussion Database Security and UML Often, systems have only one level of security when it comes...

Discussion Database Security and UML

Often, systems have only one level of security when it comes to databases. Imagine that someone is trying to add a name (which should be composed only of letters) to a database. The user mistakenly hits a number, and the system rejects the entry. Such security can be implemented at the database management system (DBMS) or the application level.

Where would you apply security? Justify your choice.

What are some alternative practices or standards of utilizing UML for the visual representation of systems?

When would you use UML over other standards?

When are other standards preferable?

Solutions

Expert Solution

A) Where would you apply security? Justify your choice.

Ans)

  • Database integrity ensures that data in the database is correct and consistent.
  • Database administrator or application developer determine certain bussiness rules.
  • For eg:-Imagine that someone is trying to add a name to a database. Assume that a business rule says that name should be composed only of letters.Attempts to violate this integrity rule, then the statement must fail.
  • Integrity constraints and database triggers are used to manage a database's data integrity rules.
  • Referential integrity provides that a rule defined on a column or set of columns in one table, match the values in the referenced value.
  • It also includes the rules , what types of data manipulation are allowed on referenced values and how these actions affect dependent values.
  • So referential integrity mainly used for this kind of security.

----------------------------------------------------------------------------------------------------------------------------------------------------------------------

B)When would you use UML over other standards?

  • UML is a standard notation for software design. So,everyone can understand.
  • UML tools support, plug-ins to most popular IDEs,can generate code, apply design patterns, mine requirements, reverse engineer code, and perform impact analysis, refactorings, and complexity analysis.
  • UML portability,it saved in the standard XMI format.
  • UML is a well-known visual language that can capture much of the information that one needs to communicate about the architecture.
  • Modeling your sytem needs a subset notation of UML knowledge needed.So if you have not aware full features of representation also you can use UML

---------------------------------------------------------------------------------------------------------------------------------------------------------------------------

C) When are other standards preferable?

  • UML has standard notations.If don't know notations then prefer other standards.
  • UML has 14 different diagrams,it's complexity increased over the years.So learning this complex structure is overhead causes other standards preference.
  • Box-and-line diagrams are easy to create and convey our development easily.There is no need of formal structure.
  • The lack of design documentation,lack of architecture knowledge are quite common, and in those cases other standards widely used.

----------------------------------------------------------------------------------------------------------------------------------------------------

D) What are some alternative practices or standards of utilizing UML for the visual representation of

systems?

  • Architecture Interconnect Diagram(AID):-A representation of the logical structure of a system architecture, consisting of components and elements . It can be shown as rectangular, triangular and circular symbols, to follow an optional project-specific convention.
  • Business Model Canvas :-use the canvas to describe, design, challenge, and pivot your business model.It shows partners,activities,proposition values,customer relation ships,resources,distribution,cost and revenue.
  • Enterprise Data Modeling:- It is an integrated view of the data produced and consumed across an entire organization.Mainly 3 levels--Subject area model,Conceptual model and Conceptual entity model.


Related Solutions

Using the South University Online Library or the Internet, research database security and UML. Based on...
Using the South University Online Library or the Internet, research database security and UML. Based on your research and readings for the week, respond to the following discussion topics. Often, systems have only one level of security when it comes to databases. Imagine that someone is trying to add a name (which should be composed only of letters) to a database. The user mistakenly hits a number, and the system rejects the entry. Such security can be implemented at the...
Discussion Questions: Employees are often one of the greatest challenges for enhancing information security in government....
Discussion Questions: Employees are often one of the greatest challenges for enhancing information security in government. What can public organizations do to increase employee awareness of information security?
Database Systems - Security and Administration Jak University is a leading higher education institution that is...
Database Systems - Security and Administration Jak University is a leading higher education institution that is well known throughout Malaysia for its academic achievements. It is proven that this university exists in all major cities in Malaysia. Jak University is also in Kuala Lumpur and as a management center, has 100 thousand students and 10 thousand lecturers spread across several branch campuses. The learning process is done face-to-face and online. Each campus in each city can join virtual classes, so...
Although database systems have become the system of choice for new and reengineered systems, are there...
Although database systems have become the system of choice for new and reengineered systems, are there any situations where a traditional file based system might be chosen instead? Explain your answer with examples.
E. coli often comes to mind when reading about proteins and discussing them and it often...
E. coli often comes to mind when reading about proteins and discussing them and it often makes headlines in the news. My challenge for this chapter's discussion topic is this: find a recent (within the last month) news article that involves E. coli and share it with the class. Why does it seem that this bacteria is always in the news? Remember, this chapter is the protein chapter, so why is E. coli so important to proteins and vice versa?...
Database Management Systems for Business Name the data model that is only used to document a...
Database Management Systems for Business Name the data model that is only used to document a database design. 6.         State the most important characteristics regarding the output of any relational algebra operation. Name the software system that permits the data in a distributed database to be transparent to users. Use two words to distinguish a file based systems and a database. 9.        Name the level to represent an organization view in the three-level ANSI-SPARK architecture. 10.       Name the terminology of...
One of the issues that often comes up is does the size of the company matter...
One of the issues that often comes up is does the size of the company matter when determining whether or not to use ABC. Originally, it was thought that only larger companies should attempt to use ABC, especially as many struggled to implement it smoothly. However, over the last 20 years, especially as technology has advanced, many small businesses have found success using ABC as well. Douglas Hicks in the Journal of Accountancy's Yes, ABC is for Small Businesses, Too...
In this discussion, you will select one of TSA’s 20 layers of security or one of...
In this discussion, you will select one of TSA’s 20 layers of security or one of the layers of security for General Aviation. In your opinion, how effective is it? Give one example of how this layer of security would work successfully. Give one example of how this layer of security would not work. DO NOT COPY FROM SOMEWHERE! TELL ME ONW YOUR WORD.
Sometimes when I'm working with a class (usually one that represents a database model), I'll have...
Sometimes when I'm working with a class (usually one that represents a database model), I'll have about 15 different properties on it, usually of different types. These are properties that need to be accessed by the users, as well, so each property will typically need some function like T getPropertyName(); setPropertyName(T value); But, it's also extremely valuable for me to be able to iterate through each property in a particular order(although, I suppose that "value" may stem from laziness of...
One of the interesting aspects of intangible assets that often comes up is the talent hired...
One of the interesting aspects of intangible assets that often comes up is the talent hired by companies that help make the organization unique... imagine, for example, Steve Jobs or Bill Gates - does their reputation augment Apple or Microsoft? What about other employees? Well, not to be cold, but most of us (myself included) are not going to be deemed 'intangible' assets to the point of posting a value on the balance sheet. However, there are individuals that would...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT