SOLUTION: COMP 0336A Middle East Colleague Database Oriented Information System Paper

[ad_1]
Database Defence (COMP 0336A)-Spring 20-CW1 (ASSMNT)-All-QP ` IN SEMESTER (INDIVIDUAL) ASSIGNMENT Module Code: COMP 0336A Module Name: Database Security Level: 3 Max. Marks: 100 Instructions to Student    Answer all questions. Deadcourse of proposition patience: 03/05/2020 23:59 Deadcourse of attributement patience: 03/06/2020 23:59  The vestiges current on the attributement accomplish be scaled down to the objective weightage of the attributement which is 50 vestiges  Formative feedback on the perfect attributement exhaust accomplish be supposing if the exhaust is submitted at definite 10 days antecedently the conclusive patience determination. Feedback subjoined conclusive evaluation accomplish be supposing by 17/06/2020  Module Conversance Outcomes The subjoined LOs are consummated by the scholar by completing the attributement successfully 1. Evaluate techniques used to determine defence in a database-oriented notice arrangement. 2. Administer user admittance and user profiles among a complicated and DBMS Assignment Objective 1. Understand the defence attacks in the database 2. Debadge a defence erection installed in Guard in Depth 3. Tool user conduct controls to consummate defence requirments. Assignment Tasks 1) Comply a operation proposition for this attributement or antecedently 03/05/2020 (23:59) which must include:  Understanding of deliverables – a point designation of deliverables.  General overview of incomplete intention - moderate construction of explanation to exercise2 and Exercise 3.  Timecourse for store of the loving exercises. The operation proposition must be complyted in a term rasp through the be-mixed conducive in Moodle. ( 10 Marks) MEC_AMO_TEM_034_01 Page 1 of 10 Database Defence (COMP 0336A)-Spring 20-CW1 (ASSMNT)-All-QP T2: (30 vestiges) Study the proviso “ Critique of Attacks on Databases and Database Defence Techniques” (ISSN 2250-2459) available on https://pdfs.semanticscholar.org/d9b9/cf28733684fbc679c3517f69a12241942b93.pdf , then reflect the subjoined questions: A. Evaluate three types of attacks that command target a database oriented notice arrangement (15 vestiges) B. Excite three techniques which can be used to guard the database from the attacks you feel evaluated. (15 vestiges ) T3: (20+10=30 vestiges) One of the main vestibule to tool database defence is “guard in profundity”. Referring to some critiqueed conversant, reflect the subjoined: A. Debate the concept of guard in profundity in a database defence erection. (10 vestiges) B. Recommend and debate 5 layers to be moderate in the database defence erection. (20 vestiges) T4: (30 vestiges) Assume You are operationing as a database defence director in a hospital where a database oriented notice arrangement is in use. One province of DBA is to administer the user admittance and user profiles among the DBMS. Pershape the subjoined exercises by letter the appertinent SQL statements: a. Identify and invent at definite three apt roles of the hospital and stipulate appertinent exculpation for all the three identified roles delay appertinent engageences. (6 vestiges) b. Invent at definite two (2) profiles delay embezzle defence system (6 vestiges) c. Invent at definite three (3) users and attribute embezzle profiles from the profiles that you feel inventd aloft. (6 vestiges) d. Grant the embezzle roles from the three inventd roles to the users that feel been inventd aloft and excuse your retort. (6 vestiges) e. Critically excite the role of lapse and impermanent tablespaces. (6 Marks) MEC_AMO_TEM_034_01 Page 2 of 10 Database Defence (COMP 0336A)-Spring 20-CW1 (ASSMNT)-All-QP Rules & Regulations:      All contrivances should be cited using CU Harvard indicate. The conclusive attributement must feel a Title page, Table of Contents, References/ bibliography using CU Harvard Indicate and page bulk. Title Page must feel Assignment Name, Module indicate, Session, your indicate, ID, and the indicate of the donation. Softcopy in term shapeat is to be complyted through Turnitin be-mixed on Moodle. Viva accomplish be conducted subjoined the attributement patience as per the determinations certified antecedent. Guidelines:  Assignment must be computer typed.  Font - Times New Roman  Font – Indicate - Regular  Font - Size - 12  Heading should be delay Font Size 14, Bold, Capital and Underline.  Explain delay expend diagrams wherever required. Diagrams must be drawn using expend software or by pencil. Each scholar has to do the attributement severially / Students feel to do the attributement collaboratively and each scholar should transcribe a small reflecting on their gift and conversances from store operation. You can engage books in eLibrary or use internet contrivance. But you should not cut and paste representative from internet nor stipudeceased photocopied representative from books. The attributement retorts should be in your own terms subjoined construction the substance from the aloft contrivances.   Important Policies to be followed 1. Scholar Academic Truthfulness Policy*: MEC upholds the temper of academic truthfulness in all shapes of academic operation and any shape of deflection of academic truthfulness shall summon censorious retribution. Any favor obtained by indulging in the act of deflection of academic truthfulness shall be cancelled. All circumstances of deflection of academic truthfulness on the sever of the scholar shall lapse underneathneath any of the below mentioned categories: 1. Plagiarism 2. Malpractice 3. Ghost Writing 4. Collusion 5. Other circumstances MEC_AMO_TEM_034_01 Page 3 of 10 Database Defence (COMP 0336A)-Spring 20-CW1 (ASSMNT)-All-QP If the scholar trips a module and has a proven circumstance of acade mic truthfulness deflection in this module, the scholar is required to re-register the module. This is ry to primary and relieve offenders of plagiarism. 1. Plagiarism A. Primary injury of plagiarism I. If a scholar is caught primary era in an act of plagiarism during his/her career of consider in any attributement other than design operation, the scholar accomplish be known to re -comply the assignment uniformly, among a ultimatum continuance of one week. However, a retribution of conclusion of 25% of the vestiges obtained for the resubmitted operation accomplish be imposed. II. Period of re-submission: The scholar accomplish feel to re-comply the operation one week from the determination he or she is advised to re-submit. III. If the re-submitted operation is so base to be plagiarized, then that duty accomplish be awarded a naught vestige. Re-patience of the operation more the ultimatum continuance of one week accomplish not be genuine and the duty accomplish be awarded a naught vestige. B. Relieve injury of plagiarism If any scholar is caught relieve era in an act of plagiarism during his/her career of consider (in a subjoined semester), the scholar accomplish undeviatingly be awarded naught for the operation in which plagiarism is detected. In such circumstances, the scholar accomplish not be known to recomply the operation. A warni ng of deprivation shall be issued, and scholar has to badge an underneathtaking and underneathgo counselling compact in such circumstances. 2. Malpractice/Ghostwriting/Collusion A. Primary injury of Malpractice/Ghostwriting/Collusion If a scholar is caught in an act of Malpractice/Ghostwriting/Collusion for an duty factor irrespective of careeroperation or end semester, the scholar shall trip the module and shall be required to re-register the module B. Relieve Injury of Malpractice/Ghostwriting/Collusion If a scholar is caught a relieve era in an act of Malpractice/Ghostwriting/Collusion for an duty factor irrespective of careeroperation or end semester, the scholar shall trip the module. A notice of deprivation shall be issued, and scholar has to badge an underneathtaking and underneathgo counselling compact in such circumstances. 3. Third Injury of Academic Truthfulness Violation If a scholar is caught a third era in an act of Academic Truthfulness Deflection for an duty factor irrespective of careeroperation or end semester (in a subjoined semester), the scholar shall trip the module and so shall be pendulous for one semester from the College, as recommended by institutional equalize academic committee, Chaired by the Associate Dean, Academic Affairs. MEC_AMO_TEM_034_01 Page 4 of 10 Database Defence (COMP 0336A)-Spring 20-CW1 (ASSMNT)-All-QP 4. Fourth Injury of Academic Truthfulness Violation: If a scholar is caught a fourth era in an act of Academic Truthfulness Deflection for an duty factor irrespective of careeroperation or end semester (in a subjoined semester), the scholar shall trip the module and so shall be expelled from the College, as recommended by institutional equalize academic committee, Chaired by the Associate Dean, Academic Affairs. 5. Other circumstances If a scholar commits an act of academic truthfulness deflection as per the determination of “other circumstances” mentioned in the preceding minority or of a unanalogous erection, scholar’s circumstance shall be forwarded to an institutional equalize academic committee, Chaired by the Associate Dean, Academic Affairs. The committee shall canvass the circumstance by instrument of a viva and/or a disciplinary hearing and shall take embezzle conclusion. The retribution that can be supposing to a proven circumstance of academic truthfulness deflection which lapses in this mode of “other circumstances” can be a notice/factor naught/ module fail/suspension/expulsion depending on the erection and dismally of the injury. 6. Types/Variations of Cases: I. II. III. IV. If plagiarism is detected in any factor of one duty, the conclusion in vestiges accomplish be ry for the total duty, flush if merely the factor or sever patience sole needs to be resubmitted. If plagiarism is detected in a store duty, all scholars of the store accomplish be reflected as having committed an act of plagiarism and the system accomplish then be applied to all scholars If plagiarism is detected in any factor of a store duty, the conclusion in vestiges accomplish be ry for the total duty flush if merely the factor or sever patience sole needs to be resubmitted. All scholars of the store would be reflected as having committed an act of plagiarism and the system accomplish then be applied to all the scholars of the store. If the duty consists of factors or sever patiences that could be a store duty factor (e.g. store attributement) and an peculiar duty factor (e.g. peculiar reflection), the subjoined accomplish be ry: a. If plagiarism is detected in the store duty factor, all scholars of the store accomplish be reflected as having committed an act of plagiarism, The system accomplish then be applied to all scholars of the store. Store duty factor accomplish be resubmitted as per the system. b. If plagiarism is detected in the peculiar duty factor, the peculiar duty factor accomplish be resubmitted and the system accomplish then be applied to that scholar sole. c. For twain (a) and/or (b), the conclusion in vestiges accomplish be ry for the total assessment. * for aid points Engage to MEC Scholar Academic Truthfulness System in Scholar Handbook. MEC_AMO_TEM_034_01 Page 5 of 10 Database Defence (COMP 0336A)-Spring 20-CW1 (ASSMNT)-All-QP 2. Deceased Patience Regulations: It is the scholars’ province to curb all apt eralines akin to dutys . As per the Duty System at MEC, deceased patiences are known for one week (5 operationing days) for all UG modules delay a retribution. In such circumstances, a conclusion of 5% of the vestiges obtained for the submitted operation shall be imposed for each operationing day subjoined the definite determination of patience till the determination of objective patience. Duty instruments complyted more a continuance of one week (5 operationing days) subjoined the definite determination of patience accomplish not be genuine and accomplish be awarded a naught for that duty. In circumstances where the patience has been deceased due to extenuating circumstances, the scholar may be loose to comply the operation delayout august the deceased patience system formal aloft. The adequate continuance of patience accomplish be one week from the ancient definite determination of patience. In such circumstances, the scholar is expected to comply the sustaining certificates on or antecedently the ancient definite determination of patience of the duty and the conclusion of extension rests delay donation lawful for the duty .The deceased patience system shall be applied if the scholar trips to comply the operation among one week of the ancient definite determination of submission. Students may contiguity their teachers for percolation on biased points of the patience era if required. 3. Elimination Ethics and Bioinsurance Policy To guard and deference the hues, good-natured-manners, sanity, insurance, and concealment of elimination topics complicated including the prosperity of animals and the truthfulness of environment, all scholar designs are expected to be underneathtaken as per the MEC Elimination Ethics and Bioinsurance Policy. Accordingly the subjoined shall engage.  Research and other accomplishment activities shall be conducted by maintaining the eminent ethical standards accordant delay exoteric and interexoteric standards and conventions.  Any elimination at MEC that is categorized as eminent-risk elimination shall be topic to critique and plaudit by the Elimination Ethics and Bioinsurance Committee.  Research activities involving store of anthropological or animal tissues and molding of microbial, animal or intentiont cells shall be topic to critique and plaudit by the Elimination Ethics and Biosafety Committee.  Participants complicated in elimination must be certified encircling the design of elimination and calculated uses of elimination findings. Written submit must be obtained from herd complicated preceding to the commencement of elimination.  Data obtained from severicipants must be treated delay eminent belief and should be used merely for the calculated design of elimination. Assessment Evaluation Criteria MEC_AMO_TEM_034_01 Page 6 of 10 Database Defence (COMP 0336A)-Spring 20-CW1 (ASSMNT)-All-QP Classification And % Dispose Outstanding Excellent Very Good-natured Quality Good (Acceptable) Adequate/ Satisfactory Reflection and critical analysis. Highly competent analytical skills and reflective practice, demonstrating personal learning and growth, insight into required professional values and (all conversance outcomes not adequately met) Referencing and Bibliography Evidence of Reading Presentation, Grammar and Spelling Evidence of balbutiation an extensive dispose of educational literature/elimination and where ry workplace strategies, policies and procedures. Accurate engageencing and bibliography rectifyly using embezzle referencing indicate Excellent gift, logically erectiond, using rectify language and spelling, praiseworthy crossreferencing and be-mixeds to sustaining illustration Excellent conversance and construction of principles and concepts and /or praiseworthy conversance and Evidence of balbutiation a wide range of educational literature/research and where applicable, Appropriate referencing and bibliography rectifyly using appropriate referencing indicate Good presentation, competently structured, using rectify language and spelling, obvious and facile to insight into required professional values, principles and competencies and professional development planning. understanding of the collision of scheme in practice workplace strategies, policies and procedures. Good use of analytical skills and reminiscent exercise demonstrating personal learning and growth, insight into required professional values, principles and competencies and professional development planning. Acceptable use of analytical skills and reminiscent exercise demonstrating personal learning and growth, insight into required professional values, principles and competencies and professional development planning. Adequate use of analytical skills and reminiscent exercise demonstrating personal learning and growth, insight into required professional values, principles and competencies and Good conversance or key principles and concepts and/or good-natured-natured conversance of the collision of scheme in practice Evidence of balbutiation a good-natured range of educational literature/research and where ry operationplace strategies, policies and procedures. Generally polite engageenced delay rectify use of the appropriate referencing style Reasonable gift, completely structured, satisfactory language and spelling, satisfactory be-mixeds to sustaining illustration Acceptable conversance of key principles and concepts and/or conversance of the collision of scheme in practice Evidence of balbutiation an appropriate dispose of educational literature/research and where ry, apt workplace policies and procedures Adequate referencing. Generally respectful use of appropriate referencing style Adequate gift and structure, acceptable language and spelling, adequate links to sustaining illustration Adequate conversance of key principles and concepts and/or satisfactory illustration of the collision of scheme in exercise. Evidence of minimal reading of educational literature/research and where ry apt workplace policies and procedures Adequate referencing. Appropriate referencing indicate used but may contain some inaccuracies. Weak presentation , satisfactory structure, language and spelling, be-mixeds to sustaining illustration Little illustration of conversance of key principles or concepts and/or dirty illustration of Little or no illustration of balbutiation without of the career textbook and/or reference to apt operation Little or no engageencing, inrectify indicate, or very inrespectful use of embezzle engageencing Poor gift, language and spelling, be-mixeds to sustaining illustration the collision of scheme in practice place policies and procedures style principles and professional development intentionning. Strong analytical skills and reminiscent exercise used, demonstrating personal learning and growth, professional development planning. Little use of analytical skills and reminiscent exercise demonstrating personal learning and growth, Weak /Poor Knowledge and Understanding/ Application of Theory Extensive conversance and profundity of construction of principles and concepts and /or outstanding collision of scheme in practice. insight into required competencies and/or professional development planning. Professional values and principles not reflected in the patience. and/or Insufficient/no use of analytical skills and reflective practice demonstrating personal learning and growth, and/or and/or No illustration of conversance of key principles or concepts and/or no illustration of collision of scheme in exercise No illustration of balbutiation without of the career textbook and/or engageence to apt operationplace policies and procedures use be-mixeds to sustaining evidence and/or Unacceptable presentation, language and spelling, erection is very unsatisfactory, be-mixeds to sustaining illustration insight into required competencies and professional development planning MEC_AMO_TEM_034_01 Page 7 of 10 Database Defence (COMP 0336A)-Spring 20-CW1 (ASSMNT)-All-QP COMP 0336A – Database Defence (Assignment) – Spring 2020 Student Name: _________________________ Scholar ID: _____________________________ Task 1 0 1-10 Total Mark (10) Submitted Operation Proposition delay: Work Proposal No Work Proposal submitted     Understanding on deliverables – a small designation of deliverables/output for exercise 2 to exercise 4 General overview of incomplete intention - moderate construction of explanation to exercise 2 to exercise 4 Time course for store of each exercise Appropriate engageences T2.A 0 1-5 6-10 11-15 Evaluation of defence attacks Irapt , plagiarized Very weak retort , attacks mentioned without explanation , less than 3 attacks , identified attacks out of the loving resource Medium equalize attempt, attacks required more deep partition , missing students own evaluation on all attacks Good equalize answer ,embezzle and clear identification and partition of attacks , good-natured students evaluation T2.B 0 1-5 6-10 11-15 Analysis of Security mechanisms Irapt , plagiarized Very weak answer, security mechanism ...
Purchase retort to see full attachment

[ad_2]
Source be-mixed