SECURING INTERCONNECTED RELATIONAL DATABASE CASE STUDY OF HARVARD UNIVERSITY

Document Type:Research Paper

Subject Area:Technology

Document 1

DATE……………… School (…) Department (…) Program (…) Acknowledgments First I would like to give special thanks to my supervisor (………………) for his continued encouragement and support in writing of this proposal. He has contributed a lot in helping me understand how am going to carry out the project, through the tireless contribution he made. Without his support, I think I will not succeed in carrying out the study. May God continue to bless and continue to increase him. Secondly, the journey of this master is not easy. All the glory and honor be to the almighty God for giving me such a wonderful opportunity of pursuing this master. Am grateful DEDICATION This study will be dedicated to my mum and dad. They occupy a special part in my life, and they always inspire me to keep going high.

Sign up to view the full document!

I will also like to dedicate it to my girlfriend for her continued moral support. LIST OF ABBREVIATIONS ALU……………………………. The system defines, construct and manipulate databases for different applications. Database security can be referred to as specialist topic that deals with the security of the computer, security of information as well as management of risk in any organization that is using computers as its mean of data storage. These security risks include Unauthorized or unintentional action or misappropriation by lawful database users, administrators of the database, or system/classifications managers, or by unlawful users or hackers. There are various risks that are involved with the insecurity of a database. For example, unsuitable access, Malware contagions, leak or exposing personal or registered data, the omission of or damaging data or programs, disruption or disowning of authorized admittance to the database, overloads risks, capacity performance constraints as well as physical damage.

Sign up to view the full document!

3 OBJECTIVE OF THE STUDY 15 1. 4 RESEARCH QUESTION 16 1. 5 SIGNIFICANCE OF THE STUDY 16 1. 6 SCOPE OF THE STUDY 17 1. 7 JUSTIFICATION OF THE STUDY 18 1. 2 Computability theory 28 2. 3 Complexity theory 28 2. 5 CONCEPTUAL FRAMEWORK 30 Chapter 3 : METHODOLOGY 31 3. 0 INTRODUCTION 31 3. 1 RESEARCH DESIGN 31 3. 12 DATA COLLECTION PROCEDURES 37 Chapter 1 : INTRODUCTION ​ 1. 0 INTRODUCTION A computer is an electronic device that is used for processing, storing and retrieving a large amount of data. The innovation of a computer has been a big process, taking place one after the other. Charles Babbage invented the first computer which had a different engine with the one we use today. That was back in 1822. The research looked at relational database system. This is a type of system whose information is stored in the form of tables. These data handles multiple information and queries that are a bit complex.

Sign up to view the full document!

This is because they take a very small space and they are efficient. Due to these reasons, the study looked means of determining the security of interconnection relational database. These products also help in the programming of languages and interface language programming. Design tools are also used to develop run-time subsystem processes. There is also an engine that receives information from different components and translates it in such a way that it can be read or written on a physical media. The approach of a database has different importance over traditional processing of files. This is because, in traditional file processing, each user had to define specific applications and their required files. Recently, there is emerging of a new application for the database.

Sign up to view the full document!

Due to this, various new models of the database have been proposed in dealing with the new application areas. The basis for these approaches includes the object Oriented Programming Philosophy. The development mentioned above tools are used in the construction of a data model. They all provide a new view of the system of information. For instance confidential information of employees. • Flexibility: When updating data, it is only updated once; there is no need of changing multiple files one after the other. It is also simple in extending of a database. In the case where the records grow, the relational database also experiences the growth. • No errors: in this database, there isn’t occurrence of mistakes since they are easily checked against the data.

Sign up to view the full document!

Application of data, therefore, involves various control categories Such as administrative, physical and technical. Database security can be referred to as specialist topic that deals with the security of the computer, security of information as well as management of risk in any organization that is using computers as its mean of data storage. These security risks include Unauthorized or unintentional action or misappropriation by lawful database users, administrators of the database, or system/classifications managers, or by unlawful users or hackers. For example; unsuitable access to complex data, metadata or purposes within folders, or incorrect variations to the program of the database, arrangements as well as configurations of security. Secondly, there are Malware contagions affecting incidents such as illegal access, leak or exposing personal or registered data, the omission of or damaging data or programs, disruption or disowning of authorized admittance to the database, other system attacks and data services failures.

Sign up to view the full document!

This aimed to reduce the challenges faced database insecurities. Specific Objectives  To identify the properties of the relational database management systems  To determine how airtight these databases are from security breaches and being compromised.  To determine what security issues the management systems may be prone to.  To ensure that the systems are protected from security breaches and that the correct protocol to accessing information is followed.  To determine how the key fields can be used to connect a specific data table to another in ​ 1. To the regulators: The study will contribute a lot to the regulators, regarding security purposes as well as determining the challenges that users face in enhancing security. Regulators will also contribute in ensuring those computers used are of a good standard that will enhance security.

Sign up to view the full document!

Regarding discovering the challenges that microfinance undergoes in achieving their growth and this will helps in mending their lending policies in favor of microfinance institutions. 6 SCOPE OF THE STUDY The focus of this study is based on determining the ways of securing the interconnected relational database. The study will be limited in Harvard University (which is one of educational institution in United State). 8 LIMITATION OF THE STUDY The data will be collected only from few departments in the University of Harvard. This makes it difficult to replace all the other educational institutions that are using computers in the country. However, this is a very important step in comparing the results Availability of respondents: There might be difficulties of availability of respondents.

Sign up to view the full document!

This is because most workers are busy in their work during the day and at night busy carrying their evening duties. This can be very expensive and time-consuming for the researcher Respondents’ fatigue: During interviewing of the staffs, respondents may feel like they are being disturbed and a lot of information is being drawn from them. With the explanation given, therefore, they will be comfortable that the motive will be research oriented and not victimization. Confidentiality and privacy of the samples will be ensured by researching with most questions will not be too personal To add on that, Respondents will participate by informed consent. Whereby sufficient information will be provided on taking part to allow them understands the implications of participation.

Sign up to view the full document!

Chapter 2 CHAPTER TWO: LITERATURE REVIEW ​ 2. 0 INTRODUCTION This chapter focuses on a review of theoretical, empirical literature, their critics and conceptual framework on ways of securing the interconnected relational database. ( Garcia 2008) A database can also be thought of as a type of electronic trooping cabinet since it contains digital information (“data”). This information is kept in the determined storage of some kind, characteristically on compelling disks. Operators can insert new data into the folder, and delete, alteration, or they can retrieve the current facts in the database, by requesting or commanding. To the software that controls the database, for instance, the database management system is very important to either the programmer of the application or to the interactive users. These application makes computers to have large database systems that allow storing and retrieving information that is in large amounts.

Sign up to view the full document!

Some of the methods database safety is examined and implemented include: Controlling unauthorized access and practice by executing strong and multifactor contact and control of data management. Secondly, there is the Load testing, and ability testing of a file to ensure is secured from crashing in distributed denial of service. To add on that, there is the physical security of the record attendant and the equipment for backing up data from theft. Another thing is reviewing prevailing system for any recognized or unidentified susceptibilities and defining and applying a roadmap as well as a plan to diminish them (Dikaiaskos et al. , 2009, p. It also assists companies to transmit the said data over the entire systems. Some of the aims why information management systems are significant to include the following: Data management system is necessary for data admittance within the company.

Sign up to view the full document!

Modern file management systems are reliant on a programming dialectal that is called organized query language. This dialectal is used to access, appraise and delete data that are existing in the tables. The folder systems also comprise a program that includes the SQL server. The research tried to look at the schema: a schema is an association or arrangement for a database. It is caused by the activity of modeling. This word originates from the Greek meaning to figure or to form. Schematic is another word which can be used to represent schema of data. It is used to discuss both object-oriented database and relational database. In this model, data is organized into a structure of a tree. This is to imply a single parent for every record.

Sign up to view the full document!

Sibling records are kept in a particular order by a sort of fields. This model was widely used in early days. For example, the IMS that was used by information business management It also considered how those models had been used practically, the different ways of entering data into a database. Garcia wanted to see if a better database can lead to economic development. According to his research, both the data movement and economic development move hand in hand. He constituted that in the case where security of the database is an issue; development cannot take place. He coincidentally gave an example of a bank and said those banks are institutions that contribute a lot towards the growth of the economy.

Sign up to view the full document!

The play this role through providing financial services to their clients, leading to the growth of the economy as their clients invests in other business sectors that will lead to development. Security protections are basic issues to be considered in determining an effective database management system. Considering the research of Garcia, he looked at the effect of a well- managed database on economic development, even if he came up with conclusions that a good database leads to better economic development, he left a lot concerning the contribution of the database. According to my views, he would have looked at the airtight of the databases, the properties of the databases, their issues of management systems their security protections and their key field use.

Sign up to view the full document!

All these are the contribution of a better database management system. 4 THEORETICAL FRAMEWORK The theories included the theory of Automata, computability, and complexity. Automata are often categorized by the period of recognized languages they can identify, characteristically illustrated by the Chomsky hierarchy, describing the relations between several languages and categories of formal logic. 2 Computability theory Computability theory is the subdivision of the theory of calculation that studies which complications are computationally resolvable using dissimilar models of computation. A core query of computer science is to report the limits of figuring devices by considering the problems we can use processors to solve. One of the achievements of 20th era mathematics is that it is likely to show clear restrictions on the ability of processors, even given subjectively vast computational incomes, to solve even apparently simple difficulties.

Sign up to view the full document!

While most of the essential research complications have been looked at, computability theory remains a dynamic field of investigation and is frequently used to determine the computational soulfulness of new ideas in computer science, physics as well as in math ( Dikaiakos, Katsaros, Mehra, Pallis & Vakali 2009) This research aims to familiarize the student with the essentials of computability theory and indulgence at least one subject of intermediary difficulty. one of the computational theory role is to decide the practical boundaries on what processors can and cannot do. Strictly related fields in theoretic computer science are analyzing and computability theory. A key difference between the analysis of procedures and computational complication theory is that the previous is devoted to investigating the number of properties needed by a specific algorithm to solve difficulties, whereas the later enquires a more general query about all likely algorithms that could be managed in solving of the same problem.

Sign up to view the full document!

More specifically, computational difficulty theory tries to categorize problems that can either be solved or cannot be solved completely with appropriately restricted resources. In turn, an impressive restriction on the obtainable resources is what differentiates computational difficulty from computability theory. In this case, data will be a collection in different departments of at Harvard universities. These departments are finance, Information technology, health and administration. During the surveys, a group of respondents will be given questionnaires to answer differently at the same time. These questionnaires will be based on establishing the factors that can lead to a better database management system and the security of the database. The investigation adopts a correlational study design. It is one of the oldest universities in united state.

Sign up to view the full document!

It has contributed a lot in improving the economy of us and wealth of most people through wealth creation and improved education. It is located in the North west of Bostom in a 209 acres of land. This indicates that it is one of the biggest universities in US. It is also a registered university in an association of American universities. According to (Garcia 2014), a population is clear or set of people, facilities, elements, and occasions, group of stuff or families that are being inspected. According to (Coronell & Morris 2016), a population involves an entire group of personalities, events or substances having a mutual observable characteristic. The target population of this research involved all business and institutions that use computers as their means of storing information in the university.

Sign up to view the full document!

5 SAMPLING TECHNIQUES During the collection of data, there are two methods two be applied; we have the stratified technique and the random sampling. A stratified technique is a common probability method used, which is more superior to random sampling. 8 DATA COLLECTION INSTRUMENT The questionnaire guide had both open and closed-ended questions because both the standard and supplementary data are important in our research. There is an introductory letter explaining the importance of the study is being directed for academic purposes. Proper registers of all questionnaires dispersed are kept for simplicity of follow up and also to guarantee a high response ​ 3. 9 VALIDITY Coronel & Morris (2016) define validity as the step of accuracy with which consequences obtained from investigated data signify the reality of the spectacle under study.

Sign up to view the full document!

This implies that to safeguard the validity of the conclusions and results of the projected study, the appliances of a collection of data must collect appropriate and precise data. S. and provides medical services in all major specialties. The reason why the study was carried out in this hospital is, computer services and operations between a hospital and an education institution are a bit different. The process took place properly, and the same is expected with this research. 12 DATA COLLECTION PROCEDURES Once the data is collected, it is going to be examined /edited for accuracy, dependability, and completeness. ), Dikaiakos, M. D. , Katsaros, D. , Mehra, P. , Pallis, G. Impacts of Data Mining on Relational Database Management System Centric Business Environments. International Journal of Computer Applications, 75(3).

Sign up to view the full document!

From $10 to earn access

Only on Studyloop

Original template

Downloadable