Exercise-1: UNDERSTAND Based on what you understood in this unit, and using your research skills, answer the following questions: 1. What is a threat? 2. What is vulnerability? 3. What are the three components of the C.I.A. triad? What are they used for? 4. If the C.I.A. triad is incomplete, why is it so commonly used in security? 5. Describe the critical characteristics of information. How are they used in the study of computer Security? I Parti: Think of entities First thing we need to consider, is what parties are involved in this process. Later, each party or entity will have its own table in your database Ask yourself, what entities you need to store and track their information later in the system. Exercise Select all the options that you think it's an entity in the system. In other words, what tables you will have in your database a. Driving center b. Driving instructor c. Trainees d. Available cars In this case scenario, we aim to design a single database for specific driving center and not to generalize the design over many centers. Now, do you still think "Driving center" is a necessary entity? Yes/No, justify your answer. Part2- Think of Data and properties Databases are created to store information about the entities you need to track across the system. Each piece of information can roughly be called a property. Each property has a data type which indicate the type of data will be stored in that property (i.e. number, char, date...etc). In this part , you will be asked to think of what kind of information you suggest for each entity/table. Knowing that, each property represents a column in the table. Exercise Suggest column for each table: 1- Driving instructor 2- Trainees 3- Available cars Each table in the database should have a unique column that represents identical data rows, which used also to create relations between the tables, and preserve data integrity. This unique column is called primary key. Exercise udalone table for Think of car