Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Exercise-1: UNDERSTAND Based on what you understood in this unit, and using your research skills, answer the following questions: 1. What is a threat? 2.

image text in transcribed
image text in transcribed
Exercise-1: UNDERSTAND Based on what you understood in this unit, and using your research skills, answer the following questions: 1. What is a threat? 2. What is vulnerability? 3. What are the three components of the C.I.A. triad? What are they used for? 4. If the C.I.A. triad is incomplete, why is it so commonly used in security? 5. Describe the critical characteristics of information. How are they used in the study of computer Security? I Parti: Think of entities First thing we need to consider, is what parties are involved in this process. Later, each party or entity will have its own table in your database Ask yourself, what entities you need to store and track their information later in the system. Exercise Select all the options that you think it's an entity in the system. In other words, what tables you will have in your database a. Driving center b. Driving instructor c. Trainees d. Available cars In this case scenario, we aim to design a single database for specific driving center and not to generalize the design over many centers. Now, do you still think "Driving center" is a necessary entity? Yes/No, justify your answer. Part2- Think of Data and properties Databases are created to store information about the entities you need to track across the system. Each piece of information can roughly be called a property. Each property has a data type which indicate the type of data will be stored in that property (i.e. number, char, date...etc). In this part , you will be asked to think of what kind of information you suggest for each entity/table. Knowing that, each property represents a column in the table. Exercise Suggest column for each table: 1- Driving instructor 2- Trainees 3- Available cars Each table in the database should have a unique column that represents identical data rows, which used also to create relations between the tables, and preserve data integrity. This unique column is called primary key. Exercise udalone table for Think of car

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Online Market Research Cost Effective Searching Of The Internet And Online Databases

Authors: John F. Lescher

1st Edition

0201489295, 978-0201489293

Students also viewed these Databases questions