Prepared by: Dr. Deepani Guruge XXXXXXXXXXModerated by: Dr. Wanod Kumar March, 2022 Assessment Details and Submission Guidelines Unit Code BN204 Unit Title Database Technologies Term, Year T1, 2022...

1 answer below »
Assignment is due on 1st of April 2022


Prepared by: Dr. Deepani Guruge Moderated by: Dr. Wanod Kumar March, 2022 Assessment Details and Submission Guidelines Unit Code BN204 Unit Title Database Technologies Term, Year T1, 2022 Assessment Type Assignment 1 (Individual Assessment) Assessment Title Developing and Managing Databases Assessment Author Dr. Deepani Guruge Purpose of the assessment (with ULO Mapping) The purpose of this assignment is to develop skills in managing data in databases and to gain understanding of data model development and implementation using a commercially available database management system development tool. On completion of this assignment students will be able to: a. Describe issues related to the integrity and security of database (DB) systems. Weight 5% of total assessment for the unit Total Marks 20 marks Word limit 400 – 600 words Due Date This assignment Due date is WEEK 3, 10th April 2022, before 11.50 PM Submission Guidelines Submit following on Moodle. Submit 2 files o Database created o MS Word document with answers to Question1 and 2 and Save MS word document as below. “BN204_2022_Assigment1_your_name.doc”.  The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.5 cm margins on all four sides of your page with appropriate section headings.  Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style. Extension  If an extension of time to submit work is required, a Special Consideration Application must be submitted directly to the School's Administration Officer, in Melbourne on Level 6 or in Sydney on Level 7. You must submit this application three working days prior to the due date of the assignment. Further information is available at: http://www.mit.edu.au/about-mit/institute-publications/policies-procedures- and-guidelines/specialconsiderationdeferment Academic Misconduct  Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at: http://www.mit.edu.au/about- mit/institute-publications/policies-procedures-and-guidelines/Plagiarism- Academic-Misconduct-Policy-Procedure. For further information, please refer to the Academic Integrity Section in your Unit Description. http://www.mit.edu.au/about http://www.mit.edu.au/about http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure BN204 Database Technologies Page | 2 Prepared by: Dr Deepani Guruge Moderated by: Dr. Wanod Kumar March, 2022 Assignment Description (20 Marks) Answer All Questions. 1. This question requires you to research online to search details about these topics given in question 1 (a), (b) and answer the following questions. Answer with at least 250 - 400 words using suitable citations and references for the materials you used for this work. Use IEEE reference style. a. Assume that you are working as an IT specialist in an organisation and they are developing a web site that connects to their sales database. Some of the SQL queries are embedded in the page. What security threat, if any, are you most likely to face? [ 5 marks] b. You noticed that database system contains highly sensitive data. Security of the data will take priority over database processing speed. Discuss database protection techniques that can be employed here. [ 5 marks] 2. The snapshot of online product hire system database structure is given below. It is a database that keeps track of information about the product bookings, customers, payments etc. In the Figure 1 part of the database structure is given. The primary keys (PK), Foreign Keys (FK or PF) are marked in the following snapshot of database, shown in Figure 1. a. Create the following database structure with all attributes given in the database structure and the relationship between the two tables. Use MS Access.  Populate those tables with suitable data (at least 3 records per table). You can use datasheet view in MS Access to enter suitable data records.  Include Proper foreign keys to create relationships in between tables. Hint: If you want to create a one-to-many relationship in your database, include one side primary key in the many side table as foreign keys. [ 5 marks] Figure 1: Snapshot of online product hire system database structure © Database Answers Ltd b. Describe what may happen when you try to insert duplicate Customer_Id (insert same customer ID into another record) in the Customer table. Explain the reason for your observation. [ 5 marks] NB: This is an individual assignment; it should be your own individual work (You should not copy Ms Access Database). If not, it is considered as cheating and you will get zero marks for the whole assignment. BN204 Database Technologies Page | 3 Prepared by: Dr Deepani Guruge Moderated by: Dr. Wanod Kumar March, 2022 Marking criteria Marks are allocated for each part as below. Section Description of the section Marks Question 1 MS Word document with answers to questions related to database security. Use IEEE reference style. 10 Question 2 Develop data model and checking integrity constraints. Upload your database on submission link 10 Total marks 20 Marking Rubric for Assignment 1 –Total Marks 100 Grade/ Mark Excellent 100% Very Good 80% Good 60% Satisfactory 40% Unsatisfactory 0%-20% Question 1 Database Security Demonstrated excellent ability to think critically. Demonstrated ability to think critically. Demonstrated reasonable ability to think. Demonstrated some ability to think critically but not complete. Did not demonstrate ability to think critically. Question 2- Model building and checking integrity Demonstrated excellent model building ability. Demonstrated model building ability. Demonstrated reasonable model building ability. Demonstrated some model building ability but not complete. Did not demonstrate the model building ability.
Answered 7 days AfterMar 28, 2022

Answer To: Prepared by: Dr. Deepani Guruge XXXXXXXXXXModerated by: Dr. Wanod Kumar March, 2022 Assessment...

Diipti answered on Mar 31 2022
97 Votes
1(a). When we are developing a website that has SQL queries embedded, we may face SQL injection.
SQL injection is a web security vulnerability that allows an attacker to interfere with the queries that an application makes to its d
atabase. It is an attack that leverages an injection technique to manipulate or further exploit SQL based database [1]. It can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file system and in some cases issue commands to the operating system.
Some common SQL injection examples include:
· Retrieving hidden data, where SQL query can be modified to return additional results.
· Subverting application logic, where a query can be changed to interfere with the application's logic.
· UNION attacks, where data can be retrieved from different database tables.
· Examining the database, where information about the version and structure of the database can be extracted.
· Blind SQL injection, where the results of a query controlled by an authorized user are not returned in the application's responses [2]
SQL injection in different parts of the query:
Most SQL injection vulnerabilities arise within the WHERE clause of a SELECT query. But SQL injection vulnerabilities can in principle occur at any location within the query, and within different query types. The most common other locations where SQL injection arises are:
· In UPDATE statements, within the updated values or the WHERE clause.
· In INSERT statements, within the inserted values.
· In SELECT statements, within the table or column name.
· In SELECT statements, within the ORDER BY clause [3]
Defense against SQL Injection Attacks:
· Make sure that all the web application software components are updated with the latest security patches or updates without leaving any place for vulnerabilities. 
· Try not to use the shared database accounts among various web applications or sites.
· Monitor the SQL statements from the web applications to identify any vulnerability.
· Discard any database functionality, which is no longer in use so that it can be prevented from being misused by hackers and limit the area for the SQL attack. 
·...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here