The course is database design, when you submit the work i need you to send me two separate file which is for part 1 and part 2, please follow the steps. Use PHP. i need you to send me 2 zip files and...

1 answer below »
The course is database design, when you submit the work i need you to send me two separate file which is for part 1 and part 2, please follow the steps. Use PHP. i need you to send me 2 zip files and name the first file part 1 and it should include all the files source file class file, bat, txt and second file name it part 2 , it should include all the files source file class file, bat, tx. I’m going to do the presentation so i need a powerpoint slide of your work with speaker notes just for part 2.


The course is database design, when you submit the work i need you to send me two separate file which is for part 1 and part 2, please follow the steps. Use PHP. i need you to send me 2 zip files and name the first file part 1 and it should include all the files source file class file, bat, txt and second file name it part 2 , it should include all the files source file class file, bat, tx. I’m going to do the presentation so i need a powerpoint slide of your work with speaker notes just for part 2. Check out examples below how to do the demo video, Examples of previous projects: https://www.youtube.com/watch?v=J5rxAaTCcjU&feature=youtu.be https://www.youtube.com/watch?v=lNZJQYIQmco https://www.youtube.com/watch?v=NEejGx4xk7U Comp 440 Description Consider the design of the following database system for managing a social network website: each user is registered with the website with a username, password, first name, last name, and an email. Username and email are unique. Each user is associated with a list of hobbies selected from the following list: hiking, swimming, calligraphy, bowling, movie, cooking, and dancing. A user can follow a list of other users and can also be followed by another list of users. See https://steemit.com/ for an example. Moreover, a user can post a blog. Given a blog, another user, and only another user, can give a comment to the blog. To ensure the quality of the website, each user can post at most 2 blogs a day, and each user can give at most 3 comments in one day. For each blog, the user who posted the blog cannot give any comment (no self-comment), and another user can give at most one comment. Each blog is identified by a blogid, subject, description, and a list of tags for search purposes. Each comment is identified by a commentid, a sentiment (positive or negative), and a description. For all parts of this project, your system must be either desktop or web application. Some simple GUI interfaces are required for each functionality. All functionalities must be performed via the interface of your application; direct SQL statement execution via any tools (e.g., MySQL workbench) is not allowed. Part 1, use PHP Use Java/C#/PHP/Python and SQL, implement the following functionality: 1. (5 pts) Implement a user registration and login interface so that only a registered user can log in to the system. You must prevent SQL injection attacks. 2. (5 pts) Sign up for a new user with information such as: username, password, password confirmed, first name, last name, email. Duplicate username and email should be detected and fail the signup. Unmatching passwords should be detected, as well. How to submit: 1. The source code package. All files (source codes, class files, bat, and txt) should be contained in a war or zip file called comp440_xx_part1.zip for a team whose team name is xx submitted via Canvas. Team name is helawi Part 2, use PHP Part 2 emphasizes the programming of GUI interfaces and design and their integration with database operations. Complete step 1 manually and then implement the following functionalities (steps 2, 3 and 4) using your programming language and SQL with necessary GUI interfaces. 1. (6 pts) Draw the project ER diagram and implement your project relational database. Make sure you will have enough tables for your project. Having only ONE table is not acceptable. 2. (10 pts) Implement a button called “Initialize Database”. When a user clicks it, all necessary tables will be created (or recreated) automatically, with each table be populated with at least 5 tuples so that each query below will return some results. All students should use the username “comp440”, and possibly the password “pass1234”. 3. (10 pts) Implement a GUI interface so that a user can insert a blog such as Subject: The future of blockchain Description: Blockchain is a buzzword nowadays. … Tags: blockchain, bitcoin, decentralized The ids of the blogs should be generated automatically using the autoincrement feature of MySQL. Make sure that a user can only insert 2 blogs a day. 4. (10 pts) Select a blog from the above list; one can write a comment like the following: A dropdown menu to choose “Negative” or “Positive,” and then a description such as “This is a nice blog. I like the comparison between blockchain and the Internet.”. Make sure that a user can give at most 3 comments a day and, at most, one comment for each blog and not to his own blog. How to submit: 1. The source code package. All files (source codes, class files, bat, and txt) should be contained in a war or zip file called comp440_xx_part2.zip for a team whose team name is xx submitted via Canvas. Team name is helawi 2. create slides for your presentation Use a recorder: https://www.apowersoft.com/free-online-screenrecorder. And send me your video. I only need you to record your screen and your voice for the project demo, not your face. If you are not comfortable recording your voice please create slides for project demo with speaker notes so that I can do the presentation by myself. CS327E: Elements of Databases - Cybersecurity and SQL Injection CS327E: Elements of Databases Cybersecurity and SQL Injection Dr. Bill Young Department of Computer Sciences University of Texas at Austin Last updated: October 31, 2016 at 12:21 CS327E SQL Injection Slideset: 1 SQL Injection What I’d Like to Discuss Why cyber security is Important Why cyber security is hard SQL Injection CS327E SQL Injection Slideset: 2 SQL Injection From the Headlines Silent War, Vanity Fair, July 2013 On the hidden battlefields of history’s first known cyber-war, the casualties are piling up. In the U.S., many banks have been hit, and the telecommunications industry seriously damaged, likely in retaliation for several major attacks on Iran. Washington and Tehran are ramping up their cyber-arsenals, built on a black-market digital arms bazaar, enmeshing such high-tech giants as Microsoft, Google, and Apple. CS327E SQL Injection Slideset: 3 SQL Injection From the Headlines U.S. Not Ready for Cyberwar Hostile Attackers Could Launch, The Daily Beast, 2/21/13 Leon Panetta says future attacks could plunge the U.S. into chaos. We’re not prepared. If the nightmare scenario becomes suddenly real ... If hackers shut down much of the electrical grid and the rest of the critical infrastructure goes with it ... If we are plunged into chaos and suffer more physical destruction than 50 monster hurricanes and economic damage that dwarfs the Great Depression ... Then we will wonder why we failed to guard against what outgoing Defense Secretary Leon Panetta has termed a “cyber-Pearl Harbor.” CS327E SQL Injection Slideset: 4 SQL Injection The U.S. at Risk? Experts believe that U.S. is perhaps particularly vulnerable to cyberattack compared to many other countries. Why? CS327E SQL Injection Slideset: 5 SQL Injection The U.S. at Risk? Experts believe that U.S. is perhaps particularly vulnerable to cyberattack compared to many other countries. Why? The U.S. is highly dependent on technology. Sophisticated attack tools are easy to come by. A lot of critical information is available on-line. Critical infrastructure may be accessible remotely. Other nations exercise more control over information and resources. CS327E SQL Injection Slideset: 6 SQL Injection How Bad Is It? Cyberwarfare greater threat to US than terrorism, say security experts, Al Jazeera America, 1/7/14 Cyberwarfare is the greatest threat facing the United States — outstripping even terrorism — according to defense, military, and national security leaders in a Defense News poll. 45 percent of the 352 industry leaders polled said cyberwarfare is the gravest danger to the U.S., underlining the government’s shift in priority—and resources—toward the burgeoning digital arena of warfare. CS327E SQL Injection Slideset: 7 SQL Injection Is Cyber Security Particularly Hard? Why would cybersecurity by any harder than other technological problems? CS327E SQL Injection Slideset: 8 SQL Injection Is Cyber Security Particularly Hard? Why would cybersecurity by any harder than other technological problems? Partial answer: Most technological problems are concerned with ensuring that something good happens. Security is all about ensuring that bad things never happen. To ensure that, you have to know what all the bad things are! CS327E SQL Injection Slideset: 9 SQL Injection Cyber Defense is Asymmetric In cybersecurity, you have to defeat an actively malicious adversary. The defender has to find and eliminate all exploitable vulnerabilities; the attacker only needs to find one! CS327E SQL Injection Slideset: 10 SQL Injection Cyber Security is Tough Perfect security is unachievable in any useful system. We trade-off security with other important goals: functionality, usability, efficiency, time-to-market, and simplicity. CS327E SQL Injection Slideset: 11 SQL Injection Is It Getting Better? “The three golden rules to ensure computer security are: do not own a computer; do not power it on; and do not use it.” –Robert H. Morris (mid 1980’s), former chief scientist of the National Computer Security Center “Unfortunately the only way to really protect [your computer] right now is to turn it off, disconnect it from the Internet, encase it in cement and bury it 100 feet below the ground.” –Prof. Fred Chang (2009), former director of research at NSA CS327E SQL Injection Slideset: 12 SQL Injection Some Sobering Facts There is no completely reliable way to tell whether a given piece of software contains malicious functionality. Once PCs are infected they tend to stay infected. The median length of infection is 300 days. “The number of detected information security incidents has risen 66% year over year since 2009. In the 2014 survey, the total number of security incidents detected by respondents grew to 42.8 million around the world, up 48% from 2013—an average of 117,339 per day.” (CGMA Magazine, 10/8/2014) CS327E SQL Injection Slideset: 13 SQL Injection The Cost of Data Breaches The Privacy Right’s Clearinghouse’s Chronology of Data Breaches (January, 2012) estimates that more than half a billion sensitive records have been breached since 2005. This is actually a very “conservative estimate.” The Ponemon Institute estimates that the approximate current cost per record compromised is around $318. “A billion here, a billion there, and pretty soon you’re talking real money” (attributed to Sen. Everett Dirksen) CS327E SQL Injection Slideset: 14 SQL Injection How Bad
Answered 3 days AfterApr 11, 2022

Answer To: The course is database design, when you submit the work i need you to send me two separate file...

Anurag answered on Apr 12 2022
94 Votes
PowerPoint Presentation
ER Diagram
1
After Clicking the Initialise Database. It will create datab
ase and table. If database if present it will remove it and create new one.
2
Login Panel
3
Registration Panel which check unique Username and Email as a validation
4
After Login. This is the...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here