CIS111 Syracuse Wk4 SQL Database Administration & Management Concepts Project Description
Word document with summary, diagrams, glossaries, SQL code and screenshots. The format should include a cover page with your name, the course section, and a title. Readability counts! Use clearly identifiable headings to break up the elements of your report. Make sure screenshots fit nicely on the page and the content can be read when viewed on a computer monitor.
You will design and implement a database to solve a data management problem of your choice. Applicable topics can include but are not limited to personal data tracking, commercial enterprise problems, web application backends, academic data management, or inventory tracking. Your instructor will work with you to refine your topic to ensure it covers all of the requirements for the course and is achievable in a reasonable amount of time. The intent is to provide you with an opportunity to work on something of interest to you that should have some real utility as a completed database. This project is broken up into 2 parts. This document describes those parts and there constituent elements.
The first part is the design specifications detailing the data to be tracked and how all of the elements work together. Youll also need to specify any business rules that dictate how the data are to be managed. As in any good development project, youll also want to identify your stakeholders and detail what data they will need to access and maintain. Document at least five data questions your data must answer to be relevant. There will likely be more, but pick five important questions and thoroughly develop those.
The second part is the implementation of the design created in part 1. This will include the SQL statements to create the tables and columns to hold the data and any constraints that implement the business rules. Also included are representative statements for the basic Data Manipulation Language (DML) that implement the create, read, update, and delete statements (referred to as CRUD) used in maintaining your data. The final deliverable will be a complete document including the revised version of part 1 and all of the artifacts generated in part 2.
Part 1 Due Week 4
Begin with a summary of your project. Carefully describe your project and its importance. It is here that you will introduce the reader to your project and set up the business case, high level rules about the data, its stakeholders, and expectations of the final outcome. Edit this summary whenever necessary throughout the project to reflect any changes in scope or content. You should have a brief working version of this summary by Week 2 and this text will initially serve as your project proposal, gradually gaining more detail as you progress through the process.
Fully dress your business rules and identify all of your stakeholders. Gather and provide unrefined representative examples of your data and provide an Entity-Relationship Diagram (ERD) with a glossary describing in readable text the entities, attributes, and relaitionships in your model. IST 659 Database Administration and Database Management Concepts
Normalized Logical Model
Decompose your conceptual model into relations and normalize your relations. Provide a database diagram of your normalized relations. Be specific about how the logical model flows from the conceptual model and explain any additional attributes that arise (surrogate keys, etc). It is in this step that you will make choices about data types. Be clear as to what influenced these decisions. It may not be necessary to elaborate on each and every instance of the choice if you implement database-wide rules. For instance, if you choose to implement all primary keys as surrogate keys using the SQL Server identity property, or any date or time attribute will be implemented using the datetime data type, you do not need to provide that information at the table level. Simply state any such decision at the top of this section.
Part 2 Due End of Course
Physical Database Design
Provide your Data Definition Language (DDL) code to build the database tables and any objects such as stored procedures, views, and functions. Make sure your SQL code has adequate comments throughout that describe what the code does and provide commentary on the object being implemented (what are the paramters, assumptions, and controls on a stored procedure, for example). Also include the necessary code to remove these objects. You should be able to repeatedly execute the code in this section without error.
Provide representative examples of how your data will be created. This should include approximately five to ten INSERT statements to show the commonly acceptable means of entering data using SQL. If a table has defaults, be sure that you have INSERT statements that show how to INSERT when a column value is provided as well as when one isnt and the server is responsible for setting a column to a default. Provide comments as necessary to show the intent of the statement. Once SQL stored procedures are learned, consider coding procedures that abstract these statements and provide control and safety when adding data.
Provide representative examples of how data are manipulated through updates and deletions. Whenever possible, be sure to provide comments that tie the statements to the business rules (for instance, if your business rule states you must mark a customer as on credit hold when their unpaid balance exceeds a credit limit, provide the UPDATE statement that implements this rule and comment on it as such. Once SQL stored procedures and functions are learned, consider coding procedures and functions that abstract these statements and provide control and safety when adding data. For instance, if you implement the rule about customer credit holds, consider coding a function that makes that decision and returns the result of its analysis.
Answering Data Questions
Code and demonstrate through screenshots of results the SELECT statements that answer the data questions posed in the summary. Be sure to comment on these queries. Include the question being answered, any assumptions made by the data, and rationale for any decisions made. As with other IST 659 Database Administration and Database Management Concepts sections, be sure to correlate your code to business rules outlined in the conceptual model. Once views are learned, consider encapsulating these statements into views for greater portability and ease of use.
Using the tool of your choice, build a basic front end that provides a user interface for maintaining and reporting on your data. You can use Access, web technologies such as PHP, or full applications as your skillset and availability allow. As this part will likely be completed near the end of the project, Microsoft Access is a good choice in this course as it provides many mechanisms for rapidly prototyping the interface. In addition to data entry and maintenance screens, provide report output (Access Reports, for example) for the queries that answer your data questions. Include in your final report a screenshot of each screen/form and report with data present in the fields.
To conclude, provide a brief reflection on the process. Some questions to ponder:
a. What assumptions did you have at the start of your project that changed by the end? Think in terms of both your own problem domain as well as your knowledge of the process.
b. The next time you do this, what will be different?
c. Regardless of whether you go through these steps again, how do you think it will inform your approach to data as an information professional?
Those are just priming questions to reflect on. If you have other thoughts and observations you would like to share, be sure to include them.
Combine the work done in parts 1 and 2 into one document for the second deliverable. Take this opportunity to revise anything from part 1 that changed during your work on part2. Add details to your summary to include your implementation. Discuss how you answered the data questions, how you came to choose the user interface tool, and other such things that inform the rest of the report. Instructors Comments:
Score Last published: 3/5/2019 11:20 AM EST
93 / 100 (93.00%)
Super cool database! I made a few notes on your document. Highlights are: Your 1:M relationships are
drawn backwards, there are some inconsistencies between your conceptual and logical models, and you
have a couple instances of using examples of data as columns in your diagrams.
Foster, Charles E.
SYRACUSE UNIVERSITY, IST-659
Cyber Attack Database
Database Administration and Database
Date of Publish
4 February 2019
Cyber Attack Database: Project #1
Part 1 Due Week 4
Begin with a summary of your project. Carefully describe your project and its importance. It is here that
you will introduce the reader to your project and set up the business case, high level rules about the
data, its stakeholders, and expectations of the final outcome. Edit this summary whenever necessary
throughout the project to reflect any changes in scope or content. You should have a brief working
version of this summary by Week 2 and this text will initially serve as your project proposal, gradually
gaining more detail as you progress through the process.
The summary of my project entails designing and implementing a database to solve a data
management problem my organization has with managing cyber security assessments. My organization
is tasked with conducting red team operations on organizations requesting cyber security evaluations. By
designing a database to help with our operations, my organization would be able to keep track of red
team members who initiated the cyber-attack, the type of cyber-attack used, the impact it caused, the
personnel affected, duration of the effect, what information was seized, and help sort through the pros
and cons of the attack. The high-level rules about the data may encompass the confidentially level of
information. Some cyber-attacks, such as phishing campaigns may capture personal identifiable
information (PII) that has to be reported and immediately destroyed. The primary stakeholders of this
database management systems will be the Red Team Leaders, the Red Team Operators, the Red Team
Chief, and the organizations Battalion Commander. The final outcome of this database is to improve my
organizations cyber security assessments by using the historical data provided.
Fully dress your business rules and identify all of your stakeholders. Gather and provide unrefined
representative examples of your data and provide an Entity-Relationship Diagram (ERD) with a glossary
describing in readable text the entities, attributes, and relationships in your model.
All of the stakeholders for this database is as follows: Red Team Leaders, Red Team Operators,
Red Team Chief, and Battalion Commander.
Type of Attack
Time of Attack
Impact of Attack
Name of Organization
Cobalt Strike Program
A * indicates that this attribute identifies the instance of the entity. Well put this on the PK line for
Normalized Logical Model
Decompose your conceptual model into relations and normalize your relations. Provide a database
diagram of your normalized relations. Be specific about how the logical model flows from the conceptual
model and explain any additional attributes that arise (surrogate keys, etc). It is in this step that you will
make choices about data types. Be clear as to what influenced these decisions. It may not be necessary
to elaborate on each and every instance of the choice if you implement database-wide rules. For
instance, if you choose to implement all primary keys as surrogate keys using the SQL Server identity
property, or any date or time attribute will be implemented using the datetime data type, you do not
need to provide that information at the table level. Simply state any such decision at the top of this
The logical model flows from the conceptual model by decomposing attributes into their
constituent parts. First, I started with cyberattacks, and added two foreign keys in the diagram that
established a one to many relationship with target_id and personnel_id. Personnel encompassed
information about the personnel initiating the attack, with a foreign key distinguishing whether that
individual is military, da civilian, or contractor. A surrogate key was established called
personnel_classification to select the true/false status of the type of personnel. The target diagram
provides the description of the target, along with a foreign key linking to the cobalt_strike_program.
The equipment diagram entails the essential equipment needed to complete the mission. Additionally,
cobalt strike is the name of the program used for cyber threat emulations.
Purchase answer to see full
Why Choose Us
Top quality papers
We always make sure that writers follow all your instructions precisely. You can choose your academic level: high school, college/university or professional, and we will assign a writer who has a respective degree.
Professional academic writers
We have hired a team of professional writers experienced in academic and business writing. Most of them are native speakers and PhD holders able to take care of any assignment you need help with.
If you feel that we missed something, send the order for a free revision. You will have 10 days to send the order for revision after you receive the final paper. You can either do it on your own after signing in to your personal account or by contacting our support.
All papers are always delivered on time. In case we need more time to master your paper, we may contact you regarding the deadline extension. In case you cannot provide us with more time, a 100% refund is guaranteed.
Original & confidential
We use several checkers to make sure that all papers you receive are plagiarism-free. Our editors carefully go through all in-text citations. We also promise full confidentiality in all our services.
24/7 Customer Support
Our support agents are available 24 hours a day 7 days a week and committed to providing you with the best customer experience. Get in touch whenever you need any assistance.
Try it now!
How it works?
Follow these simple steps to get your paper done
Place your order
Fill in the order form and provide all details of your assignment.
Proceed with the payment
Choose the payment system that suits you most.
Receive the final file
Once your paper is ready, we will email it to you.
No need to work on your paper at night. Sleep tight, we will cover your back. We offer all kinds of writing services.
You are welcome to choose your academic level and the type of your paper. Our academic experts will gladly help you with essays, case studies, research papers and other assignments.
Admission help & business writing
You can be positive that we will be here 24/7 to help you get accepted to the Master’s program at the TOP-universities or help you get a well-paid position.
Editing your paper
Our academic writers and editors will help you submit a well-structured and organized paper just on time. We will ensure that your final paper is of the highest quality and absolutely free of mistakes.
Revising your paper
Our academic writers and editors will help you with unlimited number of revisions in case you need any customization of your academic papers