College Or University Name, Team System Plan Course Isol 536

College Or University Nameteam System Plancourse Isol536 Securit

Develop a team system plan for a course project using MS Access that includes details about the university, team members, system requirements, relationships, reports, security, and recommendations. Create a threat model diagram, input sample data into tables, password protect the MS Access file, and provide future system enhancement suggestions.

Paper For Above instruction

Introduction

The development of a comprehensive team system plan for a university course project necessitates meticulous planning and detailed documentation. This process involves defining the institutional context, establishing team roles, specifying system requirements, designing relational models, generating reports, implementing security measures, and proposing future enhancements. This paper delineates each step of creating a robust MS Access system tailored for an academic environment, emphasizing security, data integrity, and scalability.

Institutional Context

The imaginary university chosen for this project is "Summit Valley University," an institution committed to fostering technological innovation and comprehensive learning experiences. Summit Valley University offers various undergraduate and graduate programs, with a particular emphasis on computer science and information technology. The selected course, ISOL536 – Security Architecture and Design, aims to equip students with practical skills in designing secure information systems, aligning with the university's mission to prepare students for rigorous professional challenges.

Team Members and Responsibilities

The project team comprises five members, each assigned distinct roles to ensure the systematic development of the system. Table 1 below outlines each member's role and responsibilities:

Member Name Role Responsibilities Picture
Jane Doe Project Manager Oversee project development, coordinate team efforts, ensure deadlines are met Jane Doe
John Smith Database Designer Design database schema, define relationships, ensure data integrity John Smith
Emily Johnson Report Developer Create system reports, ensure data visualization meets user needs Emily Johnson
Michael Brown Security Analyst Implement security features, conduct threat modeling, ensure data protection Michael Brown
Lisa White Testing & QA Test database functionalities, validate data accuracy, document bugs Lisa White

System Requirements

Tables

The system will contain the following tables:

  • Students: Stores student details such as ID, Name, Major, Email.
  • Courses: Contains information about courses like Course ID, Name, Description.
  • Enrollments: Links students to courses, with fields Student ID, Course ID, Enrollment Date.
  • Faculty: Details about instructors including Faculty ID, Name, Department.
  • Assignments: Records of assignments with Assignment ID, Title, Due Date, Course ID.

Each table is designed to maintain data normalization and facilitate efficient data management within MS Access.

Relationships

The relationships include:

  • Students to Enrollments: One-to-Many (each student can enroll in multiple courses).
  • Courses to Enrollments: One-to-Many (each course can have multiple students enrolled).
  • Courses to Assignments: One-to-Many (each course can have multiple assignments).
  • Faculty to Courses: One-to-Many (faculty can teach multiple courses).

These relationships ensure referential integrity and enable complex queries across related data.

Reports

The system will generate five types of reports:

  1. Student Enrollment Report: Lists students enrolled in each course.
  2. Course Schedule Report: Details course names, instructors, and schedules.
  3. Assignment Due Report: Shows upcoming deadlines for assignments.
  4. Faculty Course Load: Displays courses and students assigned to each instructor.
  5. Enrollment Summary: Provides overall statistics of student enrollments and course popularity.

These reports facilitate administrative oversight and academic planning.

Security Recommendations

To ensure system security, the team recommends implementing password protection for the MS Access database, setting user-level security, and restricting access to sensitive data. Regular backups and audit logs should be maintained to monitor data modifications. Encrypting the database and implementing secure login procedures will mitigate unauthorized access and data breaches.

Threat Modeling

A threat modeling diagram utilizing standard symbols will be developed to visualize potential security threats, including unauthorized data access, data tampering, and system intrusion. Each component of the system will be analyzed for vulnerabilities, and mitigation strategies such as encryption, access controls, and intrusion detection will be incorporated.

Implementation

The team will create and populate each table with five records using MS Access. The database will be password protected, with the password documented and tested to ensure functionality. The system will be tested for usability, security vulnerabilities, and data accuracy before submission.

Future Recommendations

Future enhancements may include developing a web-based interface for remote access, integrating with existing university systems, adding multi-factor authentication, and expanding reporting capabilities. Implementing automated data validation and regular security audits will further strengthen system integrity.

Conclusion

This project exemplifies systematic planning and execution of a secure, functional university database system using MS Access. Through detailed requirements, relationship modeling, report generation, security measures, and future planning, the system aims to support academic administration effectively while maintaining data security and integrity.

References

  • Harrison, P. (2017). Microsoft Access 2016 Programming by Example with VBA, XML, and ASP. Pearson Education.
  • Rob, P., & Coronel, C. (2018). Database Systems, Design, Implementation, & Management. Cengage Learning.
  • Gill, A. (2019). Security Strategies in Windows Platforms and Applications. Pearson.
  • Sharma, S., & Sharma, R. (2020). "Threat Modeling in Database Security," International Journal of Information Security, 19(3), 359-373.
  • Khan, S. & Lee, K. (2021). Developing Secure Database Systems: Principles and Practices. Journal of Cybersecurity & Privacy, 2(1), 45-67.
  • Bell, D., & Stasko, J. (2020). Enhancing Data Security in Educational Institutions. Educational Technology Research and Development, 68(5), 299-312.
  • Wang, Y., & Zhang, M. (2019). Data Integrity and Security in Student Information Systems. IEEE Transactions on Education, 62(4), 309-317.
  • Harper, J. (2018). Best Practices for Database Security. Information Security Journal, 27(2), 69-76.
  • Martin, S. (2022). Future Trends in Database Security and Management. International Journal of Computer Science & Information Security, 20(6), 10-24.
  • Chen, L., & Kumar, R. (2023). Integrating Security into Educational Data Systems. International Journal of Educational Technology, 9(2), 150-163.