Answer:
Purposes of E-R-Diagram and Techniques to secure databases
The purpose to create an ER Diagram before the database is built
The database design process requires the use of the ER diagrams as it is the database implementation foot prints that show the clear image of the resultant database that is required to be implemented, below are some of the purposes of E.R diagram in database design process.
- Due to its’ excellent visual representations.
The database entity, attributes and relationships are identified with ease and thus eliminating any redundant attributes while implementing the databases and this is due to the ER diagram graphical and diagrammatic representation (Raghu , 2015).
- Since it is an effective communication tool.
The ER diagram helps the databases user, designer, and the professional team to communicate and illustrate the designs of the expected databases and thus using the ER diagram errors are easily identified and then modified.
- Due to its’ high integrations with relational databases model.
The ER diagram integrates the model of the database and thus the designer is enabled to do the ER diagram to database tables with ease.
- Due to its’ ease in converting data model.
The ERD make it easy for the database designer to easily implement the database’s tables and relationships using the selected database management tools.
- Due to its ability to simplify the databases designing.
The database designers make use of the entity relation diagram notations while representing an entity and its attributes and also show the relationship between the entities of the databases.
Legal issues and the techniques to use in order to secure databases
Ms Donta Pop is preparing to use the credit cards payments from her customers in near future, however in order to maintain the security of the customer’s financial details some of aspects like the legal issues and the security techniques has to be enforced and thus no unauthorized access will be allowed to the company’s and customer’s financial and sensitive data records.
Legal issues
There information technology legal issues are set to protect the rights of the owners of the resources and in case someone breaches the rules are prosecuted and charged with legal issues crime.
Below are some of the legal issues in information technology.
- Accessing right.
- Data integrities.
- Data and the database copy-right and patent.
- Protection of data.
- Computing fraud activity.
Security techniques
To provide enough protection to the customers and company’s information some techniques and measures are enforced to keep the customer’s and company’s information intact and uncompromised.
The below are the techniques used to enforce security.
- Database accessing control.
In this the systems user use username and passwords to login and transact(Ullman, 2016).
- Databases auditing.
This is used to determine if the company data is safe and not leaked to malicious people.
- Authentication to databases access.
This is technique used to authenticate the user’s access to the system to guard the data and information.
- Encryption to the databases.
This technique hides the data integral information in order to prevent any attempt to modify it by the malicious people.
- Application’s security setups.
The database management tool is set some passwords and usernames to limit the access only to the authorized group of users.
- Automating databases back-ups.
The data security is very essential so the database requires to be backed up frequently to allow the restoration while the database get corrupted or fails.References
Abraham, S.(2013). Database System Concepts .Michigan:
McGraw-Hill.
Bipin, D.(2014). An Introduction to Database Systems.Boston:
Addison-Wessley Publication.
Raghu ,R.(2015). Database Management Systems. New York:
McGraw-Hill Higher Education
Ullman,D.(2016). Principles of Database Systems. Berlin:
Springer publishers;
Purposes of E-R-Diagram and Techniques to secure databases
The purpose to create an ER Diagram before the database is built
The database design process requires the use of the ER diagrams as it is the database implementation foot prints that show the clear image of the resultant database that is required to be implemented, below are some of the purposes of E.R diagram in database design process.
- Due to its’ excellent visual representations.
The database entity, attributes and relationships are identified with ease and thus eliminating any redundant attributes while implementing the databases and this is due to the ER diagram graphical and diagrammatic representation (Raghu , 2015).
- Since it is an effective communication tool.
The ER diagram helps the databases user, designer, and the professional team to communicate and illustrate the designs of the expected databases and thus using the ER diagram errors are easily identified and then modified.
- Due to its’ high integrations with relational databases model.
The ER diagram integrates the model of the database and thus the designer is enabled to do the ER diagram to database tables with ease.
- Due to its’ ease in converting data model.
The ERD make it easy for the database designer to easily implement the database’s tables and relationships using the selected database management tools.
- Due to its ability to simplify the databases designing.
The database designers make use of the entity relation diagram notations while representing an entity and its attributes and also show the relationship between the entities of the databases.
Legal issues and the techniques to use in order to secure databases
Ms Donta Pop is preparing to use the credit cards payments from her customers in near future, however in order to maintain the security of the customer’s financial details some of aspects like the legal issues and the security techniques has to be enforced and thus no unauthorized access will be allowed to the company’s and customer’s financial and sensitive data records.
Legal issues
There information technology legal issues are set to protect the rights of the owners of the resources and in case someone breaches the rules are prosecuted and charged with legal issues crime.
Below are some of the legal issues in information technology.
- Accessing right.
- Data integrities.
- Data and the database copy-right and patent.
- Protection of data.
- Computing fraud activity.
Security techniques
To provide enough protection to the customers and company’s information some techniques and measures are enforced to keep the customer’s and company’s information intact and uncompromised.
The below are the techniques used to enforce security.
- Database accessing control.
In this the systems user use username and passwords to login and transact(Ullman, 2016).
- Databases auditing.
This is used to determine if the company data is safe and not leaked to malicious people.
- Authentication to databases access.
This is technique used to authenticate the user’s access to the system to guard the data and information.
- Encryption to the databases.
This technique hides the data integral information in order to prevent any attempt to modify it by the malicious people.
- Application’s security setups.
The database management tool is set some passwords and usernames to limit the access only to the authorized group of users.
- Automating databases back-ups.
The data security is very essential so the database requires to be backed up frequently to allow the restoration while the database get corrupted or fails.
References
Abraham, S.(2013). Database System Concepts .Michigan: McGraw-Hill.
Bipin, D.(2014). An Introduction to Database Systems.Boston: Addison-Wessley Publication.
Raghu ,R.(2015). Database Management Systems. New York:McGraw-Hill Higher Education
Ullman,D.(2016). Principles of Database Systems. Berlin:Springer publishers;