Enterprise Information Management & Security

Verified

Added on  2023/06/07

|16
|3719
|406
AI Summary
The report reflects the data modeling and cyber security management for Kebin’s music system. It includes EERD model, SQL queries, and six threats and solutions to those threats.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: ENTERPRISE INFORMATION MANAGEMENT & SECURITY
Enterprise Information Management & Security
Name of the Student
Name of the University
Author’s note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1ENTERPRISE INFORMATION MANAGEMENT & SECURITY
Executive Summary
The report reflects the data modeling and cyber security management for Kebin’s music system.
Kevin’s music has two business models. The organization books music shows and also schedule
music teaching classes for students. The organization has a rule that minor musicians and
musicians with expired “Working With Children Check” cannot work as a teacher. The EERD
model shows generalization accurately. The model also shows relation between a teacher
teaching in class and students who attend the class. The SQL codes for accessing the operation
related data is provided. The inner join has been used to connect various tables in one query. The
internal, external, deliberate and unintentional threats are properly described in the report.
Document Page
2ENTERPRISE INFORMATION MANAGEMENT & SECURITY
Table of Contents
Introduction:....................................................................................................................................3
Enhanced Entity Relationship Diagram:.........................................................................................4
SQL Statements:..............................................................................................................................5
System Security and Solutions:.......................................................................................................6
External Threats:..........................................................................................................................6
Internal Threats:...........................................................................................................................8
Probability-Impact Matrix:..........................................................................................................8
Risk Control:..............................................................................................................................10
Conclusion:....................................................................................................................................12
References:....................................................................................................................................13
Document Page
3ENTERPRISE INFORMATION MANAGEMENT & SECURITY
Introduction:
The ICT system is configured and installed using the software, hardware, information and
human resource. The human resource are the users of the system. As the main focus of an ICT
system is collection, processing and distribution of data, a database is considered to be one of the
most significant parts of ICT. The database is created based on the modeling done in the design
phase. The EERD is the logical model of database, to be implemented. The ORACLE is the
platform where the database can be developed and queries can be run.
The report is generated based on the case study of Kevin’s Music Business. The
organization runs two kinds of businesses. One is arranging live music in various venues and
running a music teaching school. The reports consist of the EERD, SQL queries to show
business process related outputs and six threats and solutions to those threats.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4ENTERPRISE INFORMATION MANAGEMENT & SECURITY
Enhanced Entity Relationship Diagram:
Figure 1: Enhanced Entity Relationship Diagram
(Source: Created by Author)
The proposed ERD in the figure 1 illustrates the data model of Kevin’s Music. The
organization has registered musicians who performs in venues. A musician can be part of a band
or work alone. The band has a manager. It is assumed that a manager can leave current band and
join another. In case a registered band employs new manager, the database will not delete the
manager data as he/she may join another band, registered in the system. The musicians can have
Document Page
5ENTERPRISE INFORMATION MANAGEMENT & SECURITY
“Working with Children Check” card. The database will record the expiry date of the card. If the
musician does not have a card or it has expired then the musician cannot work as a teacher. The
musician and band will perform at a program which will be held at a particular venue. It is
assumed that a venue can handle various programs. The teacher will teach at class that will have
different lessons. Each lessons are of a particular style of music. The students can apply for
different lessons. The database will store only those application names who has applied for a
lesson. A lesson can exist in the database even if no one has applied for it. An applicant can
submit many applications. A student can attend lesson after he/she is registered.
SQL Statements:
Condition 1: Count of all new students who have joined Kevin's music after the 1st of
July 2018.
Statement 1 Count(studentID) From Student Where joiningDate =
TO_DATE('01/07/2018', 'DD/MM/YYYY')
Condition 2: List of all underage male musicians and their age sorted by the first name.
Statement 2 select firstName, lastName, age from Musician Where age <18 Order By
firstName DESC
Condition 3: List of all teachers who have an expired Working With Children Check
(WWCC), with names, expiry date and their age, sorted by date.
Statement3 select firstName, lastName, age, expiryDate from Musician inner join Card
on Musician.musicianID = Card.musicianID Where expiryDate < TO_CHAR (SYSDATE, 'DD-
MON-YYYY')
Document Page
6ENTERPRISE INFORMATION MANAGEMENT & SECURITY
Condition 4: List of all current lesson bookings sorted by the style of music and the
booking date
Statement 4 select AP.name, applicationDate, StyleOfMusic.name From Applicant AP
inner join Application on Applicant.applicantID = Application.applicantID inner join Lesson on
Application.lessionID = Lesson.lessonID inner join StyleOfMusic on Lesson.styleID =
StyleOfMusic.styleID Where status = ‘pending’ Order By applicationDate DESC
Condition 5: A report on the students enrolled, the style of music and the teacher for the
current calendar month
Statement 5 select Student.name, StyleOfMusic.name From Student inner join Lesson
on Student.lessonID = Lesson.lessonID inner join Class on Lesson.lessionID = Class.lessonID
inner join Teacher on Class.teacherID = Teacher.teacherID inner join StyleOfMusic on
Lesson.styleID = StyleOfMusic.styleID Where Class.Month= TO_CHAR (SYSDATE, 'MON')
System Security and Solutions:
External Threats:
Malware: The malware is released into the system of the user when he clicks on an
antivirus alter pop-up screen in browser or clicked on mail attachment that is malisons. The
malware is very intriguing tool for attackers to gain access to the victims personal or office
computer. The ransomware and viruses can be put in the categories of malware. It is originally a
harmful application. Once the malware enters victim’s commuter it can manipulate the
computer’s processes to sending confidential data to hackers and monitoring the activities of the
victim.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7ENTERPRISE INFORMATION MANAGEMENT & SECURITY
Phishing: The phishing technique is used to trick the user. It is pretty obvious that a
person would not open a random mail. For that reason, the cyber attackers use mail contents that
user is familiar with. Using the similar mail names or websites, the attackers disguise as someone
else, the phasing attack is completed. The user thinks that he/she is accessing an authentic mail
or website and allow system privilege to the attacker.
SQL Injection Attack: The SQL is the abbreviation of Structured Query Language. This
language establishes connection between client-side script and database. Various servers use the
SQL language to store and retrieve critical data coming to-and-fro web application. These kind
of application and servers are the victim of the SQL injection attack. The attack initiates by
identifying the SQL code vulnerabilities and inject malicious code in the server.
Cross-Site Scripting: The cross-site scripting is used to attack the users of the website
instead of attacking the vulnerable SQL codes. In this attack also, the malicious codes are
injected into the website. The cross-site scripting only affects client side. Other users of the
website who are not a victim of cross-site scripting will experience unaffected website. In cross-
site scripting, the malicious code is injected into the script or comment that runs automatically.
The cross-site scripting is able to put the user information at risk without even letting the user or
the server know.
Denial-of-Service: The Denial-of-Service or DoS attack is the most severe attack of all.
This attack is capable of brining a whole server down and stop communication between user side
and server side. The DDoS or Distributive Denial-of-Service attack is more severe than DoS.
The DoS or DDoS attack sends more request to the server than it can handle thus original user
requests are not processed by the server and server goes down. The Denial of Service is so bad
Document Page
8ENTERPRISE INFORMATION MANAGEMENT & SECURITY
that it cannot be stopped once it reaches the server. The only thing that can be done is shutting
down all the server machines.
Internal Threats:
Malicious Insider: This kind of insider threat is the most difficult threat to handle. This
threat cannot be easily mitigated using strict protocols or advanced ICT security training. A
malicious insider can be a criminal who disguises as a worker in an organization or any staff who
is willing to harm the employer. An outsider who has the login credentials can easily breach a
network and access crucial business data.
Probability-Impact Matrix:
Impact
Probability
Trivial Minor Moderate Major Extreme
Rare
Unlikely Malware
Moderate Cross-Site
Scripting
SQL
Injection
Likely DDoS
Very Likely Phishing Malicious
Insider
Malware (Minor Impact and Unlikely Possibility): The malware is ducted very easily by
the users. Nowadays, the users are smart and aware of possible cyber-attacks. They do not
usually open a malicious mail. However, the list of malicious mails in one’s email list is very
Document Page
9ENTERPRISE INFORMATION MANAGEMENT & SECURITY
high. Numerous attackers and vague business persons send malicious mail to thousands of
people. That is why the possibility of getting attacked by a malware is very low.
Phishing (Minor Impact and Very Likely Possibility): The phishing is used to trick a
user. The user may not even notice that he/she is tricked. The phishing has same impact as
malware. The only difference is the access granting process. The possibility is very high as users
often tricked by the attacker. Many users provide the attacker access to their system assuming
that they are using legitimate website or web application.
Cross-Site Scripting (Moderate Possibility and Moderate Impact): The cross-site
scripting is done to within the system of the user. Only the victim user is affected by this attack.
The whole website does not get affected while this attack is in progress. The cross-site scripting
requires good knowledge of website it is attacking. New antiviruses are smart enough to detect
most of the cross-site scripting attacks. Therefore, both the possibility and impact of this attack is
moderate.
SQL Injection Attack (Moderate Possibility and Major Impact): The SQL injection is
used for attacking the web servers that runs SQL codes to collect and share data. Nowadays,
SQL based software production houses are generating new methods to counter this attack. The
use of the SQL is diminishing slowly due to presence of bug data solutions. Thus, the probability
of this attack is moderate. However, if the attack is successfully done on a website server then
the consequences can be very severe. The whole server may lose its valuable data to the attacker.
The attack can be stopped if identified at right time. The impact of this attack is major and can
lead to blundering organization’s reputation.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10ENTERPRISE INFORMATION MANAGEMENT & SECURITY
Malicious Insider (Likely Possibility and Extreme Impact): Any employee can be
unhappy due to the organizations behavior to them. Any criminal can get a job in the
organization and use the given access privilege to the system to exploit the system. Malicious
insiders are hard to identify until something harmful happens. There can be numerous reasons for
an employee to become an insider threat. On the other hand, an outsider can get access to the
system using a staff’s login credentials. Thus, the possibility of the attack is extremely high. The
insider threat can reveal organizational data to the competitors without even alerting anyone.
They can inject other threats into the system. The whole system will be exploited from the inside
and stopping it is very hard. Thus, the malicious insider is a major cyber threat to system.
DoS/DDoS (Very Likely Possibility and Major Impact): The DDoS or DoS attacks are
the most dangerous cyber threats. The DDoS or DoS attacks are very hard to convey but the
impact it has on the system is making it more popular. The recent studies states that DDoS is
third highest conveyed attacks. However, the attack is conveyed for big organizations only.
Small organizations may not have sufficient information or resource to fulfill the needs of the
attackers so cost and effort of attack cannot be recovered. For this reason, the DDoS and DoS
attack is of like probability. The attack cannot be stopped if it initiates. The whole organization
would lose connection with the customers. All the sensitive data can be erased from the server.
The huge impact it can have on the system makes it extremely severe. Therefore, the impact of
this threat is extreme.
Risk Control:
Malware: The user must not reply to e-mails that does not seem authentic. The user must
not share any financial or personal information through the mail. The user must not share
password of any web app or desktop app. File attachments of malicious mails often carry
Document Page
11ENTERPRISE INFORMATION MANAGEMENT & SECURITY
malware. The user must not open any such attachment. Not replying to any suspicious mail will
reduce the chance of malware attack. Installing unauthorized applications can lead to allowing
malware to enter the system. The user must have an enabled firewall so that malicious mail can
be prevented.
Phishing: The organizations must educate the employees about phishing attacks. They
must conduct training for employees. The user can install a SPAM filter that can detect viruses
and disguised mails. The security application installed in the system must be updated so that new
types of phishing attacks can be encountered. Installing antiviruses can lead to reduction in
phishing attack possibility. The organization must implement policies like password expiration,
session expiring and many more. Web filters are highly effective in filtering malicious websites.
Cross-Site Scripting: The system of any organization must be developed by following
security development lifecycle. Validating the input type is a well-known counter measure for
cross-site scripting. The website must not relied on client side scripting, all the data validation
must be carried out in server side.
SQL Injection Attack: For the SQL injection attack also, input validation is a crucial
procedure. The web application firewall must be installed in the server to prevent such attacks.
Insider Threat: The insider threat is deliberate or unintentional threat. The organization
must create policies to prevent the user to access malicious website and install unauthorized
applications. In order to deal with deliberate threat, the server must have a list of website and
other entities that can cause initiate an attack. The authorization level must be planned properly.
DDoS: Scanning the web services frequently has been a great way to prevent low scaled
DDoS attacks. Network assets must be scanned periodically or event better if regularly. An
Document Page
12ENTERPRISE INFORMATION MANAGEMENT & SECURITY
organization must have a security measure that can be activated as soon as DDoS starts.
Detecting a DDoS attack in first stage can lead to mitigation possibility.
Conclusion:
The report has covered both the data security and ICT security. The security threats are
internal, external, deliberate and unintentional threats. The report has then discussed about the
probability-impact matrix. The reason behind classifying the threats into proposed classification
is provided along with that. The EERD or enhanced entity relationship diagram is used to model
the proposed database. The database has accurately captured the business data flow and
requirements. The model supports the SQL queries that are used to show operational data flow.
The internal threats are emerging as the most severe threat for ICT systems. The internal threat
can be deliberate or unintentional but it will surely hit the system security very hard. The system
uses various security measures to protect itself from external threats like DDoS, cross site
scripting and many more. However, because of various operational reasons, the organization
have to consider that some of the internal measures cannot be implemented. The internal users of
the system can exploit these deliberate flaws in the system. The database to be implemented is a
structured database. The structured database is more secure to the cross-site scripting attacks.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
13ENTERPRISE INFORMATION MANAGEMENT & SECURITY
References:
Abdelhamid, N., Ayesh, A. and Thabtah, F., 2014. Phishing detection based Associative
Classification data mining. Expert Systems with Applications, 41(13), pp.5948-5959.
Akerlof, G.A. and Shiller, R.J., 2015. Phishing for phools: The economics of manipulation and
deception. Princeton University Press.
Algaith, A., Nunes, P., Fonseca, J., Gashi, I. and Viera, M., 2018. Finding SQL Injection and
Cross Site Scripting Vulnerabilities with Diverse Static Analysis Tools.
Al-Masree, H.K., 2015. Extracting Entity Relationship Diagram (ERD) from relational database
schema. International Journal of Database Theory and Application, 8(3), pp.15-26.
Alsharnouby, M., Alaca, F. and Chiasson, S., 2015. Why phishing still works: User strategies for
combating phishing attacks. International Journal of Human-Computer Studies, 82, pp.69-82.
Alwan, Z.S. and Younis, M.F., 2017. Detection and Prevention of SQL Injection Attack: A
Survey. International Journal of Computer Science and Mobile Computing, 6(8), pp.5-17.
Arachchilage, N.A.G., Love, S. and Beznosov, K., 2016. Phishing threat avoidance behaviour:
An empirical investigation. Computers in Human Behavior, 60, pp.185-197.
Armbrust, M., Xin, R.S., Lian, C., Huai, Y., Liu, D., Bradley, J.K., Meng, X., Kaftan, T.,
Franklin, M.J., Ghodsi, A. and Zaharia, M., 2015, May. Spark sql: Relational data processing in
spark. In Proceedings of the 2015 ACM SIGMOD International Conference on Management of
Data (pp. 1383-1394). ACM.
Document Page
14ENTERPRISE INFORMATION MANAGEMENT & SECURITY
Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K. and Siemens, C.E.R.T., 2014,
February. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket.
In Ndss (Vol. 14, pp. 23-26).
Gupta, B.B., Gupta, S., Gangwar, S., Kumar, M. and Meena, P.K., 2015. Cross-site scripting
(XSS) abuse and defense: exploitation on several testing bed environments and its
defense. Journal of Information Privacy and Security, 11(2), pp.118-136.
Gupta, S. and Gupta, B.B., 2017. Cross-Site Scripting (XSS) attacks and defense mechanisms:
classification and state-of-the-art. International Journal of System Assurance Engineering and
Management, 8(1), pp.512-530.
Jukic, N., Vrbsky, S. and Nestorov, S., 2016. Database systems: Introduction to databases and
data warehouses. Prospect Press.
Kim, M.Y. and Lee, D.H., 2014. Data-mining based SQL injection attack detection using
internal query trees. expert systems with applications, 41(11), pp.5416-5430.
Rahman, T.F.A., Buja, A.G., Abd, K. and Ali, F.M., 2017. SQL Injection Attack Scanner Using
Boyer-Moore String Matching Algorithm. JCP, 12(2), pp.183-189.
Ruohonen, J., Hyrynsalmi, S., Mishkovski, I., Aura, T. and Leppänen, V., 2016, August. The
Black Mark Beside My Name Server: Exploring the Importance of Name Server IP Addresses in
Malware DNS Graphs. In Future Internet of Things and Cloud Workshops (FiCloudW), IEEE
International Conference on (pp. 264-269). IEEE.
Tam, K., Khan, S.J., Fattori, A. and Cavallaro, L., 2015, February. CopperDroid: Automatic
Reconstruction of Android Malware Behaviors. In NDSS.
Document Page
15ENTERPRISE INFORMATION MANAGEMENT & SECURITY
Tan, Z., Jamdagni, A., He, X., Nanda, P. and Liu, R.P., 2014. A system for denial-of-service
attack detection based on multivariate correlation analysis. IEEE transactions on parallel and
distributed systems, 25(2), pp.447-456.
Wong, T.G. and Ambainis, A., 2015. Quantum search with multiple walk steps per oracle
query. Physical Review A, 92(2), p.022338.
Yan, Q. and Yu, F.R., 2015. Distributed denial of service attacks in software-defined networking
with cloud computing. IEEE Communications Magazine, 53(4), pp.52-59.
Zhang, H., Cheng, P., Shi, L. and Chen, J., 2015. Optimal denial-of-service attack scheduling
with energy constraint. IEEE Transactions on Automatic Control, 60(11), pp.3023-3028.
chevron_up_icon
1 out of 16
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]