Preview

Analysis Memorandum

Powerful Essays
Open Document
Open Document
1519 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Analysis Memorandum
Running head: Analysis Memorandum

Analysis Memorandum
Steven Aran
University of Phoenix
EDTC 550
Information Technology
Janet Luch (FAC)
11/21/2004

Introduction This is an analysis memorandum proposing the use of Microsoft Access databases within our Security Division’s infrastructure. Many security managers are relying heavily on the use of Microsoft Excel spreadsheets in order to keep track of their personnel, security violations, inspection programs and training. While spreadsheets are effective means for complex calculations they are also limited in that they basically fall short in showing the relational qualities of security data in relationship to particular fields and queries. Not only do they fall short in relational quality, but they are also very difficult query in order for the user to locate particular records without having to go through entire spreadsheet. Since the success of our jobs and National Security rely heavily on the maintenance and tracking of personnel security clearance information, information security information and industrial security information, what better way of achieve our goals then to develop a relational database which can track and monitor the progress of these three area disciplines. Microsoft Access is a relational database allowing for the quick analysis and retrieval of vital security information. Capron (2000) defines a relational database as, “A relational database organizes data in a table format consisting of related rows and columns” (p.404). Since all of the computers used in our security division are personal computers, it only seems logical to implement a relational database in order to manage our critical and sensitive security data. Nickerson (2001) supports the need for a relational database to effectively manage data on a personal computer by stating, “Almost all common personal computer database programs use the relational approach” (p.80). There are many benefits in using



References: Capron, H. L. (2000). Computers: Tools for an information age. 6th ed. Upper Saddle River, NJ: Prentice Hall. Microsoft® Corporation (2001, May 30). Access 2002 product guide. Retrieved Nov 21, 2004, from Microsoft® Office Online Web site: http://www.microsoft.com/office/previous/access/2002guide.asp Nickerson, R.C. (2001). Information systems stored data. [UOP Custom Edition Series]. Information Technology. (pp. 63-89). Boston, MA: Pearson custom publishing.

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Better Essays

    Turban, Efraim. Rainer, R. Kelly. Potter, Richard E. (2003) Introduction to Information Technology. New York: John Wiley and Sons Inc.…

    • 1028 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Cmgt410 Team Paper Riordan

    • 4511 Words
    • 19 Pages

    The purpose of this project will be to appropriate a new Human Resources Client-Server Database system. This new system’s capabilities of centralizing Riordan Manufacturing’s data will increase the overall security of the data within. This was expressed to the IT department because of the increasingly overwhelming amount of personal data currently transmitted across unsecure data-lines,…

    • 4511 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 2207 Words
    • 9 Pages

    Undoubtedly in secure DBMS, it is feasible for clients to draw gatherings from the data they get from the database. The employee working in an organization when gets certain information they may try to elaborate it or draw some important aspects related to the database from past. There are two crucial events of the finding issue, which ordinarily climb in database systems.…

    • 2207 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    CMGT 400 Week 1 DQs

    • 676 Words
    • 3 Pages

    The project for CIS336 is designed to touch all aspects of the fundamental concepts of database design and logical data modeling covered during the class. The project is team centered and each team will be responsible for designing, developing, and demonstrating the functionality of a database created based on a defined set of business specifications. At the end of the session, each project team will submit the database designed by the team and demonstrate the database's ability to deliver the required information as outlined in the project specifications. All aspects of the project will be ...…

    • 676 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Any information stored in an organisation has to follow the security and confidentiality procedures. Information security and confidentiality is the process where data is kept away from unauthorised access, disclosure, destruction, use or modification. It applies to both physical and electronic data. All organisations store a large amount of confidential information about their employees, customers, company’s status,…

    • 1681 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Standardsresearch

    • 1197 Words
    • 5 Pages

    In short, Working Groups work to create and write the standard. Working Groups are open to anyone to participate in. For individual standards projects, IEEE or IEEE-SA membership is not required to participate. For corporate standards projects, IEEE-SA corporate membership is required. Overall, Working Groups strive for broad representation of all interested parties and encourage global participation. With project authorization request (PAR) approval, a Working Group is defined and it can officially begin its work to develop or write the standard. (IEEEwg, 2012)…

    • 1197 Words
    • 5 Pages
    Better Essays
  • Better Essays

    A business stands to face the same type of security and privacy issues. Proprietary information that is important to a business’ success can be stolen, sold or sabotaged by employees within the company. Some of the information taken can be trade secrets, financial documentation and employee personnel files.…

    • 962 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Turban, E., Rainer, R.K., & Potter, R.E. (2003). Introduction to Information Technology, 8e. New York: John Wiley & Sons, Inc.…

    • 1840 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    Potter, R.E., Rainer, K.R. & Turban, E. (2003) Introduction to Information Technology Retrieved June 28, 2007 from the University of Phoenix Web site:…

    • 1125 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Working with Database Design

    • 2266 Words
    • 10 Pages

    Various other aspects and needed requirements are to be introduced and implemented into Jim and Tim’s new ACCESS™2010® Relational Database Management Systems from concepts, theories, analysis, import/export, referential integrity, primary/foreign/ non keys, data-modeling, and normalization. Needs to assure value, structure, relationship, and integrity are implemented in the relational database management systems (RDBMS) for the explicit users ability to flawless query information/data which allows by logical authentication to request, add, modify, and view correct, understandable intellectual organizational RDBS while using the export and import functions of ACCESS™2010®, EXCEL 2010, and MS SQL SERVER. One issue with almost all software (any type) is because humans write the code for software and on the other hand other humans reverse engineer written software finding weakness, and design script or bot code, which will become a threat agent in a form of a Trojan-horse, viruses, Dos, DDoS, and other forms of illegal hacking to steal intellectual data. A suggestion is using a specific tool called CAPTCHA “(Completely Automated Public Turing Test to tell Computers and Humans apart),” also known as “Gausebeck-Levchin Test.” This is to create anti-fraud detection, which prevents a script or a bot from being able to complete authentication. Although, this tool used in Pay-Pal transactions, its use for on-line of other types of internet web transactions to assure a live human interaction. This tool implementation into the accounting section between customers to RoboBoys and even between Jim, Tim, and vendors, which helps prevent the…

    • 2266 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    SQL Injection Attacks

    • 575 Words
    • 3 Pages

    The MJD electronics board has inquired into database security and would like to have more information on what would be the best methods for the company to implement. As the chief security and compliance officer, I have investigated several different threats and in the following I will explain these threats and what can be done to prevent them.…

    • 575 Words
    • 3 Pages
    Good Essays
  • Better Essays

    it255

    • 721 Words
    • 3 Pages

    Information or data is a valuable asset in any organization. Almost all organization, whether social, governmental, educational etc., have now automated their information systems and other operational functions. They have maintained the databases that contain the crucial information. So database security is a serious concern. To go further, we shall first discuss what actually the database security is?…

    • 721 Words
    • 3 Pages
    Better Essays

Related Topics