Querying/Reporting and Database Security

 

Database Systems and Requirements Analysis Identify, at minimum, three different reports or ad hoc queries that you should and could run with your proposed database. Your reports should be based on the objectives/mission articulated, as well as the needs identified in the user requirements analysis. In essence, your reports should demonstrate to the end-user that the product is able to answer questions of the actual or fictional business scenario. The below components are the requirements for the assignment “Project Part Three”. You will submit your Part Three assignment to the instructor by 11:59 PM ET at the end of Week 6. For each report or query that you identify, provide the following: 1. The Title of the Report 2. The Purpose of the Report 3. Why Would a User Want to Run this Report? o “In order to understand…”; “In order to answer the question whether or not…” o Could be anywhere from 1-10 statements why a user would run this report/query</li 4. What Question is a User Trying to Answer by running this Report? o Convey this component in question format o Could be anywhere from 1-10 questions that are trying to be answered with this report/query 5. The Data Elements Necessary to Run the Report o Convey a list of data elements o Convey whether or not you captured this data element i​‌‍‍‍‌‍‍‌‍‌‌‍‍‍‌‍‌‌‌‍​n your proposed database model or whether it needs to be added (If the data needs to be added to your database model, do so and save this version for final submission of your project.) 6. Filters for the Report o Filters might include Timeframes (day, month, quarter, year, etc., facilities, specific ICD codes, etc.) A. For each report, provide the proposed method of viewing the reports (printed, electronic file, real-time dashboard), the proposed frequency of the reports, the location of where reports will be run from (i.e. production database, a replicated report server, etc.), and the considerations that the end-user will need to keep in mind (data aging, impact to production environment, etc.). B. Then, identify the three top security features of your database and what security risks are minimized by the selection of these features using the literature. These security features of your database would be key features that you would likely tout to the key stakeholders upon implementation ensuring the security of the data within your proposed database design. These features could be access control, auditing, authentication, authorization, encryption, integrity controls, backups, privileges, etc. C. Convey the top three security features of your database design and the security risks that they thwart. Specifically, detail the “wow” factors of your features and their value proposition to safeguard protected he​‌‍‍‍‌‍‍‌‍‌‌‍‍‍‌‍‌‌‌‍​alth information/data

This question has been answered.

Get Answer