MS Access Database file for large-scale grading system for college or university
Activity 1. For this project, your team is in charge of designing and planning the development of a secure system for storing student’s records at a college or university of about 15,000 students. Think of this as a real-world implementation project. If you have questions about the functionality of the system please ask the instructor. Some basic requirements are below: A. Instructors should be able to view the grades of the students. B. School admins should be able to view the grades of any student and up-date grade with an Approved Grade Change Form. C. Students may view only their own grades. D. The system should be a web-based system. E. The system should account for user management. F. Student’s should receive grades by email, and/or physically mail at the conclusion of the course.
Tasks
1. Use the template (s) located on the course website to help your group complete this project.
2. Think of recommendations on how your group can improve the basic requirements of this system.
Severity |
||||||
Negligible small/unimportant; not likely to have a major effect on the operation of the event / no bodily injury to requiring minor first aid injury |
Marginal minimal importance; has an effect on the operation of event but will not affect the event outcome / requires medical treatment |
Critical serious/important; will affect the operation of the event in a negative way / suffers serious injuries or medical treatment of minors |
Catastrophic maximum importance; could result in disaster/death; WILL affect the operation of the event in a negative way / death, dismemberment or serious injury to minors |
|||
Probability |
LOW |
LOW (1) |
MEDIUM (4) |
MEDIUM (6) |
HIGH (10) |
|
MEDIUM |
LOW (2) |
MEDIUM (5) |
HIGH (8) |
EXTREME (11) |
||
HIGH |
MEDIUM (3) |
HIGH (7) |
HIGH (9) |
EXTREME (12) |
Risk Matrix
ISOL536
DR. CHARLES DESASSURE
UNIV. OF THE CUMBERLANDS
SUMMER 2019
TYPE THE NAME OR YOUR COLLEGE OR UNIVERISTY HERE.
TYPE ALL TEAM MEMBERS NAME.
Explanation of Risk Ranking |
|
If the consequences to this event/activity are LOW / MEDIUM, your group should be OK to proceed with this event/activity. It is advised that if the activity is MEDIUM, risk mitigation efforts should be made. |
|
If the consequences to this event/activity are HIGH, it is advised that you seek additional event planning support. |
|
EXTREME |
If the consequences to this event/activity are EXTREME, it is advised that you do not hold this event without prior consultation with Risk Management |
Risk Assessment Table
(Sample). Do not complete.
List All Activities Your activity name |
Associated Risk(s) Risk(s) associated with the activity |
Severity Level of impact on the trip and students |
Probability The chances of that risk happening |
Risk Score Risk score, found by combining impact and probability on the risk matrix |
Method(s) to Manage the Risk A list of methods you will use to minimize the chances of the risk happening and/or the resulting damages of the risk |
|
Playing Chess in Classroom A |
1. Damaging College property 2. Competition sparks fighting among participants |
1. Negligible 2. Negligible |
1. Low |
1. Low (1) 2. Low (1) |
||
Hiking on Unsteady Terrain with Elderly participants |
1. Bodily Injury to participants |
1. Critical |
1. Medium (6) |
1. Educate participants regarding conditions of activity, appropriate footwear and caution against risk of bodily injury due to uneven terrain. |
||
Traveling to Boston with students for a conference |
1. Auto Accident |
1. Catastrophic |
1. High (10) |
1. Ensure Drivers are credentialed, use a College vehicle to ensure it is properly insured, educate passengers on vehicle safety |
||
Note: YOUR TEAM WILL NEED TO COMPLETE THIS SECTION. FIVE DIFFERENT THRETS ARE REQUIRED.
Risk Assessment Table
List All Activities
Your activity name
Associated Risk(s)
Risk(s) associated with the activity
Severity
Level of impact on the trip and students
Probability
The chances of that risk happening
Risk Score
Risk score, found by combining impact and probability on the risk matrix
Method(s) to Manage the Risk
A list of methods you will use to minimize the chances of the risk happening and/or the resulting damages of the risk
Risk Assessment Table
List All Activities
Your activity name
Associated Risk(s)
Risk(s) associated with the activity
Severity
Level of impact on the trip and students
Probability
The chances of that risk happening
Risk Score
Risk score, found by combining impact and probability on the risk matrix
Method(s) to Manage the Risk
A list of methods you will use to minimize the chances of the risk happening and/or the resulting damages of the risk
Course: ISOL536 – Security Architecture and Design
Dr. Charles DeSassure, Adjunct Professor
Graduate Computer Science Program
University of the Cumberlands
Type the Group Number
Type the current date
Team System Project using MS Access
Page 11 of 11
OVERVIEW
College or University Name:
Overview:
ROLE AND RESPONSIBILITIES
Name/Role/Responsibilities
Member Picture
Type team member name
Role on this Project
Insert a quality head picture of yourself. Adjust photo so it can appear professionally. Add additional rows if required, and delete empty rows.
SYSTEM REQUIREMENTS (Tables)
Include the name of all table tables that will exist within your system. Provide a brief overview of each table, two or three lines will be fine. Include only the table information on this page. Single space with a double line space between tables.
No
Table Name
Purpose
SYSTEM REQUIREMENTS (Relationships)
Indicate which table will have relationships to what type and explain why
No
Table Name
Which Field
Index Field/Key
SYSTEM REQUIREMENTS (Reports)
Indicate the type of reports that will be generated by the system. Five different types of reports are required. Provide the purpose of each report
No
Report Name
Purpose
SECURE SYSTEM REQUIREMENTS
What is the group recommendation on what is required for this system in order for it to be a secure system?
No
Requirement
Purpose
1
2
3
4
5
MS ACCESS SYSTEM DESIGN – THREAT MODELING
Now that your team has the system design completed, a team member will need to create a Threat Modeling Design (drawing) of the system. Use only the symbols that we have used in this class. Embed the system design into this report on this page.
MS ACCESS SYSTEM DESIGN
Now that your team has the system design completed, a team member needs to create each TABLE, each RELATIONSHIP, and each REPORT within MS Access. Input five records within each table.
MS Access file uploaded to Blackboard.
SYSTEM PROTECTION
Include the password for this file on this page before uploading to the professor. Test and test the system to ensure that the password is working. If not, the professor will not be able to review the group MS Access file.
RECOMMENDATIONS
Provide recommendations on how the group may enhance this system in the future.