Global Unified Technology Sales (GUTS) is moving toward a “bring your own device” (BYOD) model for employee computing. Employees can use traditional desktop computers in their offices. They can also use a variety of personal mobile computing devices such as tablets, smartphones, and laptops. The new computing model introduces some security risks that GUTS is attempting to address. The company wants to ensure that any devices connecting to their servers are properly registered and approved by the Information Technology department. The business requirements are attached. Given the attached business requirements, create the complete Crow’s Foot ERD containing all primary keys, foreign keys, and main attributes. Use specialization hierarchy if appropriate. This ERD is the initial database blueprint. Use the normalization procedures to remove any possible data redundancies. This process may produce additional entities. If additional entities are created, revise the ERD created in previous step. Use the normalization procedures to further audit the revised ERD.   Create database table structures for your proposed entities in revised ERD. Identify in which normal forms your tables are. If a table is not in 3NF, convert it to 3NF or BCNF or 4NF as appropriate        (Note: SQL statements do not have to be written to create tables or populate the data... Just need to show the table structures as a relation in a word document. For example for table Vendor, you can show it as       Vendor(Vendor_Code, Vendor_Name, Vendor_Address, Vendor_Phone). Vendor_Code is the primary key. There is no foreign key for this table, but if there is one, identify it. Vendor is in 3NF and no modification is needed at this point. )

Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
icon
Related questions
Question
100%

Global Unified Technology Sales (GUTS) is moving toward a “bring your own device” (BYOD) model for employee computing. Employees can use traditional desktop computers in their offices. They can also use a variety of personal mobile computing devices such as tablets, smartphones, and laptops. The new computing model introduces some security risks that GUTS is attempting to address. The company wants to ensure that any devices connecting to their servers are properly registered and approved by the Information Technology department. The business requirements are attached.

  1. Given the attached business requirements, create the complete Crow’s Foot ERD containing all primary keys, foreign keys, and main attributes. Use specialization hierarchy if appropriate. This ERD is the initial database blueprint. Use the normalization procedures to remove any possible data redundancies. This process may produce additional entities. If additional entities are created, revise the ERD created in previous step. Use the normalization procedures to further audit the revised ERD.  
  2. Create database table structures for your proposed entities in revised ERD. Identify in which normal forms your tables are. If a table is not in 3NF, convert it to 3NF or BCNF or 4NF as appropriate 

      (Note: SQL statements do not have to be written to create tables or populate the data... Just need to show the table structures as a relation in a word document.

For example for table Vendor, you can show it as
      Vendor(Vendor_Code, Vendor_Name, Vendor_Address, Vendor_Phone). Vendor_Code is the primary key. There is no foreign key for this table, but if there is one, identify it. Vendor is in 3NF and no modification is needed at this point. )

**Business Requirements:**

- Every employee works for a department that has a department code, name, mail box number, and phone number. The smallest department currently has 5 employees, and the largest department has 40 employees. This system will only track in which department an employee is currently employed. Very rarely, a new department can be created within the company. At such times, the department may exist temporarily without any employees. For every employee, their employee number and name (first, last, and middle initial) are recorded in the system. It is also necessary to keep each employee’s title.

- An employee can have many devices registered in the system. Each device is assigned an identification number when it is registered. Most employees have at least one device, but newly hired employees might not have any devices registered initially. For each device, the brand and model need to be recorded. Only devices that are registered to an employee will be in the system. While unlikely, it is possible that a device could transfer from one employee to another. However, if that happens, only the employee who currently owns the device is tracked in the system. When a device is registered in the system, the date of that registration needs to be recorded.

- Devices can be either desktop systems that reside in a company office or mobile devices. Desktop devices are typically provided by the company and are intended to be a permanent part of the company network. As such, each desktop device is assigned a static IP address, and the MAC address for the computer hardware is kept in the system. A desktop device is kept in a static location (building name and office number). This location should also be kept in the system so that if the device becomes compromised, the IT department can dispatch someone to remediate the problem.

- For mobile devices, it is important to also capture the device’s serial number, which operating system (OS) it is using, and the version of the OS. The IT department is also verifying that each mobile device has a screen lock enabled and has encryption enabled for data. The system should support storing information on whether or not each mobile device has these capabilities enabled.

- Once a device is registered in the system, and the appropriate capabilities are enabled if it is a mobile device, the device may be approved for connections to one or more servers. Not all devices meet the requirements to be approved at first so the device might be in the system for a period of time before it is approved to connect to any
Transcribed Image Text:**Business Requirements:** - Every employee works for a department that has a department code, name, mail box number, and phone number. The smallest department currently has 5 employees, and the largest department has 40 employees. This system will only track in which department an employee is currently employed. Very rarely, a new department can be created within the company. At such times, the department may exist temporarily without any employees. For every employee, their employee number and name (first, last, and middle initial) are recorded in the system. It is also necessary to keep each employee’s title. - An employee can have many devices registered in the system. Each device is assigned an identification number when it is registered. Most employees have at least one device, but newly hired employees might not have any devices registered initially. For each device, the brand and model need to be recorded. Only devices that are registered to an employee will be in the system. While unlikely, it is possible that a device could transfer from one employee to another. However, if that happens, only the employee who currently owns the device is tracked in the system. When a device is registered in the system, the date of that registration needs to be recorded. - Devices can be either desktop systems that reside in a company office or mobile devices. Desktop devices are typically provided by the company and are intended to be a permanent part of the company network. As such, each desktop device is assigned a static IP address, and the MAC address for the computer hardware is kept in the system. A desktop device is kept in a static location (building name and office number). This location should also be kept in the system so that if the device becomes compromised, the IT department can dispatch someone to remediate the problem. - For mobile devices, it is important to also capture the device’s serial number, which operating system (OS) it is using, and the version of the OS. The IT department is also verifying that each mobile device has a screen lock enabled and has encryption enabled for data. The system should support storing information on whether or not each mobile device has these capabilities enabled. - Once a device is registered in the system, and the appropriate capabilities are enabled if it is a mobile device, the device may be approved for connections to one or more servers. Not all devices meet the requirements to be approved at first so the device might be in the system for a period of time before it is approved to connect to any
### Virtual Server Management and Access Control

**Virtual Server Hosting**

- A virtual server is tracked by the system in correlation to the physical server it operates on. A single physical server can host multiple virtual servers, but each virtual server is exclusive to one physical server. Virtual servers cannot host other virtual servers.

**Device Approval and Management**

- Servers can have numerous devices approved for connection. New servers might not have any approved devices initially. It's essential to record the date when a device is approved or loses approval. If a device regains approval later, it should be recorded as well.

**User Services and Server Association**

- Servers offer various services such as email, chat, and more, each having a unique identification number and name. The date when a service begins being offered should be logged. Each service operates on a single server, and new servers might initially offer no services. Client-side services need not be tracked.

**Employee Access Permissions**

- Employees must have permission to use a service. They might have permissions for several services, but not all might be available initially. Services can support multiple employees, even new ones, who may not initially have approved access.
- The system tracks the date each employee gets approved to use a service. Upon first approval, employees create a username and password, which remains consistent across all future approved services.
Transcribed Image Text:### Virtual Server Management and Access Control **Virtual Server Hosting** - A virtual server is tracked by the system in correlation to the physical server it operates on. A single physical server can host multiple virtual servers, but each virtual server is exclusive to one physical server. Virtual servers cannot host other virtual servers. **Device Approval and Management** - Servers can have numerous devices approved for connection. New servers might not have any approved devices initially. It's essential to record the date when a device is approved or loses approval. If a device regains approval later, it should be recorded as well. **User Services and Server Association** - Servers offer various services such as email, chat, and more, each having a unique identification number and name. The date when a service begins being offered should be logged. Each service operates on a single server, and new servers might initially offer no services. Client-side services need not be tracked. **Employee Access Permissions** - Employees must have permission to use a service. They might have permissions for several services, but not all might be available initially. Services can support multiple employees, even new ones, who may not initially have approved access. - The system tracks the date each employee gets approved to use a service. Upon first approval, employees create a username and password, which remains consistent across all future approved services.
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 4 steps with 1 images

Blurred answer
Recommended textbooks for you
Computer Networking: A Top-Down Approach (7th Edi…
Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON
Computer Organization and Design MIPS Edition, Fi…
Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning
Concepts of Database Management
Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning
Prelude to Programming
Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education
Sc Business Data Communications and Networking, T…
Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY