Wednesday, May 6, 2020
Database Administration for Neighbourly Shared Food- myassignmenthelp
Question: Discuss about theDatabase Administration for Neighbourly Shared Food. Answer: This report discusses about the requirements of a group named Neighbourly Shared Food for the purpose of executing the new processes for the better performance of the group. NSF is a group of people who were encouraged after attending a conference. The main aim of the group is to swap the foods without any cash transactions. They have desired for including new members to the community. For the promotion of their community they had organised an event which had attracted a lot of new peoples (Ellison, Steinfield, Lampe, 2013). They had a small enrolment fee for new members. The enrolment process was done manually which included lots of paperwork. For that purpose, they decided to adopt new means for the purpose of better promotion of the community and a new and easy process for including new members. Along with all this they also think of storing the data and informations of the new members. This report discusses about how they can store their data and what is the most convenient plac e for storing the backups (Chang, 2015). Along with this the report also focuses on the necessary requirements for the purpose of backing up the data. A new system has been developed in the whole report along with the security issues for the better operation of the community. Discussion: The company should first of all think of including peoples beyond the household members. They might think of including commercial organisations also. Along with this they should also think of increasing their community representatives. As the total process does not include any cash transaction so the process should include more and more peoples interested in swapping their items. Due to the organisation of the autumn festival in a botanical garden it attracted many partner organisations. What the partners do is they provide stalls and workshops and many more at a discounted rate for the purpose of attracting more peoples toward the group NSF. Instead of using one social networking site for the purpose of promotion they should also think of using more social sites for the purpose of promoting their operations (Rodgers, Skowron Chabrol, 2012). The organisation also had a manual process for the purpose of including new members. Now the group thinks of doing this online so as to remove the hustle of doing paper works. With increased popularity in a span of two years the interest among the people for this group is also increasing. For the purpose of including more easily and looking into the side of the new willing peoples the group should create their online portal as soon as possible. Not only the portal will help in easy registration to the people but also help the peoples to pay their membership fee very easily (Nimrod, 2012). Besides this facility the online portal will also help in conserving the time both for the group as well as the new members. By the use on online portals the group can contact its new members very easily. The online payment is also secure in cases of online portal benefiting both the new members along with the group. The generation of the receipts also becomes automatic thereby helping a lot. By providing benefits in the online registration process the group can attract new members. The members can also be informed about the new events an d the various programs by the use of this portal. The details of the members become easily available to the group admins. The new members can be informed easily by emails (Kang, Tang Fiore, 2014). The online registration process can help in getting easy knowledge about the interested persona and can also help in knowing the experience of the participants in the events. This can initially help the community to think of making a better plan for the next events. Besides providing and collecting information the community can collect donations and can track the information of the donor. The main aim of online registration process is to provide easy and a convenient way of registration for the new members. The community can easily collect the information of the new members. More accurate and efficient way of including new members by removing the use of paper works. The main function of this process is that it will help in including members from different parts pf the world instead of a single country. The problem of running out of paper forms, taking of the proper ink pens and many more are avoided by this process. Online registration process removes the problem of avoiding the mand atory fields. That means a new applicant has to fill up the mandatory fields in order to complete the registration. Online registration process is almost user friendly and will prompt almost immediately so as to acknowledge the new applicant. One of the most important function of this process is that allows the applicant to apply according to their convenient time (Quan et al., 2014). There is no need of the community representatives to be present all the time during the process of registration thereby helping in saving the time of the group members. Security policies relate to online registration: The creation of the online portal by the group needs to follow various security policies. First of all, the group should think of securing the contents in the portal. Alert option should be enabled so as to get information whenever there is a breach in the security of the portal. The site must contain a bookmarklet so as to help everyone. Along with this the X-frame should be kept in the blocking mode helping in times of clickjacking attacks and any types of framing related attacks. For the purpose of avoiding SQL injection attacks the developer of the portal should prevent unwanted inputs from untrusted parties so that they do not interpret by being a part of the SQL command. The use of Query Parameterisation programming technique can be used for the purpose of avoiding the SQL injection attacks. For the purpose of storing passwords in the site the group must use the three techniques that are use of one-way algorithm, use of salt and the use of an algorithm that is purposely slow. T his can help in preventing the GPU cracking rigs and any type of similar resources that can expose the password (Heath, 2012). Use of the certain algorithms like the SCRYPT and the PBKDF2 can help in avoiding this type of problems. The use sophisticated and important programming technique can help in avoiding the contextual output encoding problem. For the purpose of preventing forgery, the group must tell the developer to deploy cryptographic tokens so that the users can re authenticate so as to complete the transaction or any type of events (Martins, Oliveira Popovi?, 2014). There should exist a multiple authentication process. For the purpose of requesting new passwords in case if the user has forgotten the old password then there should be proper process for validating the identity of the user. There should exist a security question or the use of a verification code by the use of out-of-band method. Backup and recovery of data: Backup is nothing but the replication of the data in certain memory locations for the purpose of recovering the data if they are lost. Backup of data is something that every organisation needs. By backing up all the necessary information and data according to their types can greatly help them recover the data in case of a disaster (Fu et al., 2014). Backup is essential because there are many cases where it is seen that the data once lost by accident or intentionally can never be recovered which leads to a large amount of difficulties. Therefore, if the data is stored in the backup then it can be easily recovered and can be reused. Backing up of data makes the file accessible at any time. In cases a hacker attacks the system or a virus from the internet attacks the system can lead to data loss. The data lost can be easily recovered if the data are backed up (Devi, Khanna, Bhalaji, 2014). The best place for backing up the data is the use of the cloud storage. Cloud storage is the latest technology that is being used by most of the organisations for the purpose of storing data and creating backups. Cloud backup is nothing but a process of creating backup online. Cloud backup includes the making of a copy of the data on a private network and then send it to an off-site server. This type of servers is mainly hosted by the third party service providers. The group can use their funds to pay the fees of the providers. This type of fees is based on the capacity of the storage, bandwidth and many more things. The data stored is in the digital form. The providers are mainly responsible the storing of the data. The cloud backup provides the facility to the group to recover their data from the cloud at any time and from any location. Services provided by the cloud is accessible almost from any location (Alhazmi, Malaiya, 2013). Users are able to access the important files, data , documents and IT tools from any device having an access to internet. The security features of the cloud storage are also high. The group has to pay only for storing the data. The process of backing up of data occurs remotely. The facility provided by the service providers that is the building up of the whole cloud backup system around the groups software requirement. This is running according to the schedule which is determined by the purchased level of the service. The group should pay so that there is a contract with the service providers for the daily backups. The recovery time needed by the use the use of cloud is much more than the traditional backup processes that is by the use of tapes or a disks (Suttisirikul, Uthayopas, 2012). The company must make an estimate of the time required for restoration of the backup data. In tapes, a company can keep backups of data on a monthly, weekly, quarterly and annual basis. Backup from tapes is time saving as well as restoration can be done from any point in time. Whereas in cloud backup process there is continuous replication of data and changes overwrites the previous file. This is advantageous as it saves time and bandwidth but it is also disadvantageous du ring the need of an older version of the files (Mkandawire, 2012). Consulting with the service provider if they keep an older version of files helps in solving the problem. Conclusion: The discussion helps us to conclude that the above discussed systems and the way of backing up the data can be very much beneficial for the community along with meeting the needs of the community. The use of the online registration process can greatly help the community in including new members to the community. Along with including new members they can also provide an assured security about the informations of the new members. The various of benefits of using an online portal as discussed above proves to be best system for the community. Along with this the report also helps to conclude that the best storage location for the backup is the use of the cloud. The cloud provides lots of security options thereby heling out the community a lot. The total report helps in understanding the requirement of creating the new system for the community to meet its demands. proper communication with the service providers and understanding the terms and conditions of the service providers can greatl y facilitate the community. Not only this the community can also organise a better event in the future. Reference: Alhazmi, O. H., Malaiya, Y. K. (2013, January). Evaluating disaster recovery plans using the cloud. InReliability and Maintainability Symposium (RAMS), 2013 Proceedings-Annual(pp. 1-6). IEEE. Chang, V. (2015). Towards a Big Data system disaster recovery in a Private Cloud.Ad Hoc Networks,35, 65-82. Devi, M. S., Khanna, V. V., Bhalaji, A. N. (2014). Enhanced Dynamic Whole File De-Duplication (DWFD) for Space Optimization in Private Cloud Storage Backup.International Journal of Machine Learning and Computing,4(4), 376. Ellison, N. B., Steinfield, C., Lampe, C. (2013). The benefits of Facebook friends: Social capital and college students use of online social network sites.Journal of Computer?Mediated Communication,12(4), 1143-1168. Fu, Y., Jiang, H., Xiao, N., Tian, L., Liu, F., Xu, L. (2014). Application-aware local-global source deduplication for cloud backup services of personal storage.IEEE transactions on parallel and distributed systems,25(5), 1155-1165. Heath, S. (2012).U.S. Patent Application No. 13/712,919. Kang, J., Tang, L., Fiore, A. M. (2014). Enhancing consumerbrand relationships on restaurant Facebook fan pages: Maximizing consumer benefits and increasing active participatio Qin, X., Salter-Townshend, M., Cunningham, P. (2014, January). Exploring the Relationship between Membership Turnover and Productivity in Online Communities. InICWSM. n.International Journal of Hospitality Management,36, 145-155. Martins, C., Oliveira, T., Popovi?, A. (2014). Understanding the Internet banking adoption: A unified theory of acceptance and use of technology and perceived risk application.International Journal of Information Management,34(1), 1-13. Mehr, J. D., Murphy, E. E., Virk, N., Sosnosky, L. M. (2015).U.S. Patent No. 8,935,366. Washington, DC: U.S. Patent and Trademark Office. Mkandawire, S. (2012). Improving backup and restore performance for deduplication-based cloud backup services. Nimrod, G. (2012). The membership life cycle in online support groups.International Journal of Communication,6, 23. Quan, J., Chan, M. A., Moss, T., Fleming, M. K. (2014).U.S. Patent No. 8,747,232. Washington, DC: U.S. Patent and Trademark Office. Rodgers, R. F., Skowron, S., Chabrol, H. (2012). Disordered eating and group membership among members of a pro?anorexic online community.European Eating Disorders Review,20(1), 9-12. Suttisirikul, K., Uthayopas, P. (2012, December). Accelerating the cloud backup using gpu based data deduplication. InParallel and Distributed Systems (ICPADS), 2012 IEEE 18th International Conference on(pp. 766-769). IEEE.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.