team system Plan
<college or university Name>
team system Plan
Course: ISOL536 – Security Architecture and Design Dr. Charles DeSassure, Adjunct Professor
Graduate Computer Science Program
University of the Cumberlands
Type the Group Number Type the current date
Team System Project using MS Access
Page 10 of 11
College or University Name: <Make up an imaginary name.>
Overview: <Provide an overview or the group college or university. You may include some information from the instructions. Delete this line.>
ROLE AND RESPONSIBILITIES
Type team member name
Role on this Project
Insert a quality head picure of yourself. Adjust photo so it can appear professionally. Add additional rows if required, an delete empty rows. <Delete these instructions>
SYSTEM REQUIREMENTS (Tables)
Include the name of all table tables that will exist within your system. Provide a brief overview of each table, two or three lines will be fine. Include only the table information on this page. Single space with a double line space between tables. <Delete these instructions>.
SYSTEM REQUIREMENTS (Relationships)
Indicate which table will have relationships to what type and explain why <Delete these instructions>
SYSTEM REQUIREMENTS (Reports)
Indicate the type of reports that will be generated by the system. Five different types of reports are required. Provide the purpose of each report <Delete these instructions>
SECURE SYSTEM REQUIREMENTS
What is the group recommendation on what is required for this sysem inorder for it to be a secure system? <Delete these instructions>
MS ACCESS SYSTEM DESIGN – THREAT MODELING
Now that your team has the system design completed, a team member will need to create a Threat Modeling Design (drawing) of the system. Use only the symbols that we have used in this class. Embed the system design into this report on this page. <Delete these instructions>. MS ACCESS SYSTEM DESIGN
Now that your team has the system design completed, a team member needs to create each TABLE, each RELATIONSHIP, and each REPORT within MS Access. Input five records within each table. <Delete these instructions>. Nothing should be on this page except the TITLE and the statement below.
MS Access file uploaded to Blackboard.
<Using MS Access Protection/System>. Password protect the file.
Include the password for this file on this page before uploading to the professor. Test and test the system to ensure that the password is working. If not, the professor will not be able to review the group MS Access file.
Provide recommendations on how the group may enhance this system in the future.
The post team system Plan appeared first on ExpertCustomWritings.
Assignment status: Solved by our experts