* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Initial design of a relational database system for
Oracle Database wikipedia , lookup
Open Database Connectivity wikipedia , lookup
Extensible Storage Engine wikipedia , lookup
Entity–attribute–value model wikipedia , lookup
Microsoft Jet Database Engine wikipedia , lookup
Concurrency control wikipedia , lookup
Clusterpoint wikipedia , lookup
ContactPoint wikipedia , lookup
Calhoun: The NPS Institutional Archive Theses and Dissertations Thesis and Dissertation Collection 1985-03 Initial design of a relational database system for NPS computer asset identification and valuation for Risk Assessment. Thompson, Fred W. http://hdl.handle.net/10945/21383 DUDLEY KNOX LIBRARY NAVAL POSTGRADUATE SCHOOL MONTEREY. CALIFORNIA 93943 NAVAL POSTGRADUATE SCHOOL Monterey, California THESIS INITIAL DESIGN OF A RELATIONAL DATABASE SYSTEM FOR NPS COMPUTER ASSET IDENTIFICATION AND VALUATION FOR RISK ASSESSMENT by Fred W. Thompson March 1985 Thesis Advisor Norman R. Approved for public release; distribution Lvons is unlimited T22402 SECURITY CLASSIFICATION OF THIS PAGE (Whti Data Enfrad) READ INSTRUCTIONS BEFORE COMPLETING FORM REPORT DOCUMENTATION PAGE 1. 4. REPORT NUMBER J\TLE (and 2. GOVT ACCESSION NO. Subtitle) Initial Design of a Relational Database System for NPS Computer Asset dent if icat ion and Valuation for Risk _ A ssessment 7. AUTHORr*; ^Fred W. 9. 3. RECIPIENT'S CATALOG NUMBER 5. TYPE OF REPORT & PERIOD COVERED Master's Thesis March 1985 6. PERFORMING ORG. REPORT NUMBER e. CONTRACT OR GRANT NUMBERC*; Thompson PERFORMING ORGANIZATION NAME AND ADDRESS 10. PROGRAM ELEMENT. PROJECT, TASK AREA WORK UNIT NUMBERS ft Naval Postgraduate School Monterey, CA 93943 11. CONTROLLING OFFICE NAME AND ADDRESS 12. Naval Postgraduate School Monterey, CA 93493 REPORT DATE March 1985 13. NUMBER OF PAGES 15. SECURITY CLASS, 123 14. MONITORING AGENCY NAME » ADDRESSC// dUfarant from Controlling Ollica) (ot thia raport) UNCLASSIFIED ISa. DECLASSIFICATION/ DOWNGRADING SCHEDULE 16. DISTRIBUTION ST ATEMEN T fof (h/» R»porO Approved for public release; distribution 17. DISTRIBUTION STATEMENT 18. SUPPLEMENTARY NOTES 19. KEY WORDS (ol the abatract entered In (Continue on reverse aide Block is unlimited 30, II dlllerenl Irom Report) neceeaary and Identity by block number) It relational database design, computer risk assessment 20. ABSTRACT (Continue on reverae aide It neceaaary and Identity by block number) Relational database technology is examined as a means to cupport computer Risk Assessment at the Naval Postgraduate School. The current methodology for conducting computer Risk Assessment within the Department of the Navy is used to construct an initial design for a relational database system. The initial design focuses on computer (Cont inued) DO 1 JAN 73 1473 EDITION OF S 1 NOV 65 IS N 0102- LF- 014- 6601 OBSOLETE 1 SECURITY CLASSIFICATION OF THIS PACE fl»h»n Data Bntarad) SECURITY CLASSIFICATION OF THIS PACE (miMi Data Bnff4) ABSTRACT (Continued) asset identification and valuation as the first step of the computer Risk Assessment process. S N 0102- LF- 014- 6601 SECuniTY CLASSIFICATION OF THIS PAaE(ir?i*n Dmtm Bnffd) Approvpd for public release; d''str"'but"'on unlimited. Initial Design of Relational Database System for NPS Computer Asset Identification and Valuation for Risk Assessment by Fred W. Thompson Jr. Lieutenant Commander. United States Navy B.A.. Vanderbilt University, 1974 Submitted in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE IN INFORMATION SYSTEMS from the NAVAL POSTGRADUATE SCHOOL March 1985 ABSTRACT Relational database technology is examined as a means to support computer Risk Assessment at the School. The current methodology for conducting computer Risk Assessment within the Naval Department of the Navy construct an initial design for a initial and valuation as Assessment process. the first is used to relational database system. design focuses on computer asset The Postgraduate step of the identification computer Risk TABLE OF CONTENTS I. II. III. IV. INTRODUCTION 9 A. BACKGROUND B. THE C. ADP SECURITY DIRECTIVES 13 D. WHY DATABASE 15 9 NAVY'S NEED TO CONTROL COMPUTERS 12 1. Advantages 17 2. Disadvantages 19 RELATIONAL DATABASE DESIGN OVERVIEW DATABASE DESIGN PROCESS A. THE B. WHAT IS C. THE ENTERPRISE D. THE E. PHYSICAL DATABASE DESIGN A RELATIONAL DATABASE MODEL LOGICAL DATABASE DESIGN USER REQUIREMENTS ANALYSIS 23 25 27 30 31 32 34 A. USER ENVIRONMENT 34 B. USER REQUIREMENTS 40 C. THE SYSTEMS FUNCTION HIERARCHY CHART 43 D. THE ENTERPRISE MODEL 48 1. Defining Data Elements 48 2. BACHMAN Diagram 53 LOGICAL DATABASE DESIGN 54 A. PROCEDURE 54 B. SEMANTIC MODELING 55 5 C. VI. VII. ENTITY-RELATIONSHIP MODEL 1. The Entity-Relationship Diagram 2. The Log-ical Schema PHYSICAL DATABASE DESIGN A. OBJECTIVE B. THE C. NORMALIZATION D. THE E. DATA MANIPULATION 56 58 62 PROBLEMS WITH SEMANTIC MODELING D. V. THE 65 69 69 RELATIONAL MODEL 69 71 RELATIONAL SCHEMA 76 80 IMPLEMENTATION CONSIDERATIONS 87 A. DATABASE MANAGEMENT SYSTEMS 87 B. RELATIONAL DATABASE 91 C. DATABASE MANAGEMENT SYSTEM SELECTION IMPLEMENTATION EVALUATING THE DATABASE DESIGN 92 98 A. DESIGN OBJECTIVES 98 B. INITIAL DESIGN 98 C. DESIGN ITERATIONS 99 D. EVALUATING DATABASE DESIGN 99 VIII. RECOMMENDATIONS 104 IX. CONCLUSIONS 107 APPENDIX APPENDIX LIST OF A: B: EXAMPLES OF FORMS USED COMPUTATIONS IN RISK ASSESSMENT ACTIVITY ACCREDITATION SCHEDULE REFERENCES INITIAL DISTRIBUTION LIST 109 116 120 123 LIST OF TABLES I. Advantages of Database Processing 21 II. Stages of Logical Database Design 32 III. Impact Value Ratings 37 IV. Successful Attack Frequency Rating 41 V. Threats and Their Impacts 42 VI. Annual VII. Primitives World 48 VIII. Table of Object Descriptions 49 IX. Tabular Description of Enterprise 57 X. Entity-Relationship Terminology 58 XI. Entity-Relationship Attribute List 63 XII. Record Specificat-^ons for Logical XIII. Relational XIV. Summary of Normal XV. Relation Definitions 81 XVI. Attribute Domains 82 XVII. Domain Definitions 83 XVIII. Fundamental XIX. Primary Goals of DBMS XX. Partial Loss Expectency Computation in the Model Real 44 Schema . . . . Terminology 70 Forms 74 Capabilities of DBMS Database Management System Feature List 66 90 91 . 96 LIST OF FIGURES 2.1 Relational Process Database System Development 24 2.2 Relation 3.1 Major Steps of Method One Risk Assessment 3.2 Asset Valuation Worksheet 38 3.3 System Function Hierarchy Chart 45 3.4 Bachman Diagram of the Enterprise Model 4.1 Conceptual Entity-Relationship Diagram of Risk Assessment Database Design 59 Entity-Relationship Diagram of Asset Identification View of Risk Assessment 61 5.1 Relation ACTIVITY 72 5.2 Data 6.1 Relationship between DBMS and OS 88 6.2 Using the Personal 94 7,1 Design Iterations 4.2 INVENTORY 29 Definition of E:NUM Database . . . .... 35 53 79 103 I. BACKGROUND A. rapid Thp about a dramatic growth tremendous federal the In INTRODUCTION increase in technology has brought applications by computer Computer proliferation has been so government. that it has outstripped the ability to control it. government has not even been able to maintain many cases. accurate computer in inventories of how much computer equipment has been bought or who has it. only $3 "The General 1976. In to bracket Accounting Office (GAO) was Federal data processing spending as billion and $10 billion of Management Office $5.5 billion. has estimated and and Budget the General the More annually. cost of (0MB) serious acquisition. in is a figure development software problem hand with computer growth of is of the and 1] than the problem of controlling the the Services Administration (GSA) maintenance alone at $2.2 billion." [Ref. More between recently. has cited able computer computer security. increased dependence Hand on computers for everything from Early Warning Detection Systems for national defense to word processing systems for administration Data Processing Increased dependence on support. (ADP) to support mission routine Automatic accomplishment increases the need to protect those ADP resources. spcurity ADP disclosures wrongful activity. against "'"on against an continuing operations. For example. failure of supporting utilities. neighboring personnel. of ADP ADP security encompasses threats to property and capital equipment and the physical ADP to protect to physical assault or general. In limited not is programs, or data files disasters. nonavailability fraudulent for failures, tampering with hazards. used hardware hazards input, purposes. and interception of acoustical or electromagnetic emanations from hardware are all ADP part of the ADP security problem. resources are vulnerable to problem A attention t y a physical identification "The requires effort of solution primary how much ADP with the starts a physical risks to ADP security is an essential of security program. of what is at risk analysis involves Ri'sk what those risks and purpose of risk analysis magnitude, controls entire implementation, and maintenance of security problem by identifying security their the utmost the program. Analysis of magnitude security The establishment. i wide assortment of threats. concentrated and organization. secur this of a ADP are and is [Ref. understand risks. 2] Besides the are. the determining or determining required, risk analysis determines how much protection already exists. used to determine to identifying areas where safeguards needed." protection is part the amount 10 Risk analysis can also of resources needed be for ] spcurity and where to allocate those resources. analysis risk balance is between "The help ADP management strike an to impact the risks of economic cost the and aim of of protective measures." [Ref. 3] results The which information it which course of action As result. a or damage regarding pursue providing security. to abreast [Ref. required assessments by at of the or system. The federal not something that is of changes 4] Naval mission. in done facilities, and with ADP equipment activities OPNAVINST 5239. lA. is performed periodically "It must be their update to risk least every five years besides performing new assessments for any changes procedures, in best to present the estimates of loss is filed away. equipment." are decisions quantitative terms. in one time and stay with can use to make risk analysis process The to it management risk analysis provide of in equipment, software, operating any change that might affect overall [Ref. 5 government problems security must approach both these security economical manner. The government and control has issued guidelines on risk analysis including an approved management program. methodology The for environment in an implementing by passing risk for computer resource control than that of computer security. effort to control a the different Congress has spearheaded the ballooning growth laws to strictly control 11 is in computer resources resource acquisition. Brooks Act. The passed 1964. in has indirectly compelled agencies to maintain accurate inventories of computer federal assets order in defend to justification new for acquisitions. organizations. Most comes providing to Congress requires but, does it contrast. is NAVY'S SECURITY Navy resources. [Ref. 6]. close to increasing TO made This in CONTROL a was and and control ACQUISITION investment approximatly the rate Various computer in budget for $1,961,000,000.00 of growth has of these resources has been become impact future ADPE acquisition committees and individual members a provide information to 12 the in of increasing level of expenditures for data processing and have to AND increase over FY84 of Congress have expressed concern about the agencies defined well The ability to effectively and efficiently manage these resources will Federal a In recent years. serious problem. Navy. large COMPUTER figure represents an percent Management the how to do it. supported by is established, be recommended to solve this problem. FY85 in 25 control it resources. automatic data processing (ADP) The Navy the computer guidance on provide NEED has are on their own when control that effective assessment risk THE The means to not methodology that B. however. Congress requested on the purposes for which computers are used. of expenditures requested level the [Ref. significant demanding ADPE obstacle Federal acquisition acquisition ADPE part due to long the required as a Navy A Careful planning is system The times required lead necessary ADPE the in in The idea effective is control of existing ADPE computer resources and utilization would also aid the Navy to part if of in resources are optimally utilized. Effective control effective corrputer implemented to computer that provides an accurate accounting making sure that its is distribution of limited funds. strengthen its argument for more can demonstrate assets. procedure. result of limited resources. can is Justification of the need for ADPE achieve optimum efficiency The automation requires extensive planning and procedure acquisition procedure. it activities. these future to justification documentation. in for 7]. A the how they are used and of computer assets is also security. Computer essential security is through an ADP security program and an essential of any security program is risk assessment. Risk ^'s determined from the evaluation of threats and vulnerabilities in One relationship to the assets of the ADP facility necessary [Ref. steps in conducting risk assessment is identification and valuation. 13 8]. asset C. ADP SECURITY DIRECTIVES security ADP "is receiving attpnt^on at every The Office of Management executive branch. the assigned responsibility was (0MB) policy-making development software acquisition by the Brooks Act of greater and time. inability was very great expense -- was limiting benefits of technology." [Ref. Congress. other through Federal National The provide Bureau Processing although comprehensive study It -- its except at ability to realize the management. ADP was (NBS) assigned also Act. NBS published not the At that directed developing guidelines and Publication Standards publication. physical Brooks Standards June 1974. In make 9] the of in In to coordination and technical guidance overall 10] its agencies responsiblities for government's efforts [Ref. concerned protect data in computer systems to -- security. computer in Government Federal the systems 1965. industries related service investments capital and industry -- hardware manufacturers, urged private houses Budget and computer to of oversight for the applicable functions and "0MB 1972. level a Federal (FIPS directive. PUB) was to to the standards. Information This 31. first the for government agencies concerning ADP security and risk management. was 0MB C'ircular A-71 that made Federal start to think seriously about computer security. of Management and agencies The Office Budget, relaeased 0MB Circular A-71 14 in 1978 demonstrating highest concern the levels of minimum established computer for security Circular government. In controls computer for that every agency implement them through security program. Department of Systems". directive protection of classified Department of the forth Specifically. systems responsible implemented the A-71 computer an policy (ADP) for the systems. The in April. requirements put 5200.28. activities operating computer DOD ADP Security Officer would who conducting risk assessments on for entitled Processing ADP the Directive and directed all appoint to in and 1978. Navy issued OPNAVINST 5239.1 Circular it established material instruction 0MB in 0MB Defense issued DOD Directive 5200.28 This This A-71. a December. In Requirements for Automatic Data "Security 1979. 11] the security required [Ref. at be periodic a basis. August In is OPNAVINST 1982. was released which the current directive governing ADP security requirements. instruction This Navy's the from provides program security ADP Navy (DON) What follows is systems and a comphrehensive including review of the the Department approved risk assessment methodology. instruction this a that the data requirements computer asset database model and 5239. lA a for is the for this thesis are determined. discussion of the origins for database look at database disadvantages. It of systems technology advantages This discussion supports my decision to 15 propose database a analysis and computer control D. appli cat-ion for des''gn problems. WHY DATABASE database A integrated in records the is collection of integrated files. a those in files. A usually a Management large complex System (DBMS). database also program called can readily available to many be applications. besides DBMS. The a is accessed the Database DBMS fills the role of The is among contains The database manager, which brings together an organ izat it It relationships stores sense that it the description of its own structure. by risk the to -ion's data data so that different users storing data. and stores a description of the format of the data. There of database systems. acquisition. application another. portfolios resultant major factors that led to the development are two The first was motivated by the gradual organizations. by programs that were developed was the demand growth for more in independent of one applications user sophistication information. for which they were specifically developed. to of Coupled with the growth of corporate these applications could not be used fact portfolios large of However. and most This was due to other applications outside the scope of the problem to of purposes beyond that that specific applications were created without was being designed the the regard each Each application was unique and solve. 16 was generally not compatible with other programs. there was great difficulty words, integrating application in programs to work designed to do programs was becoming unmanageable due the APOLLO project. factor was American North needed coordinate the vast collection of research millions the of ensure, individual entire assembly parts supplied by all The (GUAM), with result in a technical and the other f-irms that each level, Generalized 1964 whose logical by IBM, [Ref. Update and production and fH of into properly with all the work the organize components would correctly was the developed data on a prime the way to a of support to Rockwell, the project, to demand development the for and the of constant contractor groups originally not maintenance package designed by IBM software specific were the programs. in major second they if Additionally, so. for minor changes The together other In other 12], Method Access GUAM was designed to deal structure was hierarchical and for second-generation hardware which relied heavily on the use of magnetic tape. Database processing provides several advantages traditional file the is be that data processing. stored independent of one could be in In files another. file which processing are 17 systems, considered Consequently. produced by processing data over to information stored t n two different files partitioning contrast. in information 1s a of computer entry given amount of data database of processing of data duplication. a is It the is reducing By much easier to maintain data element than also result in it to maintain is a two Reducing data faster processing advantage - of processing database data and changed when the data structure be access indirectly data sometimes database record or implemented. The [Ref. ""t through because DBMS. the In specific programs, and new technique for field a is added processing files 13] benefits of economies of scale are another advantage database processing. benefit a changed is DBMS need to be changed when the that is Programs do not have independence. data general, only the database structure. of and . programs is more Additionally, the problem of allows for program a in storage space. can Another to Therefore data. instances of the same data element. duplication DBMS, A structure makes more efficient single instance of three system. available for decision making. integrity is reduced. data artificial the to the database data redundancy. to produced from or elimination reduction or the advantage Another use partition not can be more knowledge processing file a does available due not is all application. users and Improvements made to the not only users of a database particular Finally. pnvironmpnt DBMS the enables the user to perform more sophisticated information retrievals. Before going on to the disadvantages of database systems. detail. created problems that independence Data by proposes making changes reorganizing necessitate files or programs that are used is able in files in alleviate to impact any organized tailor files to to specific application a database that the others. kept Thus. a is different from the It not being need. Data independence allows any user or group of users to have of other all system. intended to solve the problems of users also files programs and or the views a view used by change made to accommodate one user can be invisible to others; change made to the structure of a a file, or to the storage device characteristics, can be hidden from users; all suited to the users needs. independence Data database. with data each user can be given its On view of is [Ref. a the form 14] not an automatic benefit of using a adopting the database approach, the contrary. emphasis on sharing of data, causes the problem that independence The is benefits intended to alleviate. of database technology without certain costs; both financial most a that includes only the relevant contents in database well and visible associated with financial the and 19 come nonfinancial. The database approach cost of the acquisition of not do a DBMS. is This large and complex software hundreds of thousands of package can cost dollars. Additionally, where existing applications protfolios costs associated with going conversion large. are database system approach can be expensive. reduced system reliability, emphasis on of usage resulting information power possibility in of optimization global users relinquishing their information decisions on make to Less quantifiable database approach include the of the costs the to strictly a local basis, and the reduction of data processing efficiency. technology Database efficiency. Database troubled is by technology systems problem of involves the the requirement for extensive overhead processing of each file on each access to the database. are be to faster acquired. additional maintained. processors equipment additional and expertise Also. traditional throughput rates If memory form the in of have to be will required to design, manage, is support, and maintain the database. Another more vulnerable approach. propagate system. to errors. errors any independent often and there in advantages is In that the were the introduced into to With the database possibility that errors could Table disadvantages associated 20 the likely redundant files were not processing. are mult i -file unanticipated directions. and they traditional immediate vicinity. beyond the further and the problem with database systems is that I w'th spread summarizes database Thesp advantagps and disadvantagps characterize database systems in general. exhibit not many Microcomputer systems. of the disadvantages TABLE noted however. above do while I Advantages of Database Processing Information from the Same Amount of Data 1. More 2. New Requests and One-of-a-Kind Requests More Easily Impl emented 3. Elimination of Data Duplication 4. Program/Data Independence 5. Better Data Management 6. Affordable Sophisticated Programming 7. Representation of Record Relationships Disadvantages of Data Processing 1. Expensive to develope 2 Compl ex . 3. Recovery More Difficult 4. Increased Vulnerability to Failure maintaining argument explored most of the advantages. favor in in a of This is microcomputer DBMSs later chapter. 21 an that important will be 1 This first discussed the importance of chapter has for maintaining effective control requirements resources. concept The of database effect control has also been introduced. will discussed be Specifically. proposed control Schoo 1 database and risk analysis to in later chapters. initial design support is for a program for the Naval Postgraduate . present an overview of the relational will Two database design process. data model Advantages of using the relational also be addressed. will Five detail specification. the Chapters Three. Four, and logical database design. and physical database design phases respectively, to create database to control examines the process of database the means a Database technology necessary means to provide a Chapter the detail relational a as greater in computer of systems as and selection database of a Seven evaluates design process and discusses the concept of iterations as Eight presents a optimization. means toward design initial the design in the Six involving implementation. Chapter DBMS. Chapter resources. computer a context the design Chapter of the overall database project and recommends follow-on thesis work to complete the project. initial database design. database also the implementation. database administration. are Conclusions are then drawn h i gh ighted iterative design process. and design and Relational in database the context of risk . 22 about assessment, ^^•MiiAIIONAi DATABASE DESIGN OVERVIEW chapter This the concentrates on the first three phases system development process; user requirements logical design, and physical design. the design logical design process. database development follows. In A process and the used to describe thesis, the To are development phases, the and The have been many the discussion design. be physical These five phases products of the different To differentiate between products and rectangles are used to denote phase end- containing the "Logical product of the oval Schema" For example, is the end- containing the "Logical Design" phase. also been many terms used different phases of system design. terms used in be logical ovals are used to denote phases. rectangle There process the various phases of and maintenance. Figure 2.1. in phases are also shown. products the five basic development phases will implementation, illustrated there have help simplify the called user requirements analysis. design, design system science literature, terms this of short explanation of the system A system development process. in part brief definition of user is also provided. computer different analysis, These later two phases, physical design are and of to For our describe the purposes, the Figure 2.1 to discuss system development. used to discuss the design 23 process as well. will PHASE ^ User "^"\ ( Requirements ) ^^v^.^^Analysis^^^^-^ 1 Design Specifications PHASE /^ Logical ^N Vv Design ) 2 Logical Schema PHASE 3 Physical Design r ( V^^ ^N J Relational Schema PHASE 4 PHASE 5 ' ( ( Implementation Maintenance ) ^ Figure 2.1 Relational Database System Development Process 24 system development and The terms, system design, development. to different levels of computer system design is subset of the system development system design process involves two phases that fall a user requirements analysis phase and the refer System process. The between implementation the system development process. phase of the overall The term user. this problem, refers to the end-user for of the computer system. The computer system is designed provide to direct support Direct user. the stipulated because the end-user, support is implies some this case, in to interaction on the part of the user with the computer system, THE DATABASE DESIGN PROCESS A. There are down already If is extended final The best little a this is the case. feasible. more selected decision between based investment large generally time usually is a programs. a Making bottom-up. and philosophies is basic approaches to database design: two in whether on conventional these two there is files and then the bottom-up approach Here, for conversion one and application at database is the One problem with this approach by stages. top- the is database could end up being far from optimal. top-down used approach is the preferred approach when creating conversion is a new required. system. The goal preferably is to and is where produce rational, integrated solution to business information needs. 25 a The top-down sequence of steps. database Each considers different problems of called is There enterprise process and elements functions simplifies [Ref. Enterprise structures are defined. seman t i model c is It is process. an The for these of concentrates data refers to the part of the and each facts Then, system. user the in relationship between The described by Data data in important that model a databased or The chosen that captures the be of the organization's important design tool general The and model data a user . Relational Model data The data. the database development in will advantages of the Relational Model phases. and organization be used to design Computer Risk Assessment Asset Identification Database. In on The design begins by defining data usually features essential model are both it. class function is usually expressed graphically. methodologies staged methodologies One a 15] databased methodology, that are used by, and This design, hoc today. use in being looked at. is follows stages and the design tools used at the data. information ad several different design design methodologies, to design methodology. a are top-down methodology different levels of detail. design the of design sequence st- contrast in formalizes that design design at approach. stage database terms, the first design will be discussed process concentrates phase 26 consists on the the The later. of two user's . requirements that is database design phase. database design phase. database physical a conceptual of the organization. model a building and The database This is second phase given the logical logical the physical the is The designer must structure construct design the and an implementation model. WHAT IS B. A RELATIONAL DATABASE objectives which There are three meet. should requirements and can be used to identify It user present them in a way that is easily understood both by users and by computer professionals. can It 2. t i converted easily be impl ementa techn ical to on It provides rules and criteria for efficient logical data representation. [Ref. 16] 3. relational The model meets the first objective easily and unambiguously comprehend. using by tables. This because designers provides an interface that both users and it model formal These are: 1. as a can accomplished is The organizational data specified is set of tables or relations. a The model next because through a available structure it DBMS. on convert objective the the is also satisfied with a can be directly implemented on Several different systems Another solution market. relational model . 27 to a are relational machine a currently would different be to physical objective relates to criteria for good logical The last design: 1. Each fact should be stored once 2. The database the database. in should be consistent following database operations. should be resilient to change. The database 3. criteria These normalization. Dent, prevent update anomalies to inconsistencies." [Ref. Another of the relational aspect particularly is relational factors, languages selective strong successful are provide i.e., and data 17] model provide languages to access relations. language called process a "Normalization rules", as defined by William designed "are through realized are a for That power. must The relational model reasons. two particularly natural that it is sensitivfr interface. is, it can First, human to Second, it has retreive data that satisfy any condition covering any number of relations. [Ref. 18] The database of goal as a relational set of normal des^ign is relations. The by defining data elements or attributes. all the data elements. the other records. data and The access to into the begins identifying determine how each element relates to other half of the picture is data and to turn it process After then assemble one-to-one related language structure which -is used information. to both elements the into relational maintain the Figure example of same a form INVENTORY it stores and TOTAL. provides an illustration of 2.2 a relation. relation, named INVENTORY, appears as a paper inventory form it in nearly the represents. relation contains information about supply RELATION: each PART_NUMBER. This The parts; QUANTITY. DESCRIPTION. PRICE, INVENTORY QUANTITY PART NUMBER DESCRIPTION PRICE TOTAL 2.00 2.00 mill FAN BELT 222222 WHEEL 20.00 40.00 333333 CYLINDER 30.00 30.00 444444 TIRE 30.00 90.00 Figure 2.2 Relation INVENTORY Each relation possesses the following properties: 1. 2. in There is one column attribute of the relation. given a name that is unique The entries in the in the column come 29 relation for column the relation. Each such each is from the same domain. 3, The or order of the columns relation has no significance, 4, The order of the rows 5, There are no duplicate rows. C. the in not significant. is [Ref. 19] THE ENTERPRISE MODEL product The performing decompose requirements user of the referring to Figure 2.1. In attributes analysis called the design specification. is requirements analysis, the the problem into phase, group of a it helpful to modules. A is smaller major part of this analysis process focuses on the enterprise and of this anaylsis produces the result what is called the enterprise model. The enterprise model of the organization. and the dynamics in support of them. and should be to model the enterprise consistent be organization. the of enterprise model shows the major functions performed It serve to static abstraction level. for the database is designed high a flows of information The goal is is with it the Events that occur in the transactions "in the represented by . The model elements should that are represent part of the all functions enterprise. exists so that users can store and retrieve things in store every the real Consequently, world. minute a certain Naturally. detail amount 30 about of it an data The and data database information about is impractical to organization. aggregation and general construct required is "'zat^'on of the organization relationships the database designer Additionally, model. working a by data the represented should be to in the enterprise model. D. LOGICAL DATABASE DESIGN logical The requirements is centered The requirements and system the phase of the database. characteristics are design expressed are as user the phase inputs to this project the data around plan. flow diagrams, The policy statements, and the data dictionary. logical The database design including the specifies the logical records to maintained. be contents, and relationships among the records. product of this phase enterprise directly model. proportional enterprise model contents and called the logical the In aid detail is the consequently the relational model. The to level of names of fields and their logical format, design phase. Table II. general. to define required steps in the logical design development phase major in The of of the records, are listed 20] schema. The number of records are also determined during the The [Ref. their records are specified from analysis of database Logical the is format of the the the logical contents of the data dictionary are used and user views. The the development of the descriptions of 31 policy statements logical database processing and requirements the are used completeness of the logical design. TABLE 21] Database Design 1. Identify data to be stored 2. Consolidate and clarify data names 3. Develop the logical 4. Define processing 5. Review design schema PHYSICAL DATABASE DESIGN The on the II Stages of Logical E. [Ref. verify to the second phase of database design is highly DBMS being used. transformed particular into specification of this phase, the logical The the available constructs data the DBMS. In outputs physical from this phase dependent schema is with the are the schema and the definition of user views. relational The describing These the provides model structure and processing tasks are accomplished the model. the Data by the two vocabulary a of 32 database. major components of Definition Language (DDL), Manipulation Language (DML). the for and the Data The goal specification commercial The following entire process. requirements control will data that a using design the of can be analysis next implement produce an enterprise model step is step database and and a through begin to Postgraduate These products will the logical database design the a 22] of the risk assessment environment at the Naval elements. to produce to is chapters will three The used [Ref. DBMS. process and the this user computer School. This description of the then be used to perform followed by the physical database design. 33 . III. USER REQUIREMENTS ANALYSIS user requirements analysis phase, referring to Figure The involves four steps: 2.1, specification. problem recognition, evaluation, review. and first The recognition, has already been covered step, problem evaluation, in problem step. Chapter I. The next involves analysis of the flow and structure of information to build user specifications. A. USER ENVIRONMENT OPNAVINST provides 5239. lA assessment methodologies. Methodology ADP environments. most used for risk on Two methodologies are recommended. the more complex method is I detailed guidance is It and the standard for this methodology that will user requirements analysis and to produce an be initial database system design for NPS. Risk five assessment steps as Identification the initial all NPS ADPE shown and methodology in can be Figure 3.1. The first Valuation. First. step. a step is into Asset There are two basic parts to complete, up-to-date listing of assets is required. impact value for each applicable impact Second. each asset must be determined for broken down I the area A complete essential if and accurate the risk listing of computer assets assessment 34 is to be is valid. STEP 1 Asset Identification and Valuation Threat and Vulnerability STEP2 Evaluation STEPS Computation of the Annual Loss Expectancy STEP4 Evaluation and Selection of Additional Counter measures STEP5 Proceed with Accreditation Process Figure 3.1 Major Steps of Method One Risk Assessment 35 Additionally. authorized inventory listing the If to be maintained if is is important for of any asset the goal assigning impact identified. The each of the four The four several more is must This is the goal be of a This is also control mechanism. identification two of the asset Part it listing Any assessment asset identification listing. risk accessable by easy to access, then be reliable. to easily be and maintained. used it must Ease of access is users. reasons. likely the value ratings once process assets involves have been procedure is to determine dollar amounts for impact ways in areas which threats can are impact an modification, asset. destruction, disclosure and denial of service. Modification refers the value of software or to asset values based on the cost to correct the consequences of the modification and/or the cost of locating and recovering from the modification itself. total The value of the assets should be based on the cost to detect. and the locate. correct modification. [Ref. 23] 1. data including Destruction refers the the value, to well as to reconstruct or replace the asset. service the denial as. from of costs incurred the destruction of the asset, caused by 2. cost Disclosure 3. refers to the impact of disclosure of classifieddata. Denial service the value of of refers to costs incurred from all denial of service, except for that caused by destruction. [Ref. 24] 4. To impact simplify nd the frequency. process. estimates are provided Dollar values and associated 36 for ratings scaled by are a values is shown The factor of ten. Table in sample range of impact III. TABLE III Impact Value Ratings Rating Impact Value $1 $10 $100 .000 $10,000 $100,000 $1,000,000 $10,000,000 $100,000,000 Guidelines for Impact of Disclosure of Sensitive Data For Official Use Only Privacy Act or Confidential Secret Top Secret assets and Worksheet. NPS is An impact information on example is shown presently in ADPE risk assessment. in situ data that a $1 .000 ,000 procedure requires the risk assessment team to list This ADP $1,000 $10,000 $100,000 flows. relational the in Asset an Figure 3.2. conducting its process of There are no established Because of this. database design be this required risk assessment procedure. 37 Valuation first procedures or this thesis proposes used to facilitate Additionally, once ASSET VALUATION WORKSHEET 1. ASSET NAME System 2. A Operating System and Support Programs ASSET DESCRIPTION AND JUSTIFICATION OF SUPPORT PROGRAMS Operating system and compiler support software for the System A' timesharing system. Impact of modification was determined to be negligible, except in those cases where modification would result in denial of senrice. Those figures were included under denial of service. Destruction was based on total destruction of all software and on-site backup tapes. These figures include denial of service caused by destruction. Forty hours is required for delivery and check out of replacement 0/S software. 73 users denied service at $12/hour: plus 6 system programmers at (14/hour for 16 hours; plus 3 data processing technicians at $S/hour for 36 hours. Total for the operating system - $36,936. Sixty users denied use of the compiler at $12/hour for 24 hours: plus programmer at $ 14/hour for 8 hours. Total for the compiler support software- $1.S32. 1 system Reconstruction of compiler support data based on 61S hours to re-enter data at $8/hour. Total for compiler support data - $4,944. Disclosure - N/A. Denial of service was based on the number of users denied service for an average service outage. Operating system: 35 users at $12/hour for I hour - Compiler support software: 35 users at $I2/hour for Compiler support data 3. - $420. .5 hours - $210. N/A. SUCCESSFUL ATTACK FREQUENCY RATING BY IMPACT AREA. modification N/A N/A 5 Figure 32 DENIAL OF SERVICE DISCLOSURE DESTRUCTION 3 Asset Valuation Worksheet 38 developed, relational the database can also used be to control computer assets at NPS. number of computer The resources computer handled is has been growing NPS accounting Current over the past couple of years. rapidly for assets at different several by departments. The different curricular departments data. form of copies of equipment receipts. in assets the their custody. in maintain to [Ref. 25]. maintains A of all on most is required hardware assets The Computer Council inventory an maintain third point of control, the supply department, purchase account data on most purchased ADPE through the Navy. Clearly. source there ts available to resources. The not one reliable and easily accessible provide answers to questions about ADPE following is a list of questions that department chairmen or the NPS Security Manager would like to be able to answer: 1, How much has NPS spent on computer equipment? 2. Who has custody of computer assets? 3. Where are computer assets located? 4. How much money has been spent on hardware? on software? 5. How many AST boards are there? 6. How were the computer assets paid 7. How many modems does NPS have? 8. Is NPS computer providing equipment? enough 39 Where are they? for? security for its ? What are equ pemen t 9. security the risks computer our to i 10. priorities What are our top security vulnerability? 11. Where should concentrate NPS strengthen security? This B. effort its discussed. inventory up-to-date objective of closely the asked the user must be able to keep computer assets. NPS of all proposed database facilitate risk assessment. However. system related to the risk assessment objective asset accountability for the purpose the sense of user requirements Therefore. add res sed dual a requirements for step one. of the risk 3.1 defined also for in phase. together. Chapter that of control, of purpose system In Data will and the IV and V The remaining I. all the five steps have four in already steps should requirments user is I. closely linked step two. Threat and Vulnerability Evaluation, each asset is analysed to in of methodology assessment procedure during addressed be analys'is is utilization. effective and to . The Figure efficient is The application, another computer been to sampling of questions that could be a previously primary in asset to USER REQUIREMENTS As an just is relating in terms of every threat H is probability of occurance of each threat. provide lists examples of generally of threat recognized 40 frequency subject Tables ratings and threats and their impacts. s involves procedure The the cause identifying the threat that could Worksheet impact indicated on the Asset Valuation for each asset. TABLE IV Successful Attack Frequency Rating Rating Frequency Once i n 300 year Once in30 years Once i n 3 year s Once every 4 months or 3 times Once a week or 52 times a year Once a day or 365 times a year 1 2 3 a year 4 5 6 Onceevery2hours OnceeverylSminutes loss expectancy values ratings and four figure annual impact areas. for each activity. VI Samples four, coun termeas ure s , ratings frequency This step provides shows of the ALE evaluation and annual of the impact dollar value loss expectancy value risk assessment matrix are enclosed Step The computation for each of ALE loss for the expectancy computation worksheet in and Appendix A. selection of additional considers the evaluated countermeas ure 41 are quantitative a impact area and also the total Table computation. (ALE). successful attack the used to produce the the involves three, of Figure 3.1. Step annual 7 8 s and • « u ^4 > u « (/) (m o "3 o z a >• > > > >• >• o a Z > 8 >• 8 >• a a a > > > 8 >• a « >• ^ a o 3 e s >• 49 u >• >s M >• >s >o Ze a >• e 3 o e e e e Z Z Z Z Z Z e e >• -< 4^ CO u a a a a o s 2 3 w. « « Q i« •3 > U3 ^ m o CO ^ 73 >> z > >8 > >8 4) 8 >• >8 a >• e o e e 8 >3 >8 Z Z Z Z Z Z 8 >• a o o 3 U 4J 00 >4 C8 o Z >• > 8 >• 8 >• a o >« >e z 8 >> a e >• e e Z Z >• 8 >• ^ i. £ H u e u c a i « Ml e a & tJ x: n « 1 a e o u e « U O Im u o e « e o i i S s S 5 e o u u o u u o u e « u c a o 'S '« § •tf o e at 1 at u e u e e O e 'S o u a e o « e o a e a a e o u 9 a u a c e o e o _c e 42 a e a u 1 "o a e ^a C 3 a a o 8 u e o w C o a c o u "> e a. o u o a 'a •^« o a 3 !i e u o X o u 3 'S a o u ••• e O e e o u 3 a u u < < D 5 5 s ' 8 u u 3 o a e w u o 3 e u o u «> 3 a c 7 3 u 3 H u z ^ e u O "S ]^ u u "a e U o e 3 u o >• e u Cu a o e tii coun termeasur es which selects implement to determined based priority. Priority investment. Coun termeasur es that yield investment are coun termeasur e is is implemented first. implemented, it will the and what in return on on highest return on each As additional affect the overall ADP security posture and ALE. procedure This highest potential involves taking the identifing for damage, threats with the countermeas ure a that could significantly reduce the vulnerability which these exploit, threats preparing then and additional an coun termeasure evaluation worksheet. items include return on Data original involves the accreditation five implementation issue of countermeasures. all authority (DAA) approving will grant the interim authority to operate, cease. cost, annual saving, and countermeasures. ALE Step investment, Appendix See B for more process. the Pending designated accreditation or order operations information about and to the accreditation process. A in C. detailed procedures can be found OPNAVINST 5239. lA. THE SYSTEMS FUNCTION HIERARCHY CHART The third specification. be discussion of these used to step of the user requirements analysis phase There are several methods available that can specify the structure and flow of information 43 is in pntprprise. the thesis covered be systems function hierarchy the are mpthods that will Two chart this in and the BACHMAN diagram. TABLE VI Loss Expectancy Computation Annual i = Impact Value Rating f = Successful For Impact Attack Frequency Rating I . = For Frequency LOSS The of the = IMPACT defining F (1) Oi = X lOf/3000 FREQUENCY OF OCCURENCE (f) systems functions hierarchy chart is information organization. associativity. and structure methods is of representation elements the information structure can have data design a hierarchy of data in for degree of access. information. significant impact requirements and therefore must a readable. risk assessment database. At 44 the represent unambiguous manner. shows the system functions hierarchy chart top level is of blueprint processing alternatives for Th^'s 3.3 a relationship among individual log'ical This data. 1 for a a on the Figure computer single block 0) <4-l O a 03 ^ 1 o ;;' 00 "C >- (f1 u "Si ID o u ^ rt <D O u c a 0) •-• Ill •13 Ih a ^-^ 1 o ID T7 B CO O ir in 1—1 C a. 0.1 iS* T7 •^H 13 w 45 1 (XJO T7 (d o CO o5 o ^ 3 DO ••r4 ^ M 1) i-« 1 o "U a *-• 111 ID v« a price equipment list ment list equip- list >!.« supplier c: .5?o o • •^^ C (0 « o 5 ^ V 3 o T3 4-> o O Z3 equip owner link identify owner P to a B determine equip location ment list equip- <1> ment inventory CO CO equip- list ment equip- list 46 owner rpprpsents that blocks contain hierarchy. the ent"'rp represent that information that may be viewed as up tree. the individual data entities. D. THE ENTERPRISE provides procedure data analysis process. primitives will be ^ • relationships design starting point a world. is it These Table VII. De f i i Da n g t_a^ in The in the next world enterprise modeling data of enterprise. database iteration Throughout to is identify terms of developing in This is design will logical the in primitives are an with structures or a elements of the representation of the the iterative process as is much of the process. merely provide the design begin world. real step to define world primitives identification and understanding of fundamental primitives the design and the necessary real real of I.l£E!£Illl foundations The These phase. in n shows enterprise. the in associated with conceptual primitives database defined identification in To begin, the real in further diagram the of 26] results model data data items and the This categories subset of blocks level. levels MODEL enterprise The [Ref. various a lowest the At Succeeding The a results this starting point to work from. process and even after the 47 of system is impl emented problems . likely be identified which will will necessitiate redefining the data elements of the enterprise. TABLE VII Primitives in the Primitive Real World Definition Object Phenomena that can be represented by nouns. Object Class A group of objects formed by general ization. Properties Characteristics of objects. Property Value Set The collection of values that property may have a given . Fact The intersection of a given object with a given property value set. Association A Table objects connection of objects of the same or different classes. VIII and presents the enterprise object descriptions. A list object of classes, examples of computer assets is provided by OPNAVINST 5239. lA. 2. BACH MAN DJ_a£ram The used to circles BACHMAN diagram is one technique that can specify the data relationships of an enterprise. or bubbles represent objects or 48 entities and be The the TABLE VIII Table of Object Descriptions OBJECT CLASS HARDWARE DESCRIPTION OBJECT CPU processing unit, including housing and chassis. Look at other object descriptions to see what other object descriptions are available. Note: If CPU is not detachable from other elements of the computer system, then unit will be logged under the CPU object type. MAIN MEMORY Only external main memory Primarily associated units. with main frame computers. I/O The central External units primarily associated with large computer systems CHANNEL . OPERATORS CONSOLE Primarily associated with large computer systems. KEYBOARD Detachable type keyboards. TERMINAL Includes local types and remote . Detachable from other system el ements. MONITOR 49 . TABLE VIII MULTIFUNCTION BOARD (cont'd) Spec'fi'cally related to microcomputers. Defines the owe St level of asset identification for control of microcomputer hardware. These boards contain various numbers of memory chips, I/O port s and speaker 1 , hard war e DRUM Secondary storage. DISK DRIVE Includes hard disk and floppy disk drives, internal and external . DISK PACK Portable; separate from drive DISKETTE Floppy disks. TAPE DRIVE For micros to main frames, reel-to-reel and cassette. MAGNETIC TAPE Ree TAPE CASSETTE Cassettes only. CARD PUNCH Card punch machine. CARD READER Card PUNCHED CARD Punched cards PAPER TAPE Punched paper tape PAPER TAPE READER Paper tape reading machine. NETWORK FRONTEND Frontend processors. DATABASE MACHINE Specialized database 1 - to-r ee only. reading mach"'ne. proce ssors 50 1 . . . . TABLE VIII . (cont'd) Identify controllers that from main processors INTELLIGENT CONTROLLER are detached . SOFTWARE PRINTER Provide hardcopy printout OPERATING SYSTEM Such as MS DOS. APPLICATION PROGRAM All SYSTEM UTILITIES Generally resident functional programs that are used to manipulate data and programs. Could be easily confused with application UNIX, CPM. specialized user programs . progr ams TEST PROGRAM Diagnostic program. COMMUNICATION Special ized appl i cat ion program. Could be confused with application program. COMMUNICATIONS COMM LINES COMM PROCESSOR Specialized, detached hard ware . MULTIPLEXOR Detached . SWITCHING DEVICES Detached . MODEM All categories; ma infr ame 51 micro to represent the relationship between arrows 3.4 and form of data the general shows only or shows a data the structure diagram. relationships among (entities) the objects connecting between the ojbects as one-to-one. many whether depending on end. double either Figure the computer control The diagram risk assessment project. diagram, in objects. a called -is The BACHMAN records. The BACHMAN diagram lines represent the relationship one-to-many. line has single arrowheads a on one or many-to- arrowheads end. or on double arrowheads on both ends. This and BACHMAN diagram models the global risk computer resource control 52 project. assessment Figure 3.4 Bachman Diagram of the Enterprise Model for Computer Risk Assessment at NPS 53 ^V. LOGICAL DATABASE DESIGN PROCEDURE A. objective The relational to is of phase in the database system development process (Figure 2.1), spec"'fy the logical format involves identifying contents of each records. The resulting design The design logical the logical the record. of records and the is the database. This maintained, the relationships between the to be called the logical design phase generally involves five schema. design tasks. 1. 2. first identification of the data to be task is stored in the database. This step is accomplished by processing the data from the dictionary and data screening information that will not be out incorporated into the database, i.e.. descriptions of reports, screens, and input documents. The Next, it is necessary to standardize the terms used name data. The failure to identify synonyms and to aliases performance of can severly degrade a in it result database. Worst of all, can misinformation. Mainta'ining integrity of the the advantage database is important it is one big and of database systems over traditional file systems, if proper! y designed. 3. third The define step is records and to The relationships. process of defining records and is intuitive [Ref. relationships largely 27]. items are defined by identifying the data Records during will contain. they Important considerations and flexible designing process include; this with the expandable records evolve that can structures, designing effective record enterprise, in record and avoiding implied the data us^'ng definition. 54 three are Relationships during step defined in goal is The to terms of how the users see them. in include all useful relationships the logical schema. That is. specify all enterprise relationships that are needed by the user in practice. fourth step in logical to database design is This requires define database processing. analysis is manipulated how to produce the database of This can be accomplished by using required results. a method called transform analysis. 4. The 5. The final The purpose of step is design review. review is to identify problems with the design. At this point a decision on whether to continue or not If the logical design is approved, has to be made. the problems are proceeds corrected and the project physical design phase. to the Now it is time to begin the logical design be developed will based on discussion used during the Model Data Model B. logical that will next section begins with The Semantic Data Model which of the design phase. be which information obtained from the user requirements analysis phase. brief phase used is The will a be specific Semantic Entity-Relationship the . SEMANTIC MODELING There several are analysis and structure of data. generally suited not design problems. available database models to However, for the these models are handle both logical The relational model and can be used physical for both phases of the design process, but it is not recommended. There are several drawbacks to the use of the model for logical database design. used in the initial It is too detailed stages of design, and 55 relational it lacks to be the semantic structure enterprises unambiguous choices to makp [Ref. 28], relational The This initial stages of database design. Semantic models into is to is used to and criteria. The semantic then defining. is naming. associations as listed C. applying relational mod"'fied model by classifying and Table abstractions similar uses object sets and IX. semantic models as there are known example is the EntityRelationship Model. abstractions. One ENTITY-RELATIONSHIP MODEL entity-relationship The semantic for X describe a must be described is based in on three main these three terms. description of these three things in the described by attributes. in model entities, relationships, and attributes. concepts: enterprise another The enterprise represent modeling Table adapt identify the essential to THE The 29]. of ways varieties the development. are as many different There well in of integrate the relational provide abstractions that naturally constructs for during users describe enterprises [Ref. the way that model are one way to systems the The goal semantic emphasizes model process is usually too complicated data. to modpling dependencies for defining the semantic nature functional model in enterprise terms. which in See Entities turn arc Entities can also interact with one any number of relationships. 56 [Ref. 30] TABLE IX Tabular Description of Enterprise OBJECT CLASS PROPERTIES HARDWARE TYPE NAME MANUFACTURER COST DATE ACQUIRED OWNER SOFTWARE TYPE NAME MANUFACTURER COST DATE ACQUIRED OWNER COMMUNICATIONS TYPE NAME MANUFACTURER COST DATE ACQUIRED OWNER NAME OWNER ADDRESS PHONE NUMBER CONFIGURATION NUMBER OWNER LOCATION SUPPLIER NAME ADDRESS PHONE NUMBER FUND TYPE NUMBER SPONSER 57 TABLE X Termi no ogy 1 distict objects within 1. Entities 2. Relationships 3. Attributes - Entities En • relationships and attributes. ^ describe the entities and relationships - Entities classes. t or ty-Re 1 a t Entities i organized into sets or are relationships These sets all i user enterprise interactions between objects meaningful - a onsM ^ and in a have the set have unique names. 2i££££ni Relationships represented are diagramatically with the entity-relationship diagram. are sets are joined boxes Entity represented by rectangular boxes and relationships represented by diamond-shaped boxes. are same to relationship The the entity boxes that participate in the relationship. Figure 4.1 complete shows the entity-relationship diagram for the conceptual risk assessment entity-relationship identification This and stage diagram . the system. control view of the database is shown view was constructed data for database in The asset and Figure 4.2. using the data element information relationships developed during the data analysis <]> Q <i> Q ay <b CO < (O pi: a en u a o of occurence I freqiwncy 5 o 59 CO 1 i-t r* '*- «-• ^^ -^ d 'P 5^ O 3 <~i Q CO (O <l> (O < CO C« ••-I Q a. to a o I o o 73 Quo 60 a s Oi to <1> cd <l> CO CO <b 0) CO < (O PS <1> o .a CO CO (O < a CO O I 33 Ul 61 <D a Tablp shows XI relationship entity identify attributes can for used be an Some attributes are also used to entity each occurence. identify to uniquely identified normally identified by more than one ^ same One more or occurence. an These Relationships must be Relationships way. are Tentative attribute. indicated by underlining. Log \ca • the in and of attributes are called key attributes. keys are entity each Attributes describe some aspect type. relationship. or uniquely attributes the 1_ S£ih e_m logical The schema composed of the records to be is maintained, their contents, and the relationships among those records specified. entities and entity-relationship the In relationships become records. The diagram, entity- relationship diagram shows the relationships between records, however, the records their contents have not yet and been identified. The process of logical entity each diagram a and record relationship separate record. in The structure involves the making entity-relationship attributes associated with each entity and relationship then become fields. As the progresses, requirements constraints are evaluated and data items will on be the identified. Constraints are limitations on the values that database can have. There are three common types 62 of design data constraints: TABLE XI Entity-Relationship Attribute List equipment equipment-tyPe manufacturer equipment-name COST DATE-ACQUIRED CUSTODY-OF OWNER^NUMBER CUSTODY-NUMBER OWNER owne renumber owner-nImF owner-address owner-phone PART-OF custody^number configurITiM-number CONFIGURATION OWNER-NUMBER CONFIGURATION-LOCATION CONFIGURATION-ADDRESS CONFIGURATION-PHONE 63 TABLE XI (cont'd) Enit-ity-Relationship Attribute List E-S EQUIPMENT-NUMBER EQUlPMENT-'PRTrF" SUPPLIER SUPPL^ER^N UMBER SUPPLIER-MTfr SUPPLIER-ADDRESS SUPPLIER-PHONE E-F EQUJ_PME NT-NUMBER FUND- NUMBER FUND fund- number fund-Type SPONSER 64 intpr-record constraints. field given data item can a values limit given record. schema D. fields between [Ref. different in records. a 31] specifications of the for record Table XII logical . PROBLEMS WITH SEMANTIC MODELING constructing When design the entity-relationship should arguably consider the constraints such naturalness of the model, which Semantic necessary This role stage models possess not do prevent anomalies and to is imposing restrict is it the used. criteria the redundancies. eliminate reserved for the relational model in next the . Another problem is the treatment of relationships entity-relationship model. easily in the The entity-relationship model can accomodate one-to-one or many-to-many Additionally. a the reason is the between Hovever, semantic process can the on model, correspondence semantic model to normal relations. the on constraints Interrecord have. constraints limit values between fields within Intrarecord See and Field constraints limit the values intra-record constraints. that constraints the entity-relationship model can be single entity-type as well However, most DBMS's relationships. are not as 65 as on three or more flexible. defined types. TABLE XII Record Specification for Logical Schema Description Field EQUIPMENT Record qu pment-number Equipment-type Manufacturer E Numeric. 6 decimal digits Alphanumeric. 40 characters Alphabetic. 30 characters Alphanumeric. 30 characters Alphanumeric. 10 characters Format: YYMMDD i Equi pmen t-n ame Cost Date-acqu ired CUSTODY-OF Record Equ pment-number wner-n umber Cu stod y-number Numeric. 6 decimal digits Format: 999:99:9999 Numeric. 8 decimal digits i OWNER Record Format: 999:99:9999 Alphabetic. 30 characters Alphanumeric. 40 characters Format: (999)999-9999 Owner-number Own er-name Owner-address Own er- phone PART-OF Record Numeric. Numeric. Custod y-number Configuration-number 66 10 5 decimal digits decimal digits f TABLE XII Record Sppc i icat i on (cont'd) for Logical Schema Description Field CONFIGURATION Record Numeric. 5 decimal digits Format: 999-99-9999 Alphanumeric. 30 characters Alphanumeric, 30 characters Format: (999)9 99-9999 Configuration-number Owner-number Configuration-location Configuration-address Location-phone E-S Record Numeric. 8 decimal digits Numeric. 6 decimal digits Alphanumeric. 10 characters Suppl ier-number Equi pmen t-number Price SUPPLIER Record Suppl Suppl Suppl Suppl Numeric. 8 decimal digits Alphanumeric. 30 characters Alphanumeric, 30 characters Format: (999)9 99-9999 ier-number ier-name ier-address ier-phone E-F Record Equi pment-number Fund-n umber Numeric. Numeric. 6 4 decimal digits decimal digits FUND Record Fund-number Fund-type Sponser Numeric. 4 decimal digits Alphabetic, 30 characters Alphanumeric. 30 characters 67 AddHionally. and although the process of defining enti'ties relationships appears to be quite designer must relationships. decide It is importance of modeled. Consequently. various how up to to clear. assign objects the "in the design designers Different models same enterprise and which the totally different results. [Ref. 68 database entities the designer to establish determ-inistic. of the 32] can organization process produce in turn and the being is not different produce PHYSICAL DAT^Mli ^i^IGN V- A. OBJECTIVE Before starting necessary to implement the take a database. that should be it Therefore, relational the be it is used to design the of easily converted to the is dependent on was determined at the database would be processed by the will The data design model this case, In process requirement One it implementation model. DBMS. design look at the system that specification is that the physical the outset, relational a database model will be DBMS. used to express the design of the database. There are two steps basic in the database physical design process. logical schema into the particular data constructs to be used by the produce particular statements [Ref. first step involves transforming DBMS selected. 33]. database that The implementation THE The first to step will second source write define the database structure to the DBMS step is to review the design and to modify it to achieve optimal B. The the detailed specifications of the database that will be during used The performance. RELATIONAL MODEL relational database model uses a represent both entities and relationships. 69 single construct to The construct is a two-d 'mens i onal table called relation which a defined as an unordered set of ordered n-tuples. is set of a values which is like n within a carry identifying record. a formally is An n-tuple The values tuple have to be ordered because the values do attributes labels. each and columns The row is terminology can be found relational model correspond occurence. an not to summary A of Table XIII. in TABLE XIII Relational 1. Relation - a 2. Attributes - 3. Tuples - the rows of 4. Domain - the It is preventing attributes of all the columns of attributes contain cannot uniquely that are attributes is called in a reason the a can tuple. candidate key, 70 for rows. tuple. range Each and DBMS preventing collection that one identify needed, duplicate that no relational The so attribute can have any however, duplicate rows is will relation a relation constraint. this attributes the a table that has several set of values that an important to note, enforces Terminology two dimensional properties relation A Model The from of number one to collection of one of these must be process design reason One designs avoid to definition if data relational model important so that relationships are not represented by is Basic relational the data. with them individually. but are carried entire operations operate on In using relational a dealing DBMS, the user the system must decide how to For this reason, relational systems appear simple and specifies it. what is wanted, easy to use. relational It and also conceptually easier to is However, system. straight simple a implement which the relational model performance C. theory poor in . NORMALIZATION process The arbitrary certain design of that can collection anomalies and With normalization relational anomalies. simple and can result based, is a forward approach, without an understanding of the mathematical on the in collections of entities and relationships instead of do the have that links as they are in other models. explicit during properties. undesireable in Keys are used selected as the primary key. database design to purpose The be manipulated of is in operations converting invloves to a one produce powerful while an avoids that database a way with minimizing a data inconsistencies. some relations. undesireable changing data can have unexpected consequences. 71 These are known as mod 1 f""' are cat insertion and deletion anomalies. result information when entities with when Two common modification anomalies. "ion the attributes single insertion. about ACTIVITY relation STUDENT_ID. in different two one Figure 5.1. ACTIVITY, and contains information about what r^tivity ard FEE. a It The ACTIVITY STUDENT_ID ACTIVITY 200-22-1234 TENNIS 50 111-23-2345 SKIING 100 752-41-4982 GOLF 543-65-3856 Figure 5.1 SWIMMING Relation ACTIVITY 72 deletion. has the relation student engages in how much it costs. RELATION: anomalies Deletion anomalies result are lost about two entities with facts Consider a gained is Insertion anomalies FEE 75 60 The fee dependent on the activity and is engaging students all that activity. in 200-22-1234 student. for the loose the fact that student 200-22-1234 is first in same the Figure 5.1. we tennis a player. However, we would also loose the fact that tennis costs This is add in we could costs $55, activity. that These anomaly. This anomalies two interdependent. better Relations Usually, insertion an process a down reliability, ensure modification the can anomalies less independent be in terdependency form of the relations that resulted The problem was addressed There forms. hierarchical anomalies in are by in , or the all errors. the concept of relational different seven relations, to normal Domain regardless of their type. forms. 73 Table XIV normal forms, in Form (INF), Key/Normal which relations are free from all different normal attention data order ranging from the First Normal includes (DK/NF), seven of problem of modification anomalies focused the which student enrolls a . The on to Anomalies can be eliminated by changing design. database wanted racketball. prevented by To efficiency, and must be eliminated. the example be we $50. single relation is broken a separate relations. integrity, data until so an can If example. for not do is decomposition where called into deletion anomaly. a activity to the relation, an which example of an for we deleted In tuple the is Form modification shows the The second, third and Boyce-Codd normal first, address anomalies dependencies. caused functional A between attributes. dependent value by on of Y." the [Ref. form. determinant, and dependent is Y Determinants 33] --> X dependency is "Attribute attribute may Y. X inappropriate by if the said is Y value of functional relationship a functionally to be X determines can the Functional dependencies are denoted where attribute X called is the called the dependent variable. or may not Functionally unique. be Functional attributes need not be unique either. dependencies forms all involve groups of attributes, more attributes can determine several TABLE XIV Summary of Normal and one attributes. [Ref. 35] Forms Defining Characteristic Form INF Any relation 2NF All no-key attributes of the keys 3NF There are no transitive dependencies BCNF Every determinant is 4NF Every multivalued dependency is functional dependency 5NF Join dependencies are satisfied DK/NF All are dependent on all a candidate key a constraints on relations are logical consequences of domains and keys 74 or key A relation comprises one or a functionally determine or identify that unique. duplicated, [Ref. this and allowed not is relation to be a attributes relation must be dependent third in is second normal in all on in every determinant is still anomalies relation. and all definition. by relation a form result it is nonkey all second Finally, relation a third normal in form candidate key. a Boyce-Codd normal in form, anomalies Additionally, dependency. joining two from forms respectively. modification anomalies. A the relation on A normal projections on These two anomalies are eliminated by the fifth normal constraint if arise from multivalued can form, form if it is in normal Boyce-Codd normal Even with can be key attributes. the form and has no transitive dependencies. and must it a 36] For is Because tuple. a then the entire tuple would were not unique, If it attributes more determines the entire tuple, functionally key be of is relation is a logical fourth eliminates DK/NF The a DK/NF if every in consequence of the definition of keys and domains. There an are three criteria effective relational that should database used design. elimination of modification anomalies. and be They to produce are the relation independence ease of use. The anomalies, first will criteria, be elimination achieved 75 of if the relation modification is put into DK/NF. Thp cn'teria second is design to relation independence to support error free operation of the system. that The criteria easy to use. is relations users third these other. each involves trying to structure the This seem because of the criteria design three natural conflict to make and requirements. questions of priority. [Ref. best possible the There are no with designer the responsibility of the is It priorities assess to compromise rules the for 37] THE RELATIONAL SCHEMA translate To the relational design a . Often, D. create to they are familiar and that so is database model has to model a be into an described in itself to implementation. relational schema and This initial the language operational which form a model system, is lends called used to describe it the is called the schema language. One objective the access to elements. will data of the database system elements. irrespective of the To be f^^^e and is able to systematize to fetch record have to provide descriptions which allow structure, position and type of the data elements by attribute and value, or by attribute relationship. This of the is an important element of obtaining database requirements. 76 we determination of [Ref. data name 38] a description Defining the data elements necessary to generate the further. is that deal with the database. definitions Data results of the processing programs relationships are taken from and previous design phases. procedures Any new identified at this stage are also included that are the in the part of defining data elements is that the design. essential An data elements language must defined be specifications. terms in programming of process involves assigning The a elements. name and defining specific characteristics of data This specification is known as the data type. There quantitative both are characteristics Quantitative elements. data of qualitative and characteristics include name, type, domain and length. Names have been development process relations. The controlled given to programming language used. a variable-length short. characters. the first alphabetic. Names used global. a In a database, in records is depends and usually on the These rules generally allow for string of alphabetic and character in database entire data element rules and stra ight- forward by the define attributes to name during used being restricted numeric to be files and databases are generally the name of a data element is affected only by structural scope, defined as the database or relation the that contains 77 data element. [Ref. 39] example. For identifier, specification data element name. to be associated it associated equipment with processing by implying the the in specified a category Most computer languages provide 40] of transformation of data and provides specifications for encoding of the data [Ref. each specification limits the values with the data-element names to operations to be used legal element, data usually is The type simplifies domain, the for E:NUM. is type A name the number of small a values, general choices, such as, CHARACTER, DECIMAL, BINARY INTEGER, BINARY FIXED POINT NUMBER. and REFERENCE just to name a few. The data element E:NUM is specified as being NUMERIC. defines Domain element. of can be valuable by keeping the database. attribute domain EQUIP_IDENTIFIERS nine character. when it is Length Another is: is a for data a improper elements out there is the data element E:NUM represents a This number represents the space for is Each numeric a plant account number available. can be specified as either fixed or variable. way to specify the length of the data element E:NUM a corresponding domain definition. which is defined as NUMERIC 999999. example this in values for For each data element then, for which there domain The It the range of allowed NUMERIC (6). length of the data element. where the number 6 specifies E:NUM the The completp data element definition for the data element E:NUM is illustrated NAME E:NUM TYPE NUMERIC DOMAIN EQUIPMENT_IDENTIFIERS LENGTH (6) Figure 5.2 Qualitative provide title. Figure 5.2. in Data Definition of E:NUM characteristics of data elements are used to information. semantic additional unit specification, essential These include data, undefined values, transformations, access privilege, and file management. A title is sometimes used description of the data element. to to provide a more Unit specification detailed is used ensure standardization when units of measure are involved. Essential data refers to whether the data element is required or is optional in a information about undefined. Programs record. whether that data Undefined can be values missing provide or operate on the database must able to recognize this fact. 79 left be Transformat-ions privilege contained be there is need a to database. the defines which users are allowed access which data elements. may if data between the outside world and transform Access important are file management Finally, in the matters such as control information File management schema. transposition, indexing, to concerns control of integrity, archiving, and erasure cycles. The relation definitions of the risk analysis project are shown in are listed E. Attribute domains and domain definitions Table XV. in Tables XVI and XVII. DATA MANIPULATION relational In collections databases. records (tuples), and of entire relations. apply to there are relations three At operations viewed as relational operations the most that are need elementary to be level, discussed: projection, selection, and join. [Ref. 41] The first relational operation, projection, new relation that contains only the columns the original request. It relation that are specified is produces (attributes) in the a from projection important to note that this operation will eliminate any duplicate tuples that may naturally occur. The (tuples) selection operation from the original condition or conditions. will produce only relation that satisfy The 80 the a rows certain results of both projection and TABLE XV Relation Definitions 1. EQUIPMENT (Ej_NUM. E:TYPE. E:MFG. E:NAME. E:COST. E:DTFACQ) 2. E-0 3. OWNER (O^NUM. 0:LNAME. OiFNAME. 0:STRET. OrCITY, OrSTATE, 0: ZIP, OiPHONE) 4. 0-C 5. 0:NUM. CO:LOC, CO:STRET. CONFIGURATION {COj_NUM, COrCITY. CO:STATE, CO:ZIP. CO:PHQNE) 6. E-S 7. SUPPLIER (S:NUM. S:NAME. S:STRET. S:CITY, S:STATE, IT7TP. S: PHONE) 8. E-F 9. FUND (E:NUM. Oj_NUM. C:NUM) (Cj_NUM. COj_NUM) (SjJUM. EjJiUM. (EjJUJM, PRICE) Fj_NUM) (F:NUM. F:TYPE. F:SPONSR) TABLE XVI Attribute Domains Doma Attribute i n 2. 3. 4. 5. 5. E:NUM E:TYPE E:MFG ErNAME E:COST E:DATACQ EQUIP IDENTIFIERS EQUIP~TYPES MFG_NAMES EQUIP_NAMES PRICES DATES 7. 8. 0:NUM C:NUM OWNER_IDENTIFIERS CUSTODY_IDENTIFIERS 9. 10. 11. 12. 13. 14. 15. 0:LNAME 0:FNAME 0:STRET 0:CITY 0:STATE 0:ZIP 0:PH0NE L_NAMES NAMES STREET_ADDRESSES CITY NAMES STATr NAMES 16. CO:NUM C0NFIG_IDENTIFIERS 17 LOCATION_NAMES STREET_A0DRESSES 21 22 CO LOC CO STRET CO CITY CO STATE CO ZIP CO PHONE 23 24 S:NUM PRICE SUPPLIER IDENTIFIERS PRICES 1. 18 19 20 28 29 30 32 33 ZIP_CIIDES PHONE_NUMBERS CITY NAMES STATr_NAMES ZIP_CODES PHONE NUMBERS SUPPLIER_NAMES STREET_ADDRESSES CITY_NAMES STATE_NAMES ZIP_CODES PHONE_NUMBERS NAME STRET CITY STATE ZIP PHONE 25 26 27 31 F . F:NUM FUND_IDENTIFIERS FrTYPE F:SPONSR FUND_TYPES SPONSER NAMES 82 e TABLE XVII Domain Definitions Format and Meaning Domain Name 1. CITY_NAMES CHAR 2. CONFIG_IDENTIFIERS numeric 99999; uniquely identifies each configuration 3. CUSTODY_IDENTIFIERS numeric 9999999999; identify specific ownership of each piece equi pment 4. DATES numeric YYMMDD 5. EQUIP__IDENTIFIERS numeric 999999; uniquely identifies each piece of equi pment 6. EQUIP_NAMES CHAR (30); standard commercial nomenc 1 at ur 7. EQUIP_TYPES CHAR (40); must fit one of the object categories listed is Table VII 8. F_NAMES CHAR 9. FUND_IDENTIFIERS numeric 9999; uniquely identifies each fund 10. FUND_TYPES CHAR (30); identifies fund as being research. OPN, G&MN 11. LOCATION NAMES CHAR (30); 12. L_NAMES CHAR (20); last names of people 13. MFG NAMES CHAR (30); names of manufacturers (25) (10); first names of people identifies location of configuration beyond street address - building name and room, home s BLE XVII (cont'd) Domain Definitions Domain Name Fo rma t and Meaning 14. OWNER_IDENTIFIERS 999:99:9999; social security numbers are used to uniquely identify individual owners 15. PHONE_NUMBERS (999)999-9999 16. PRICES numeric 999999999.99 17. STATE_NAMES CHAR (2); two character state abreviations 18. STREET_ADDRESSES CHAR (30) 19. SUPPLIER_IDENTIFIER numeric 99999999; uniquely identifies equipment suppliers 20. SUPPLIER_NAMES CHAR (30); suppl ier 21. ZIP CODES numeric 99999; zip code 84 names of equipment five digit postal selection also relations and therefore can be are produce any desired subset of an original operation relational join The from two relations into one. contains for matching values manipulation at hide the actual process To specified common attribute of each. a enable higher a relations with expressing what you want to do. strategies for have relational graphic. Since relational clear. a relational algebra, data the examples just non-procedural data easy-to-use languages that use terms of what is known. of which a outputs. be emphasized. are relations is of transform to These languages provide desired in stands for Structured Query Language. Manipulation Database tr an sf orm- or ien ted 85 class a 42] relational -is and transform-oriented for expressing what [Ref. for relational transform-oriented, use is different four manipulation: languages structures (DHL) data it language There are this language will into desired example unambiguous many DBMS products language, computer, a calculus, Transform-oriented Language than handle to structure of the database from the user. to An users level necessary input looking DBMS's generally use English-like syntax and tend described. to in DBMS's, however, Most data new relation that a input relations are combined by from the two Tuples produces comb'^ne to columns from both of its input relations. the all It to relation. used is used is SQL. SQL The basic construct of . SQL is mapping, whose syntax takes the for a SELECT <attribute> FROM <relation> WHERE <condition clausp> The simplest condition clause appears as: <attribute> <value> binary operators include =. NEQ. The values a by such >_. mapping is a selecting each the condition clause. each selected <_, set >. of <. values. relation row The that The value of the attribute row becomes part output. the of 43] This chapter has presented some of the important aspects physical database design phase. of the that chosen are satisfies [Ref. from output The of <binary operator> relational all relational ease of use. for among The criteria users. to relations. or elimination minimization of interrelation An initial asset some and of some Some have are relational for good reduction are anomalies, created database designs are not equal. dependencies suited designs stressed the fact schemas suffer modification anomalies. unacceptable poorly It modification constraints, and relational database design has been identification and assessment at NPS 86 valuation for risk DATABASE MANAGEMENT SYSTEMS A. management system (DBMS) database Thp piece of software that is used to DBMS serves How the overall as system is request is a specialized a database. interfaces management system illustrated in Figure the Users and DBMS. If responsibility for 6.1. programs make requests to the valid. DBMS takes the able to do this directly and must not user. with performing the necessary database manipulations. is The interface between the data and the database application their the an implement is However, it invoke file the handling capabilites of the operating system to read or write data. This interaction with the system introduces additional overhead. DBMSs [Ref. appear to 44] currently In the operating systems available system as just another user program. There are two assists users in primary functions of First. DBMS. manipulating the database, and secondly, protects the database from the users. Assistance is such as data retieval or modification. Additional all. assistance without the need for any programs to be written Examples include query 87 processors it provided provided by program modules that perform functions on database it functions users by program modules that perform standard to is a and the at report user/application program database management system (DBMS) operating system (OS) database Figure 6.1 Relationsliip between 88 DBMS and OS generators. The standard of use enhances database system operations. of a must independent be Finally, natural different views of the database. database that are ability have the The and DBMS interface The structures. storage physical of any should DBMS the applications. interface for user data. provides amount reduces the It the reliability of increases greatly implement new applications work that must be done to also modules system construct to portions of That is, the irrelevant to an application can be hidden from it. and the structure of what remains can be adjusted to fit application's specific requirements [Ref. 45]. the second function of The implemented primarily through DBMS. it a the DBMS to evaluate each request and decide proceed. should decision The can include [Ref. or is on A both type of implemented through defining views also exclude This whether made be authorization criteria and on integrity criteria. access control is gate-keeping function for the user requests must be made through the DBMS. All allows database protection, DBMS, a particular portions database. the of to 46] The above fundamental capabilities of support the database are summarized Two database special designed, central and to functions in of DBMS languages to define databases. the database DBMS required to Table XVIII, software are to define defined access the a database. After DBMSs a database a use is structures are defined using the Data 89 De f "i n -i t"" classified three categories that coincide into levels of users. programs commands data as provide in a professional The for other programming language. language programmer, who developes (DML). interface for the third level of systems Most level few systems provide A access These commands are known query languages for the second user. is three with employs embedded database users. manipulation non programmer [Ref. Software to access databases Language (DDL). on user. a user. of natural the also the language casual user. 47] TABLE XVIII Fundamental provide Capabilities of DBMS interface of user data natural 1. Must 2. The 3. Different users should be able to access the same database, using different views of the database 4. Changes to the database can be made without affecting programs that make no use of the change a interface must be independent of any physical storage structures There their is a difference between data subtle implementation. implementations abstraction. are There a Data models are models abstractions and while software realization of the data model art^ variety of DBMSs. and a 90 each is implemented by different software structures. structures are components of listed is in called called Table XIX. a architectures. DBMS The provide for each of the DBMS must a These software software functions The combination of software components database architecture. TABLE XIX Primary Goals of DBMS structures 1. define the chosen database logical 2. define the chosen physical 3. define user views 4. access the defined database 5. define the storage structures to be used to store the data B. structure RELATIONAL DATABASE IMPLEMENTATION Most [Ref. commercial The 48], DBMSs support some are three main based on SQL. single data model relational model developed during the data analysis stage is implemented using There a a relational DBMS. types of relation DBMSs. others are based on QUEL. and There are a third category based on other data languages. major One DBMSs is problem with the implementation of relational the occurence of null 91 values. A null value means either the data value that inapplicable. relations identify these when predicates are joined. ar e unknown or that the It is are evaluated, therefore is problem areas potential value present problems when they values Null values for key columns. when is and necessary and to impose to a constraint where null values Are prohibited. C. DATABASE MANAGEMENT SYSTEM SELECTION important at this juncture to divide the is It of DBMS selection into two broad categories. growth of application software. created. special a selection DBMS for difficult assessment of cost. affecting nearly information kind model relevant been has involves systems large in high risk in terms of the DBMS of These use. organization's an and difficulty microcomputer the to to growth class of DBMSs aspect every processing. data of With the recent microcomputer and the associated the problem in determining issues same user. what are significant One difference between microcomputer systems and large systems the of size of the database magnitude difference use by is only associated larger large for few a can be several organizations. Therefore, people. all the multiple simultaneous access do not the general is orders Another computer systems are intended for that personal with Additionally, be managed to not problems arise. area of backup and recovery, which 92 critical is business large to given little are generally designed for the systems is attention in microcompter applications. for microcomputers, DBMSs nonprogr ammer differ They user. from DBMSs that supported by larger computer configurations by the power provided are database of to the file (although i.e., The sequences of such commands. provide to only capable of queries as The emphasis of these systems is interface enables that users to easily define and populate databases. 49] computer DBMSs are relatively easy to use. personal Most They systems solution is to give users simple interactive an non programmer [Ref. now require them to formulate complex and interface the each query must address new systems are many multiple file access). commands and selective Query languages in personal user. usually restricted, one languages access are are designed provide inexperienced users to with elementary subset of database access commands and then, experience, dBASE-II to is proceed an sophisticated to more example of a microcomputer an with operations. DBMS. contains three major components to allow database access: 1. a 2. a 3. a See query processor to support on-line ad hoc queries simple queries procedural language to store preprogrammed report generator Figure 6.2. [Ref. 50] 93 It report generator ^ (^ ^^-^ "^^•-..^^ database query files processor CCL ^.._ ^ w reports ^ ad hoc queries ^ / procedures ^ w preprogrammed queries Figure 6.2 Using the Personal Database 94 DBMSs for large computer systems. Unlike microcomputers are relational. supports query processor The dBASE-II dBASE-II SQL-like language. a most DBMSs for provides also enable preprogrammed queries procedural language specified. More experienced to a be to users can create files that hold such procedures and then execute them as required. Although contain provided DBMSs narrower a set facilites, of usually systems for personal they still are effective for limited applications. The common approach to selecting most analysis. list A characterize DBMSs. can in be seen evaluated ranking system analyzing all partial A Table XX. can be the also a expandable, features > s appropriate An The third step features in terms of involves what the step involves developing a rational, quantitative technique. meaning that additional criteria It can added easily by adding one or more levels of weighting and aggregation DBMS score. set feature. final that advantages of this method are its simplicity and the appearance of being be features each candidate DBMS Next, The feature score for each of the candidate systems. The is is applied. organization needs are. final general DBMS listing of example basis of each the on compiled of is a of between the detailed features and the overall Evaluation can be adjusted to find the we-ights. Disadvantages 95 of this method optimum are that TABLE XX Partial A. Database Managpment System Feature List VENDOR SUPPORT 1. 2. 3. 4. 5. B. EASE OF USE 1. 2. 3. C. TRAINING DOCUMENTATION TECHNICAL SUPPORT VENDOR CREDIBILITY USER EXPERIENCE irJITIAL IMPLEMENTATION DATABASE DESIGN CHANGE FACILITIES CONTINUING USE SYSTEM REQUIREMENTS HARDWARE SOFTWARE D. COMPLETENESS SECURITY FEATURES UTILITIES DATA STRUCTURES SUPPORTED QUERY FACILITIES REPORT WRITER FACILITIES BATCH/ONLINE CAPABILITY COMMUNICATIONS INTERFACE LANGUAGE INTERFACE DATA DICTIONARY CAPABILITY 10. USAGE STATISTICS 11. SUPPORT FOR DATA INDEPENDENCE 1. 2. 3. 4. 5. 6. 7. 8. 9. E. INTEGRITY 1. CHECKPOINT/RESTART 2. BACKUP/RECOVERY F. PERFORMANCE 1. CPU USAGE 2. CHANNEL USAGE 3. TUNING FLEXIBILITY 96 despite its subjective. appearance of Both weights and 97 objectivity. it is still scores are human estimates. EVALUATING THE DATABASE VII- A. DE S GN J_ DESIGN OBJECTIVES design Database criteria These must can sat"'sfy divided be a certain set of criteria. into major two classes: structure and performance criteria. pr eser vat "* preservation preservation critical avoid to and links storage Additionally. between object sets the is performance criteria, concern resource Performance access. should the high correspondence to transaction requirements that must be met, of the inconsistencies. prevent database database a concerns Specifically. anomalies. integrity of second class. The use to properties has of data relations normal properties. data of on criteria. structure class. first The be used. and the criteria a include minimum number of amount transfers between memory and storage devices must be minimized. Due first to class the of nature of this database criteria will criteria are important in be evaluated. microcomputer DBMSs. ability to control them is often limited. the other project. hand, are critical to 98 only the Performance however. the These criteria, on large database system design. B. INITIAL DESIGN The goal structure, all of initial design is to produce not be optimized but will that will one feasible design satisfy access requirements. design structure must ensure that records needed The Otherwise the on-line transactions can be accessed directly. database system will retrieve requested become bogged down data and the by DML operations to in system will less be efficient. Design design methods techniques use and variety of logical a apply them to realize depend that on physical designs that These techniques are applied satisfy the design criteria. sequences and the DBMS and on the in relative importance placed on the two classes of criteria. [Ref. 51] C. DESIGN ITERATIONS Once the initial attempts to improve it. to design is accepted, the designer Various design trade-offs are made reach an optimum design. After design problems are identified. the designer can select various design tactics to overcome them. set of design beyond the Ideally. tactics are provided for each problem. scope of this paper to go into concerning design iterations and design tactics. 99 more It a is detail EVALUATING DATABASE DESIGN D. Database evaluations development steps. performance made at a11 Stepwise evlauation. design. the optimum final ensure are estimates to the however. The sufficient database indicate design problems and data has been will completed, are the operation with transfer of valuable of a performance accomplished selecting new system. [Ref. finalized and the data improvement involves finding looking by shortest the when the access at executed. decision the specific path. data 52] has been data important One path selection is made. the most This model is and question The two program is written or when it The other major question is whether the access choices are: when the retrieval path of involve assurance of reliability and efficient route to the data required by each query. is the The remainder information. Once the database design concerns after and adaptation to changing requirements, and eventually procedures to loaded. this At collected so that the user of can receive usable termination and then implemented on the DBMS. implementation and the database cycle quality. then the benefits of database systems are obtained only after design the is not will Successive steps use design tactics are used to correct these problems. point the design system is made by the DBMS or by either the programmer. 100 user or One of ideally. the query until not should be the optimal make to processed. is take can but acually it convenience to users. as assertion that the system an decisions than microcomputer DBMS. this most database users fall method One performance an values relevant works back of a addition on known because the records much In 53] without design database the increase to extra indices. of Normally, values of the key data index can be used searching each same way as you would the book when looking for a use the specific to the key find the tuple. index created and maintained for nonkey be that are the basis for frequent retrieval Indices elements storage are not because space in automatically there are costs memory. The 101 It in data the Many topic. systems allow the designer to specify that additional should the user category. allows efficient retrievals where This are [Ref. into the casual be maintained index will elements. the interpreted should be especially true considering that improving of is is as better able to make these is user. the into moment. that at Placing responsibility on the DBMS could be viewed merely a and, Waiting until execution time approach. state of the database exact the is theory, this In access decision means that it the account model path decisions should be made by the DBMS access that basic precepts of the relational the indices elements requests. created involved. decision for They all take whether data up to create the additional relative indices depends on knowing something about frequency updates of retrievals. and retrievals are far more numerous than updates. should be maintain the index If updates occur about as often, or retrievals. then the extra work required to considered. more often than then an If index will probably not be profitable. illustrates the problems associated with optimizing design without knowing actual This database useage requirements. The bottom line is to make sure that the system supports the user design the way it should. If it iterations are performed until 7.1. 102 does it not. does. successive See Figure Database Access requirements specification Design criteria Figure 7.1 Design Iterations 103 S . VIII. R EC thesis proposes an This database system valuation first assessment at NPS. ME N D A T2 N initial design for a relational support asset identification that will the as M step computer conduct to and risk Much work remains to be done before this system can be used remaining tasks of DBMS selection and The would excellent be thesis student for implementation work. recommend that the available microcomputer DBMS evaluated and design. database including one be selected that POWERBASE. a implementing be this dBASE II NPS lOBASE. and microcomputer DBMS be used because they designed for Users also maintain control can systems DBMSs available at There are several RBASE 4000, recommend that for would I and are expertise. computer little with users I security of system the easily (a matter of locking up system and data jiskettes). The to DBMSs 10,000 retrievals. hour to determine data microcomputer DBMS Another is the delays Additional sort times). (10 work is 6.000 second required quatities to determine the suitability of g^'ven important determination administrator "acceptable" with records 1 handle files of about listed above can (DBA). a data volumes. that task who of The 104 must will database be act taken care as of database administrator is essential He operation effective for of the database system. responsible for protecting the database while is the at same time maximizing benefits to users. users of the system must also be identified. The clear who collection and not be required will entry, data to perform the task of who will or have is It data generate to reports for the purpose of controlling computer resources. possible, due to the nature of this database, that is It would also act as administrator. user(s) the high level able language interface, manage to documentation postdesign require and this even casual system. employing users would and skills a of changes to more the a be appropriate Naturally. training would have to be provided. optimization the and implementation, design and careful database proper With Also, system sophisticated would computer technician. Many of these recommendations hold system is implemented on is implemented on a personal larger computer a only if the computer. database the If system system the problems are much more complex. One a disadvantage personal of implementing computer is that access is the database somewhat Anyone needing access to the system will to and request go owner. computer restricted. have to know permission to access the system from This problem can be alleviated network system on and sharing this 105 where the somewhat by creating data between a multiple microcomputers. together possible link to microcomputers either with modems and telephone lines or by commercially however, is It available problems with Extensive operations. network technology. computer research networking is required using There database and in are, this area before an approach could be recommended. This and initial design covers only the asset identification valuation aspects of computer risk assessment procedures. The global risk assessment database svstem depicted 9.1. must also be designed and will provide help with the overall risk assessment The initial design has so process. Th^s decomposition simplifies the of the process. that incorporate the global risk to Figure implemented before the system been constructed be easily expanded in it assessment database design problem by enabling the designer to focus individualmodulesoneatatime. 106 can on . CONCLUSIONS IX. There growing computers pressure growth of throughout government due to the enormous sums of is to control the money that are spent on computer equipment every rapid government, and the Navy reliance increased perform computers to on has led to mission. its dependence on computers has made it necessary Organizational to particular, in The areas of operations infiltration of computers into all within year. assess vulnerability to threats continually related to computer resources. directives Numerous identify threats methodologies assessment effort the structured, the annual and requires however, a by A providing database a help to recommend and assessment. risk technology. process the resources procedure itself would be database employing enhance perform to promulgated been computer to procedure. and have risk The great well deal of served by would greatly standardized, maintainable vehicle with which to loss expectancy for comuputer resources of well compute a given organi zat ion A global provide such system data a database. funct^'on respectivly. structure One diagram has been devised to Figures 3.3 and 3.4 show the global hierarchy individual and data structure diagram user's view has been designed as 107 . beginning the system. step toward creating initial The design for asset valuation has been presented The relational interface because can be an model in database itegrated identification and this thesis. was chosen because database easily understood by tabular its users and most microcomputer DBMSs are built on the relational model work remains to be done Much need to must be the be this data model. identified and responsibility for assigned. model database. can be on and A data DBMS must be selected by students technology curricula. 108 time in consuming the database implementing must be collected and entered These are difficult. completed for the Users various into the tasks which computer APPENDIX A EXAMPLES OF VARIOUS FORMS USED IN THE RISK ASSESSMENT PROCESS example of OPNAV 5239/7, ASSET VALUATION WORKSHEET An ASSET VALUATION WORKSHEET 1. ASSET NAME 2. ASSET DESaiPTION AND JUSTinCATION OP IMPACT VALUE RATINGS ASSIGNED. 3. IMPAa VALUE BATING BY IMPACT AREA modification destruction disclosure 109 denial of SERVICE example of OPNAV 5239/8. THREAT AND VULNERABILITY EVALUATION WORKSHEET An THREAT AND VULNERABILITY EVALUATION WORKSHEET 1. 2. THREAT NAME DESCRIPTION. EXAMPLES. AND JUSTIFICATION BASED ON EXISTING COUNTERMEASURES AND VULNERABIUTES. 3. SUCCESSFUL ATTACK FREQUENCY RATING BY IMPACT AREA. MODinCAnON destruction 110 DISCLOSURE DENIAL OF SERVICE An example of OPNAV 5239/9, ALE COMPUTATION WORKSHEET ADDITIONAL COUNTERMEASURE EVALUATION WORKSHEET 1. COUNTERMEASURE NAME 3. DESCHIFnON 4. THREATS AFFECTED BY THIS COUNTERMEASURE 7. 2. 9. CURRENT RETURN ON INVESTMENT ANNUAL ALE 6. COST ALE SAVINGS PROJECTED S. TOTAL ALE SAVINGS 9. OVERLAPPING ADDITIONAL COUNTERMEASURES 111 An example of OPNAV 5239/10, ADDITIONAL COUNTERMEASURE EVALUATION WORKSHEET raw x^vwni sihi moj 1V3MHJ. IVnaiAIONi At irioi •1 u < a. a ^ s 2 « p o 112 example of OPNAV 5239/11. SUMMARY LISTING An ADDITIONAL COUNTERMEASURES ADDITIONAL COUNTERMEASURES SUMMARY LISTING 2. I. 4. ROI ALE SAVINGS ANNUAL B. A. ORIGINAL) ADJUSTED COST A. B. ORIGINAL ADJUSTED 113 3. MANDATORY COUNTERMEASURE REQUIREMENT An example of OPNAV 5239/12, RISK ASSESSMENT MATRIX RISK ASSESSMENT MATRIX ASSETS AND THEIK IMPACT VALUE TOTAL ALE BY THREAT INDIVIDUAL THREAT $ $ $ % r/ T>1 T / TVJ $ $ $ TVJ TV TV . 1 1 1 TOTAL ALE BY TOTAL ALE INDIVIDUAL ASSET TV (THREAT VALUE) L (LOW) 114 M (MEDIUM) H (HIOT) example of OPNAV 5239/13, SELECTION WORKSHEET An COUNTERMEASURES ADDITIONAL ADDmONALOlUNliJiMKAi^UkiilSfclLCTlUN WURKi>HLIir A. B. C D. ^- ADDITIONAL THREATS ORIGINAL REVISED ANNUAL SAVINGS ALE ALE COUNTERMEASURES PAIRED I. A. A. A. A. B. B. B. B. C C C C D. D. D. D. E. ANNUAL a ADDITIONAL COUNTERMEASURES RETURN COST OP ON ADDITIONAL COUNTERMEASURES INVESTMENT E. B. PRIORITIES E. ANNUAL SAVINGS SUBTOTAL 2. A. A. A. A. B. a B. a C c C c D. D. D. 0. E. ANNUAL SAVINGS SUBTOTAL 115 E. E. E. APPENDIX AN EXAMPLE OF THE B ACTIVITY ACCREDITATION SCHEDULE Activity accreditation schedule sample format I. NAME & ADDRESS OF ACTIVITY 2. COS NAHSn^LEPHONE • AUTOVON COMMERaAL 8. 7. 6. DAA(S) ACTIVITY AOP ELEMENTS DATA LEVEL I-II-III MODES APPUCATION OF NAME OPERATION 116 HARDWARE SOFTWARE FAaUTT (CPU)MFG OS NAME(S) Activity accreditation schedule sample format continued 3.UIC 4. ADPSO NAME/TELEPHONE • AUTOVON COMMESaAL 8. ACTIVITY ADP ELEMENTS 9. ESTIMATED SCHEDULE 0. H. P. COMM. NETWORK TEMPEST COMSEC DES •NODES/ NAME(S) required! REQUIRED REQUIRED TERMINALS YES NO YES NO YES NO 117 R.A. ST&E CONT PLAN 10. NAME ACCRED- OP ITATION ADPSSO : Activity Legend ex pi accrpditation schedule format anat ion 1. Name and address of activity 2. Commanding and Commercial 3. UIC 4. ADP Unit - sample Officer's name and telephone number, AUTOVON Identification Code Security Officer (ADPSO) name and telephone number, AUTOVON and Commercial Provide the following information (items 5 through 10) for each ADP element of the activity: 5. DAA - Officer, Designated Approving Authority COMNAVDAC. Director of Naval - Commanding Intelligence, or Chief Operations (OP-942) of Naval processed data 6. Level 7. Modes of operation of - (I, System II, and III) high, dedicated, controlled, multilevel 8. ADP element a. information: Application name (e,g.. payroll, logistics, finance, UADPS Stockpoints, OSIS, SHARE/7, NACMIS. etc.) b. Hardware (CPU) manufacturer (e.g.. IBM 3081. Univac Univac (Exec 1160, etc.) c. Software 1100) d. (operating system) (e.g.. ) Facility, building number/room number 118 s e. Commun icat 'ons number of termi na : Number of nodes (locations). and 1 f. Networks (e.g.. AUTODIN g. TEMPEST interface. TELNET. ARPANET) yes or no, as applicable; required: if yes, provide TEMPEST task number 9. 10. h. Is COMSEC required? i. Is DES required? (yes or no) (yps or no) Estimated schedule for completing accreditation: a. Risk assessment: b. ST&E: c. Contingency Plan development date d. Date estimated star plan development date; for submitting request i o n test date for Name of ADP systems security officer 119 t/ compl et accreditation (ADPSSO) dates LIST OF REFERENCES 1. Head. Management: R.. S^^stems lllX££in^ll£Il f,£l£'^£l The Brookings Institute. Issues and DirectTons. 4. p. T^^TT 2. National Bureau of Standards. ^iij.l£lill£ LlL £ £!n£Hl£I. li^Hlill ££I.H^i£iil2" ££l A££I.^ 11^ £!!££• P* ^^' Federal InTormation "ProcessTng StanB'arHs Publication 102. September 1983. 3. National Bureau of Standards. ££''l£^i^££ ^9.'^ Automat i c ££l£ £l.°£££ll££ ^i^ii A£^''Z£-£" P* ^' f^^'^^'^^T TnTormatTon Processing StandarH's PuFTication 65. August 1979. 4. Ibj_d. 5. Office Management and Budget. d_ ll£ t.£ill£ p. n_ A-71. 27 July 1978. of A u t_o m a_t e I £X££iti£ t^^o . S£ c £ j_ t_^ o jF Federa 12. 0MB Circular No. 1_ U: C. 6. Picha. Jill. Budget Analyst. NAVDAC. Washington D. Phone Conversation dated 2 April 1985 7. Management and Budget. D£t_a on A£££^"£lll£'^' i^c Automat Data El.£££££l££ 1^ ££^I.£H££^ ££ £££ £^ BuTTetin No. 7 9-'S'. TeTe£ommuj2 catj_on__s luIiElJanuary "5.T^7"5. Office of i 8. OPNAVINST. 9. in the Security Considerations Haase. W. W.. "Data Annual Computer Seventh Federal Government". 18. p. Security Conference. November 1980. 10. ££1^ e ]__i_ n_ e_ f £ r ALitomatj^c National Bureau of Standards. Pl.££P££l££ £ill£l££l l^£££lll ^£l ™^Ji ]l£££5.£I!l£"^ FeB"eraT InTormation Processing Stan3"ards "FublTca t ^ on TT. foreward June 1974. 5239. lA dated 3 August 1982. s_ D£ta_ • , 11. Management and Budget. Inf ormat on Systems A-71. 27 July l^T"?. Office of Automated i . p. Se££rit^ of_ Federal TT. UffF CTrcuTar TIo 12. Kroenke. Research David. ££l£££££ £££££l£l££ Associates. Inc.. 1977. 13. Ibid., 5. p. 120 , • P* ^ ' Science . .. 14. 15. Robert. 2^ta_ba_s£ C. 7. John Wiley anB" ^ons. Goldstp-in. Management . Hawryszki ewyc z T., I. Dlta_ba__se 5, Science Research Assoc TaTes, . p. b d p ^^^Jlll£l££l l^^F. p. Ana_J_j/s^21 1'5"^4. iHl iHl ££ll5.Il» 15. 1 6 I 17. Anything. Frank. "What. If Relational is a no. 11. p. 119. July Database?". 2 a t_a m a t j_o£ vol. 30. 1984. 18. Hawryszk ewyc z T.. I. D^l^bjas^e Analys^2_s and p. 36. Science Research Associates, T^M. 1 9 . i . . . Sweet. i b j_d i. . . p . . 2 0. 20. Kroenke. David. 2ii^^£ £££££HllL£ Research Associates. Inc.. 1977. 2 2^11 • • P • 181. 2 bid . . P . 2 1 2 2 . ££ll££- P* • 178. Science 0. 23. OPNAVINST. 24. lbj_d. 25. NAVPGSCGLINST. 5400. 2A dated 26. Pressman. Roger S.. Software Eng neer ng A££roach. p. 107. McGraw-HTJl l?8l. 5239. lA dated 3 August 1982. 1 April i 1982. -< : A Pract ioner ' s . 27. Kroenke. David. ^ll^^^li '^'^°££l.llll2* Research Associates. Inc.. 1 ^77 28. Hawryszk ewycz T.. I. D£i3ba_se Analys_2S_ a£d p. 94. Science Research Associates, T^FT. 2 9 . 2 b j_d 3 . _I i ^11 P» 182. . . . p . 10 0. • • P • 10 7. Science Des_j_£i2. Science 31. Kroenke. David. ££!£ ^ a_ e £l.££££li££ Research Associates, Inc., 1977. 32. Hawryszk ewyc z T.. D£taba_se A£a]_^s_J_s^ and I. p. 115. Science Research Associates. 1984. D££l££. 33. Kroenke. David. 2£^£^£££ ^'^°££££l££' Research Associates, Inc., 1'577. Science s_ i • P« 179. . 121 P* 188. . 34 35 2 b j_d . . p . 2 8 9. bid . . p . 3 5. • P • 3 5- , p . 310. I 36 I^il • 37 2 b 2d . 38 Wipdprhold. 39 Hill , b_i_d . _I Gio 2£l^^il£ ££ll£II • P* . p 3 . 40 Ibid., 41 Goldstein. 371. p. Robert P* ^^ ' . C.. 2il^^^l£ John Wiley and "?ons. Technol ogy David, Kroenke. Databa__S£ Pf"0£e_s^s_2n^. Research Associates. Inc.. 1977, 43 Hawryszkiewycz. T.. Data^a_se_ An_a_2^s_j__s I. Science Research AssocTates, 1984. p. 39, 44 Goldstein. p. • 45 2 b j_d . . p . 5 . 46 lbj_6 . . p . 5 . 47 Hawryszkiewycz. T.. Dat_a_ba_se A£alysj__s I. Science AssocTates, TltJ. Research p. 276. 48 2bj_d p. 233. 49 2bJ_d p. 326. p. 328. p. 441. Ibid 52 Wiederhold. Gio Robert . !l£££££in££l • Science a_ri_d_ Des_j_£n_. iHl ' 2ili^il£ Hill, 1977. Goldstein 252. Robert. C. £^li^H£ l££illl£l °.£1 John Wiley and Sons. 1985. P* ^^ ]l£II£££H£Ill 51 and 1 '5'S"5' 42 53 McGraw 71. lliIli££E!£Ill 50 ^68, 1977. P* . C. . 2£ll£II • ££l£^il£ ^0. John Wiley and Sons. 122 P* an_d_ D£1J.£I1' 589. McGraw- l£.£]lll£l££l 1985. ctnd . INITIAL DISTRIBUTION LIST No 1. Library, Code 0142 Naval Postgraduate School Monterey. California 93943 2. CDR. Urbanek Code 44 Naval Postgraduate . Copi PS 2 1 School Monterey, California 93943 3 Prof. N. Lyons Code 54LB Naval Postgraduate School Monterey. California 93943 4. LCDR. P.S. Fischbeck Code 55FB Naval Postgraduate School Monterey. California 93943 5. NavalPostgraduateSchool 1 1 1 Computer Technology Curricular Office Code 37 Monterey. California 93943 6. Defense Technical Information Center Cameron Station Alexandria. Virginia 22314 2 7. LCDR Fred W. Thompson, Jr. 3 North Parkway Elkton, MD 21921 2 123 / /> V-(^ / / Thesis 1}h32 c.l Thompson Initial design of a relational database system for NPS computer asset identification and valuation for Risk Assessment. 50 oer p/i 25 JUL 89 3 2 9 56 3 S ~ 7 Ix 21 \j> j^\j £~ Thesis Tll32 c.l Thompson Initial design of a relational database system for NPS computer asset identification and valuation for Risk Assessment.