research report on a specialised database topic-Database security and SQL injection

 

In this assignment, you are required to produce a research report on a specialised database topic.

 

A list of pre-approved topics is given below:

 

  1. Distributed databases

 

  1. NoSQL and big data

 

  1. GIS and spacial databases

 

  1. Data mining

 

  1. Data warehousing

 

  1. Database security and SQL injection

 

You are encouraged to discuss your choice and ideas with your lecturer via a support request. If you are interested in pursuing a topic not on this list, you may select an alternative topic but only with the approval of your lecturer. You need to get the approval in writing after discussing the topic with your lecturer and submit that together with your assignment.

 

All research reports should conform to the following basic requirements.

 

  • Include a cover page with your student details.

 

  • Include the following four headings:
    1. Description of technology
    2. Importance of technology
    3. Technology implementations and software
    4. Technology in industry
  • (You can replace “technology” with the name of your chosen technology.)

 

  • Images and appendices may optionally be included if they are not excessive.

 

  • Include a bibliography using Harvard referencing style.

 

  • Strict minimum of 1,000 words and strict maximum of 2,000 words, including the bibliography and any appendices. Note: There is a 5% penalty for missing the word count by 20% in either direction.

 

Please read the marking criteria on the next page for understanding the core requirements of this assessment task.

 

Help on Bibliography and Harvard Referencing Style

 

The following links will help you to produce your bibliography using the Harvard referencing style:

 

  1. Referencing at La Trobe

 

  1. Bibliographies with Word 2016 (also applies to Harvard style)

 

Submitting your Assignment

 

When you have completed your answers, submit the assessment on the LMS system. You should submit the following:

 

  • Submit your report in a document called docx (where xxx is your student number).

 

find the cost of your paper

What are the important considerations in choosing a Red Team (or attack team) for your software system? Give examples to justify your position.

Chapter 9 1. How does the source of your software code affect the overall security of the system? Justify your position for a general system. 2. What protections can you….

Computer Network

Computer Network Q: Consider sending over HTTP a Web page that consists of one video clip, and five images. Suppose that the video clip is transported as 25 frames, and….

The purpose of this assignment is to help you break down the final Individual Portfolio Project into smaller tasks and to obtain instructor feedback for each step.

The purpose of this assignment is to help you break down the final Individual Portfolio Project into smaller tasks and to obtain instructor feedback for each step. Please use the….