Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

Discussion Board one question

Description

Q1. Discuss three tier Client-Server DBMS architecture in relation with the functionality of each
layer. How does it improve the security of a database?
2. Respond to two other classmates’ postings by critically reviewing your classmate’s answer
and stating which points you agree or disagree with.
*An example of unacceptable replies: “I agree with you”, “good post I like it”, “I think your post
it good” or any similar are not acceptable replies.
Respond to two other classmates:
1. Maryam Almarzoog:
Three tier Client-Server DBMS architecture and their functionality of each layer:
Presentation tier:
The application’s user interface and communication layer, or presentation tier, is where users
interact with the program. Information presentation and data collection from the user are its
primary goals. This top layer can be used with a graphical user interface (GUI), a desktop
program, or a web browser.
Application tier:
Is the application’s key component. This layer uses business logic, or a particular set of business
rules, to handle data that was gathered in the presentation tier. This processing may involve
comparing the obtained data to other data from the data tier.
Data tier:
A database and a software for controlling read and write access to a database make up the data
tier. This layer, which can be hosted in the cloud or on-premises, is also known as the storage
tier.
It’s Security:
It is possible to apply several security tiers at different levels. Additionally, this reduces possible
attack surfaces by isolating the logic layer from the sensitive data layer. As an example, the logic
Confidential – ‫مقيد‬
layer may be used to cleanse incoming data and impose field-level validation on a form. Due to
the ability to do two checks on the data, security flaws like SQL injection are avoided.
2. SAHAR ALFARAJ:
The three-tier client-server architecture is a systematic framework in database management
systems (DBMS) that improves the functionality and security of the system by partitioning the
application into three separate layers: the display layer, the business logic layer, and the data
network. The presentation layer functions as the user interface, enabling users to engage with
the program by entering data and obtaining output, usually delivered through online forms or
graphical interfaces. The business logic layer serves as an intermediate component, handling
user requests, implementing business rules, and doing essential validations prior to any data
connection. This layer serves to encapsulate the fundamental functionality of the program,
therefore guaranteeing that actions such as computations and data manipulations strictly
conform to predetermined business logic. Ultimately, the data layer has the responsibility of
overseeing all interactions with the database, running queries, and managing the storage and
retrieval of data. The use of this architectural separation greatly enhances database security in
several aspects. Firstly, it facilitates a distinct separation of duties, thereby enabling
autonomous security policies for each layer. For example, confidential database activities might
be limited to the data layer, while user interactions are handled in the presentation layer.
Furthermore, it is possible to incorporate access control techniques at the business logic layer in
order to enforce authentication and permission prior to any request reaching the data layer.
This guarantees that only those with proper authority are able to access privileged information.
Furthermore, the fact that clients do not directly engage with the database server, but rather
through the business logic layer, serves to minimize vulnerability to possible attacks like SQL
injection. Further limiting risks connected with harmful data, the business logic layer also plays a
critical role in verifying user input before it is processed or saved in the database. In summary,
this three-tier design improves both scalability and maintainability, while also providing a strong
foundation for protecting sensitive data and implementing rigorous access controls across the
program.
REFERENCES
Fong, J., & Hui, R. (1999). Application of middleware in the three tier client/server database
design methodology. Journal of the Brazilian Computer Society, 6, 50-64.
Confidential – ‫مقيد‬
Pudichery, J. (2000). 3-Tier Client/Server System In Web-based E-Business Applications.
BUSINESS AND BEHAVIORAL SCIENCES TRACK SECTION OF COMPUTER INFORMATION SYSTEMS
AND MANAGEMENT INFORMATION SYSTEMS, 7(5), 84.
Answer 1:
Respond:
1.
2.
Confidential – ‫مقيد‬

Purchase answer to see full
attachment

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Mgt430-PERIODIC REPORT 2

Description Designation: Head of Recruitment and Government Relations Department Department: Human Resources Trainee Responsibilities 1. Responsibilities 2. Recruitment, onboarding 3. Employee relations 4. Employee engagement ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education Saudi Electronic University PERIODIC REPORT No: 2 Internship Student Report

Mgt430-PERIODIC REPORT2

Description Designation: Director Department: Logistics Services Trainee Responsibilities: Provide administrative support. 2. Support in vehicle inspections and report issues. 3. Assist in preparing daily transportation schedules. 4. Assist in coordinating vehicle delivery requests from different departments. ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of

Acct430-PERIODIC REPORT2

Description Major:Accounting Department: Finance Trainee Responsibilities: 1. Revier employee Vacation and final exit. 2. Review of employee salaries. 3. Assistance in preparing periodic reports. 4. Recording accounting transactions. ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education Saudi Electronic University PERIODIC REPORT No: 2

MGT321 Intro to International Business

Description Students are advised to make their work clear and well-presented. Poor presentation may result in reduced marks. This includes filling in your information on the cover page. Students must mention the question number clearly in their answers. Late submissions will NOT be accepted. Avoid plagiarism. Your work should be

Management Question

Description CAREFULLY THE ASSIGNMENT MUST BE SUBMITTED ON BLACKBOARD (WORD FORMAT ONLY) VIA ALLOCATED FOLDER. ASSIGNMENTS SUBMITTED THROUGH EMAIL WILL NOT BE ACCEPTED. SUBMISSIONS WITHOUT THIS COVER PAGEWILL NOT BE ACCEPTED STUDENTS ARE ADVISED TO MAKE THEIR WORK CLEAR AND WELL PRESENTED; MARKS MAY BE REDUCED FOR POOR PRESENTATION. THIS

MGT – 325 (Management of Technology)

Description Below are the conditions for completing the assignment. Additionally, there are further requirements inside the file that must be followed: -Make sure to avoid plagiarism as much as possible . -Use font Times New Roman , 12 font sizes. -Use 1.5 line spacing with adjust to all paragraphs (

212 ass 12

Description see ASSIGNMENT COVER SHEET Course name: Concepts of Health Education & Health Promotion Course number: PHC 212 CRN: Paper Assignment Assignment title or task: (You can write a question) Choose a health issue in KSA and explore the determinants causing that issue and justify your understanding with evidence from

discussion ecn500

Description Discuss one of the following topics. on Global Trade 1. Balancing National Interests with Global Trade Rules Discuss how governments design industrial policies that address domestic economic goals (e.g., supply chain resilience or climate change) while adhering to WTO rules. Discuss examples where such balance has been achieved or

RES500 Discussion

Description Amazon’s Kindle (its electronic book, magazine, and newspaper reader) has been far more successful than its SONY competitor. However, the original Kindle had some physical problems—button placement and page-turn speed among them. Correcting these problems resulted in the Kindle2, released in 2009 to glowing reviews. What observation research might

Buiness Presentation

Description Presentation instructions 1- Students select a topic to present in class using PowerPoint. 2- Students must submit their presentations in advance. 3- The presentation duration is 5 minutes. presentation software like MS Oral presentation rubric 0-6 points Criteria Excellent Good Fair Delivery • Holds attention of entire audience with

New Discussion, ECN500

Description Discuss one of the following topics. on Global Trade Balancing National Interests with Global Trade Rules Discuss how governments design industrial policies that address domestic economic goals (e.g., supply chain resilience or climate change) while adhering to WTO rules. Discuss examples where such balance has been achieved or failed.

ECN500 new Discussion

Description Discuss one of the following topics. on Global Trade Balancing National Interests with Global Trade Rules Discuss how governments design industrial policies that address domestic economic goals (e.g., supply chain resilience or climate change) while adhering to WTO rules. Discuss examples where such balance has been achieved or failed.

Fin500 Discussion

Description Break-even Analysis This week we learned more about break-even analysis and its influence on decision-making. Assume you owned a coffee shop and were thinking of expanding and adding a second location within the city. Discuss how would the use of break-even or other analysis to help you determine whether

Trade barriers Comparative Analysis of Trade Barriers

Description Trade barriers Comparative Analysis of Trade Barriers: • Select two countries, one developed and one developing, and compare their approaches to trade barriers. • Analyze the types of barriers implemented, their economic justifications, and their impacts on domestic industries and international trade. • Conclude by proposing policy recommendations to

CT-Module 07: Business Intelligence, Data Science, and Data Analytics

Description CT-Module 07: Business Intelligence, Data Science, and Data Analytics Business Intelligence (BI) and Data Analytics are two of the most important fields in modern business. They allow organizations to make data-driven decisions, optimize their operations, and gain a competitive advantage. In this lecture, we will cover the basics of

Public Management (MGT324)

Description Assignment 2 Public Management (MGT324) Instructions: Please Read them carefully • • This assignment is an individual assignment. The Assignment must be submitted on BB only in WORD format via allocated folder. • Assignments submitted through email will not be accepted. • Students are advised to make their work

Strategic Management (MGT 401)

Description Assignment 2 Strategic Management (MGT 401) General Instructions – PLEASE READ THEM CAREFULLY • • • • • • • • The Assignment must be submitted on Blackboard (WORD format only) via the allocated folder. Assignments submitted through email will not be accepted. Students are advised to make their

Module 07: Introduction

Description Module 07: Introduction In this module, you will learn about processes, facilities planning, and work systems. Regarding processes, you will focus on process selection, process strategies, and process layouts. Regarding facilities, you will focus on facilities layouts and product layouts. Finally, regarding work systems, the focus will be on