Global Unified Technology Sales (GUTS) is moving toward a “bring your own device” (BYOD) model for employee computing. Employees can use traditional desktop computers in their offices. They can also use a variety of personal mobile computing devices such as tablets, smartphones, and laptops. The new computing model introduces some security risks that GUTS is attempting to address. The company wants to ensure that any devices connecting to their servers are properly registered and approved by the Information Technology department. a. Create a complete ERD to support the business needs described below:  Every employee works for a department that has a department code, name, mail box number, and phone number. The smallest department currently has 5 employees, and the largest department has 40 employees. This system will only track in which department an employee is currently employed. Very rarely, a new department can be created within the company. At such times, the department may exist temporarily without any employees. For every employee, an employee number and name (first, last, and middle initial) are recorded in the system. It is also necessary to keep each employee’s title.  An employee can have many devices registered in the system. Each device is assigned an identification number when it is registered. Most employees have at least one device, but newly hired employees might not have any devices registered initially. For each device, the brand and model need to be recorded. Only devices that are registered to an employee will be in the system. Whileunlikely, it is possible that a device could transfer from one employee to another. However, if that happens, only the employee who currently owns the device is tracked in the system. When a device is registered in the system, the date of that registration needs to be recorded.  Devices can be either desktop systems that reside in a company office or mobile devices. Desktop devices are typically provided by the company and are intended to be a permanent part of the company network. As such, each desktop device is assigned a static IP address, and the MAC address for the computer hardware is kept in the system. A desktop device is kept in a static location (building name and office number). This location should also be kept in the system so that, if the device becomes compromised, the IT department can dispatch someone to remediate the problem.  For mobile devices, it is important to also capture the device’s serial number, which operating system (OS) it is using, and the version of the OS. The IT department is also verifying that each mobile device has a screen lock enabled and has encryption enabled for data. The system should support storing information on whether or not each mobile device has these capabilities enabled.  Once a device is registered in the system, and the appropriate capabilities are enabled if it is a mobile device, the device may be approved for connections to one or more servers. Not all devices meet the requirements to be approved at first so the device might be in the system for a period of time before it is approved to connect to any server. GUTS has a number of servers, and a device must be approved for each server individually. Therefore, it is possible for a single device to be approved for several servers but not for all servers.  Each server has a name, brand, and IP address. Within the IT department’s facilities are a number of climate-controlled server rooms where the physical servers can be located. Which room each server is in should also be recorded. Further, it is necessary to track which operating system is being used on each server. Some servers are virtual servers and some are physical servers. If a server is a virtual server, then the system should track which physical server it is running on. A single physical server can host many virtual servers, but each virtual server is hosted on only one physical server. Only physical servers can host a virtual server. In other words, one virtual server can- not host another virtual server. Not all physical servers host a virtual server.  A server will normally have many devices that are approved to access the server, but it is possible for new servers to be created that do not yet have any approved devices. When a device is approved for connection to a server, the date of that approval should be recorded. It is also possible for a device that was approved for a server to lose its approval. If that happens, the date that the approval was removed should be recorded. If a device loses its approval, it may regain that approval at a later date if whatever circumstance that lead to the removal is resolved.

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question

Global Unified Technology Sales (GUTS) is moving toward a “bring your own
device” (BYOD) model for employee computing. Employees can use traditional
desktop computers in their offices. They can also use a variety of personal mobile
computing devices such as tablets, smartphones, and laptops. The new computing
model introduces some security risks that GUTS is attempting to address. The
company wants to ensure that any devices connecting to their servers are properly
registered and approved by the Information Technology department.
a. Create a complete ERD to support the business needs described below:
 Every employee works for a department that has a department code, name,
mail box number, and phone number. The smallest department currently has
5 employees, and the largest department has 40 employees. This system will
only track in which department an employee is currently employed. Very
rarely, a new department can be created within the company. At such times,
the department may exist temporarily without any employees. For every
employee, an employee number and name (first, last, and middle initial) are
recorded in the system. It is also necessary to keep each employee’s title.
 An employee can have many devices registered in the system. Each device is
assigned an identification number when it is registered. Most employees have
at least one device, but newly hired employees might not have any devices
registered initially. For each device, the brand and model need to be recorded.
Only devices that are registered to an employee will be in the system. Whileunlikely, it is possible that a device could transfer from one employee to
another. However, if that happens, only the employee who currently owns the
device is tracked in the system. When a device is registered in the system, the
date of that registration needs to be recorded.
 Devices can be either desktop systems that reside in a company office or mobile
devices. Desktop devices are typically provided by the company and are
intended to be a permanent part of the company network. As such, each
desktop device is assigned a static IP address, and the MAC address for the
computer hardware is kept in the system. A desktop device is kept in a static
location (building name and office number). This location should also be kept
in the system so that, if the device becomes compromised, the IT department
can dispatch someone to remediate the problem.
 For mobile devices, it is important to also capture the device’s serial number,
which operating system (OS) it is using, and the version of the OS. The IT
department is also verifying that each mobile device has a screen lock enabled
and has encryption enabled for data. The system should support storing
information on whether or not each mobile device has these capabilities
enabled.
 Once a device is registered in the system, and the appropriate capabilities are
enabled if it is a mobile device, the device may be approved for connections to
one or more servers. Not all devices meet the requirements to be approved at
first so the device might be in the system for a period of time before it is
approved to connect to any server. GUTS has a number of servers, and a device
must be approved for each server individually. Therefore, it is possible for a
single device to be approved for several servers but not for all servers.
 Each server has a name, brand, and IP address. Within the IT department’s
facilities are a number of climate-controlled server rooms where the physical
servers can be located. Which room each server is in should also be recorded. Further, it is necessary to track which operating system is being used on each
server. Some servers are virtual servers and some are physical servers. If a
server is a virtual server, then the system should track which physical server it
is running on. A single physical server can host many virtual servers, but each
virtual server is hosted on only one physical server. Only physical servers can
host a virtual server. In other words, one virtual server can- not host another
virtual server. Not all physical servers host a virtual server.
 A server will normally have many devices that are approved to access the
server, but it is possible for new servers to be created that do not yet have any
approved devices. When a device is approved for connection to a server, the
date of that approval should be recorded. It is also possible for a device that
was approved for a server to lose its approval. If that happens, the date that
the approval was removed should be recorded. If a device loses its approval, it may regain that approval at a later date if whatever circumstance that lead
to the removal is resolved.

Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 3 steps with 1 images

Blurred answer
Knowledge Booster
Threats
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education