Database and Software Development Methods and Security




Analyze Database and Software Development Methods and Security Models

Author:

University:

Course:

Professor:

Table of Contents

Introduction
Database testing and required updated applications
ERP software database structure
Database testing process
Database control checklist
Application of updated patches
Recommendations
Comparison of models
Conclusion
Reference List

Introduction

ERP software is well known for handling various business solutions. The most important contribution of ERP software is providing loans, investments, credit cards, mortgages, and financial counseling. In this assignment, arisen security concern of the software has to be analyzed. Chosen security flaws and management of patching of the security spots will be discussed with proper reference.

Database testing and required updated applications

ERP software database structure

ERP has various elements of database which is most essential for formulating the entire software. The most basic elements of the software are tables, Data types, Data forms, Queries, and Reports.

is.muni.cz, (2021), describes the detailed island system of ERP data structure. The most three basic data types in ERR are Warehouse data, Production data, and Customer & sales data.

 

Warehouse data

Production data

Sales data

Consists of the stock count, the actual location of products, and item numbers. 

Consist of the produced items, and capacity range of production.  Consist of sales orders, information of customers, and confirmed orders. 

Table 1: Data island system in ERP software

Database testing process

geeksforgeeks.org, (2021), states database testing is the most important observational process in a database. By this process, the tables, triggers, schema, reports, and other sectors inside a database can be tested. According to geeksforgeeks.org, (2021), database testing is done mainly for tracking data mapping inside the database, checking data integrity, and ensuring accuracy in the business. In ERP software these attributes are most important by which database testing can be conducted effectively.

Database testing proceedure

(Applicable for ERP software)

  • Creating the test environment
  • Proper generation of testing scenario.
  • Execution
  • Analysis
  • Identifying the log defects 

Table 2: Database testing procedure in ERP software

Database control checklist

According to template.net, (2021), a database control checklist can help to understand the security control measure in the database. The step-by-step process will be discussed below with proper reference. 

Steps Conducted tests Description
Step 1 Authentication protocol checking  Tests check the user’s background so that organization can confirm the authentication of users.   
Step 2 Checking data access  Sensitive usage of the database has to be tracked by which it can be protected. 
Step 3 Encryption checking  Encryption can protect the data storage by transforming them into codes. Encryption testing can protect data security effectively. 

Table 3: Database control checklist

Application of updated patches

Many times ERP uses the oracle as a database structure. The essential update installing processes are described below. Hassani, (2020), describes various patches management in oracle database management, widely used in ERP software. 

Patch application in Oracle database

(Used in ERP software)

  • Hotfix
  • Point release
  • Security patches
  • Maintenance release patches
  • Monkey patches

Table 4: Types of patches in ERP software

Recommendations

The constant need of checking the software database is essentially required. The identified vulnerability in the database has to be updated according to the database type (mostly oracle). Organizations have to produce a database control checklist regularly. The security expert has to focus on updating the patches by which the website can be safe and secure.   

Comparison of models

Waterfall model

Spiral model

This model is the most basic software development model (geeksforgeeks.org, 2021). The detailed process comprises of

This model is a combination of sequential-model and iterative models (Shylesh, 2017). The four basic components are

1) Feasibility-study

1) Identification

2) Analysis of requirement

2) Design

3) Design-management

3) Construction

4) Unit testing & coding

4) Risk evaluation 

5) System-testing

 

6) System-maintenance

 

Table 5: Comparison of Waterfall and spiral model

Rapid-application-development

Reuse model

Extreme-programming

According to Rapid application development, the organization provides sample software prototypes and receives feedback from them (Shylesh, 2017).    The organization carries through software development for a specific duration.  Extreme programming focuses on creating higher-quality software. By this programming, an advanced version of the software could be developed (agilealliance.org, 2020).   

Table 6: Rapid-application-develolpment, Reuse-model, extreme-programing comparison

Figure 7: Reuse model

(Source: researchgate.net, 2021)

Conclusion

The proposed models are the most significant for developing the security application in ERP software. For detailed security identification, regular security checklist preparation is required. Based on the checklist, the security analyst can party the needed updates.

Reference List

Website

is.muni.cz, 2021, ERP architechture, Retreved on 23rd December 2021 from: https://is.muni.cz/el/1456/jaro2013/BPH_EPS1/Basic_ERP_architecture_20110215.pdf

geeksforgeeks.org, 2021, software-testing-database-testing, Retreved on 23rd December 2021: from: https://www.geeksforgeeks.org/software-testing-database-testing/

template.net, 2021, database-security-checklist, Retreved on 23rd December 2021 from: https://www.template.net/business/checklist-templates/database-security-checklist/

researchgate.net, 2021, Design-Reuse-Model, Retreved on 23rd December 2021 from:  https://www.researchgate.net/figure/Design-Reuse-Model-26_fig2_277150679

agilealliance.org, 2021, softwere development, Retreved on 23rd December 2021 from: https://www.agilealliance.org/glossary/xp/#:~:text=Extreme%20Programming%20(XP)%20is%20an,engineering%20practices%20for%20software%20development

Journals

Hassani, P. (2020). Implementing Patch Management Process. https://www.theseus.fi/bitstream/handle/10024/341620/PasiHassani_Thesis.pdf?sequence=2

Shylesh, S. (2017). A study of software development life cycle process models. In National Conference on Reinventing Opportunities in Management, IT, and Social Sciences (pp. 534-541). https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2988291