Recent orders

Conflict Between Abdul And Shirley

Conflict Between Abdul And Shirley

Students name

Institution of affiliation

Instructor

Course

Date

Conflict Between Abdul And Shirley

Firstly, Abdul and Shirley are conflicting on the issue of leadership. The project manager had identified Abdul as a person who could work on the project effectively. However, Shirley also interviews Abdul and is very much opposed to the decision of the manager since she thinks that Abdul is not worthy to be in the project. After the manager leaves to start his own venture, Abdul and Shirley are supposed to work together on the project as leaders. This does not happen as Abdul takes full responsibility of being the leader and this brings conflicts. Dealing with the conflict between the two is possible. The first stage of conflict resolution would be listening to both sides and trying to understand why each of them is not comfortable with each other. Shirley complains that Abdul is taking everything upon himself and that it is very unfair. This is true as from what Abdul states he thinks that Shirley is too busy and she cannot give her full attention to the project.

Therefore, listening to both sides, it is easy to come to a solution. Firstly, there is a lack of communication between the two. This is because when Abdul wants to call for a meeting, he never informs Shirley and she is infuriated by this. Abdul also signs off letters and other documents with his name and does not care about Shirley who should be his co-manager. Therefore, conflict arises in this. The best way to deal with the conflict as O’Toole et al. (2019) states is first to establish the causative agent and the reason why the conflict continues to exist. The causative agent is lack of communication and maybe the feeling on the side of Shirley that Abdul is not good enough. Therefore, Shirley needs to appreciate that Abdul can work as well as she can. On the other side Abdul tries to prove to Shirley that he is good in his work by making sure that he runs everything. Abdul needs to know how to work as a team and stop trying to show off that he is the one in charge.

Therefor the possible ways to solve the conflict is by having both understand each other and work together which will make the work easier and even more productive since two leaders are better than one. The other option would be one of the two to step down and let the other one remains working as the manager. Even though this might seem off, it can be a good method through which the people understand each other and one person does most of the work with total focus. The other possible thing is that one of the leaders becomes a worker or the assistant of the other one such that there is only one leader and the workers. Even though this might be humiliating for a person like Shirley who hates it, if well accepted can work out well to solve the conflict. The last option would be getting completely new people to manage the project and the two who are complaining about leadership are placed at lower positions which are equal in power. This was the two will have nothing to compete against.

Reference

O’Toole, J., Bagshaw, D., Burton, B., Grünbaum, A., Lepp, M., Morrison, M., & Pillai, J. (2019). Conflict Management, Resolution and Transformation. In Researching Conflict, Drama and Learning (pp. 13-42). Springer, Singapore. https://doi.org/10.1007/978-981-13-5916-3_2

Database Security For Electronics Ltd

Database Security For Electronics Ltd.

Introduction

A database is the collection of the information which is organized in order to be accessed easily; it can be managed and, being updated. Databases are stored in database servers which are the most significant servers in every company. In an organization databases store information about the client’s details, the financial information, and the details of the human resource and, all the data that may be of significant to the company. All the data that are stored in the database should be secured properly. Database security is the process of protecting the files stored in the database from any malicious attempts of viewing the data or modifying the data (Ramakrishnan & Gehrke, 2003, p 157). The standard language that is used for making an interactive query from and, updating the databases as Microsoft SQL server is known as the Structure Query Language (SQL). This paper tries to analyze the potential issues that are arising from having a database server online.

Securities in the software applications are very significant in all the organization which has databases. An SQL injection attack is one of the identified potential issues that might arise from having the databases online. SQL injection attack is a type of an attack which comes from what the user has inputted, and is not well checked to find if the input is valid. SQL Injection attack enables the external users to view information from the database. In other systems which are well designed, it will only include the information which is available to the public. While in a system which is poorly designed, this would only allow the external users in discovering other people’s password (Basta & Zgola, 2012, p 167).

The objective of the SQL injection attack is to fool a database system to a running malicious code which will reveal the sensitive data or information or else it may compromise the whole server. SQL injection attacks are of two types; there are the first-order attacks, and the second-order attacks. The first-order attacks happens when the attacker attempts to receive an immediate desired result, this can be by direct response coming from the application that is being interacted to, or it may be some other response mechanisms, for example emails. While the second-order attacks takes place when the attacker attempts to inject some of the data that are going to reside in the database, although the payload will not be activated immediately. Most websites are commonly used in mounting the attack on the database (Cherry, 2011, pg 201). For example, the below is an example for a typical SQL statement that can be used to mount an attack on the website.

SELECT ProductName, Unit Price, QuantityperUnitFROM Products

WHERE ProductName LIKE ‘F%’

The above SQL statement tries to select the name of the product, the price per unit, and the unit per quantity from where the products are stored where the ProductName must start with a letter F (ProductName LIKE ‘F%’). The main aim of the attackers in database is to make sure that they inject their own SQL into a statement which the application may use when querying the database. For the above SQL statement, just in any case the query was generated from the website; the user must therefore insert the letter ‘F’ as the query. But if a server side code inserts a user input directly in an SQL statement, the SQL statement may look like this, but it is only fine if the data that is inputted is valid.

String sql = “SELECT ProductName, Unitprice, QuantityPerUnit “+

“FROM Products” +

WHERE ProductName LIKE ‘”+ search, Text + “%’;

SQL injection attack damages

SQL injection attacks have been somehow limited concerning the risks which are associated with unintended disclosure of the data. Today SQL injection has evolved, and it has become the preferred method and, processes that are used by the hackers in breaching well-liked websites. It has also inserted a malware websites. SQL injections alternatively, may be used in tandem with many exploits in order to manipulate how the data can be displayed to the visitors’ website. SQL injection attack cal also damage other vulnerabilities and, obtaining the database access of SQL providing an interface which facilitates the access to, and the interactions that takes place in the database (Bai & Liu, 2010, pg 182).

The SQL Injection attack method damages the database by exploiting the Web application by means of injecting the malicious queries, hence causing the data manipulation. There are other threats that are poses by SQL injection attacks which seem not to be solitary.

How to avoid SQL Injection

For one to avoid an SQL injection attack, one should make sure that he/she firstly filters out some characters like the single quotes, the back slashes, the semi colons and, the double quotes, and extended character such as, the Null, new line and all strings from the input from the users. Alternatively, one can avoid the SQL injections by taking a significant precaution such as data sanitization and, validation. Sanitization is the process by which data are submitted by means of function so as to ensure that, there are no dangerous characters are passed to the SQL query in the data (Shahriar, 2009, p 147). However validation is somehow different, in a way that it tries to ensure that data which are submitted are in the form of what it is expected. This may include the act of ensuring that the e-mail addresses which are opened contain a sign of “@”. Validation is normally carried out in two ways that is by blacklisting dangerous or unwanted characters, and also through the method of white listing only some characters who are allowed in some circumstances.

Database security

Database security is the process by which set of the activities are aimed at protecting the whole database in a given organization. The database can be protected from the intrusion which is referred as the authenticated misuse, the malicious attacks and, inadvertent mistakes which are made by authorized people or persons. Database security is very important since networks are the most vulnerable to attacks which is due to an increased number of the vulnerabilities which may lead to exploited so as to be able to access the database.

Ways of protecting the database

The advanced security by means of database encryption is very significant hence it is required in every sector and, increasingly needed so as to comply with the regulatory mandates. Other public sector uses the database encryption so as to protect the privacy of the citizens, and also the national security. Many organizations today are very concerned about the management, although it has been a very big challenge in the database encryption.

Create table customer

CREATE TABLE is the keyword which tells the database system what is expected to be done. When creating tables, the unique name or the identifier has to follow CREATE TABLE statement. The brackets comes the list which defines each column in the table and, the type of the data type it is. Syntax of the CREATE TABLE statement is;

CREATE TABLE table_name (

Column1 datatype,

Column2 datatype,

Column3 datatype,

…..

ColumnN datatype,

PRIMARY KEY (one or more columns)

The CREATE TABLE statement for the customers table is:

CREATE TABLE customers

(

Customer_id number (10) not null,

customer_name varchar2 (50) not null,  

Address varchar2 (50),

 City varchar2 (50),  

State varchar2 (25),

  Zip _code varchar2 (10),  

CONSTRAINT customers_pk PRIMARY KEY (customer_id)

);

Create Table Product

When creating tables, the unique name or the identifier has to follow CREATE TABLE statement. Syntax of the CREATE TABLE statement is;

CREATE TABLE table_name (

Column1 datatype,

Column2 datatype,

Column3 datatype,

…..

ColumnN datatype,

PRIMARY KEY (one or more columns)

The CREATE TABLE statement for the product table is:

CREATE TABLE products

(

Product_ID INT (10) AUTO_INCREMENT PRIMARY KEY

Product_name varchar2 (50)

)

ENGINE=InnoDBCreate Table Order

The CREATE TABLE statement for the order table is:

CREATE TABLE order

(

Order_ID INT (10) AUTO_INCREMENT PRIMARY KEY,

Customer_ID INT (10),

Product_ID INT (10),

Quantity INT (5),

Date_Ordered DATE, Date_Delivered DATE

)

ENGINE = InnoDB;

Altering Tables

There are many occasions which may lead to altering of tables in the database, for example if one wishes to change the structure of the table, and then he/she has to alter the table. The syntax is;

ALTER TABLE“table_name”

[Alter specification]

The alter specification is dependent on a type of the alteration that one wish to perform.

ALTER TABLE ‘Order’ ADD FOREIGN KEY (Customer_ID) REFERENCES Customer (Customer_ID);

In this case, the table of the order is being altered by adding the foreign key which is the customer_ID in the order table

Solution

ALTER TABLE Order

ADD (Customer_ IDINT (10),

);

ALTER TABLE ‘Order’ ADD FOREIGN KEY (Product_ID) REFERENCES Product (Product_ID);

In this case, the order table is being altered by adding the foreign key which is the Product_ID into the order table.

Solution

ALTER TABLE ORDER

ADD(Product_IDINT (10),

);

Inserting into Customers Values

The INSERT INTO statement is normally used to add new records as well, as information to a database table. Its syntax is

INSERT INTO table_nameVALUES (value1, value2, value3,…)

INSERT INTO Customer VALUES (”,’Joe Bloggs’,’20 Green Avenue, Treforest, RCT, CF37 1DL’, ‘Bloggger1’);

In this case, the new customer details are being added into the customer table. While adding a new customer into the table certain criteria should be followed. For example, FirstName should be the first one, followed by the LastName, thereafter, age, address, city and lastly the state.

Solution

INSERT INTO “Customer”

(First, last, age, address, city, state)

VALUES (‘Joe’, ‘Bloggs’, 20, ‘CF37 1DL Blogger’, ‘Treforest’, ‘Green Avenue’);

INSERT INTO Customer Values (“”, “Kate Sykes”, “36 Davids Lane STUNTS GREEN BN27 7NF”, “password1”);

For this case, the customer named Kate Sykes will be added to the customer value, where the order followed will be the name of the new customer followed by the address, and then the password.

Solution

INSERT INTO “Customer”(First, last, address, password)

VALUES (‘’, ‘’, ‘Kate’, ‘Sykes’, ‘36 Davids Lane STUNTS GREEN BN27 7NF’, ‘password 1’);

INSERT INTO Customer Values (“”, “Alice Barry”, “30 Hertingfordbury Rd NEWHOUSE ML1 7TQ”, “password2”);

Solution

INSERT INTO “Customer”

(First, last, address, password)

VALUES ( ‘’, ‘’, ‘Alice’, ‘Barry’, ‘30 Hertingfordbury Rd NEWHOUSE ML1 7TQ 7NF’, ‘password 2’);

INSERT INTO Customer Values (“”, “Jade Little”, “18 Scotsburn Rd TALLINGTON PE9 7UR”, “password3”);

Solution

INSERT INTO “Customer”

(First, last, address, password)

VALUES ( ‘’, ‘’, ‘Jade’, ‘Little’, ‘Scotsburn Rd TALLINGTON PE9 7UR’, ‘password 3’);

INSERT INTO Customer Values (“”, “Jack Porter”, “93 Essex Rd TANKERSLEY S75 2EP”, “password4”);

Solution

INSERT INTO “Customer”

(First, last, address, password)

VALUES ( ‘’, ‘’, ‘Jack’, ‘Porter’, ‘93 Essex Rd TANKERSLEY S75 2EP 7UR’, ‘password 4’);

INSERT INTO Customer Values (“”, “Eleanor Hussain”, “73 Wrexham Rd EYAM S30 9BT”, “password5”);

Solution

INSERT INTO “Customer”

(First, last, address, password)

VALUES ( ‘’, ‘’, ‘Eleanor’, ‘Hussain’, ‘73 Wrexham Rd EYAM S30 9BT’, ‘password 3’);

Inserting into products

INSERT INTO Product VALUES (”,’Charles Dickens’);

Solution

INSERT INTO “Product”

(first_column…last_column)

VALUES(‘’, ‘Charles Dickens’);

INSERT INTO Product VALUES (”,’USB Stick’);

Solution

INSERT INTO “Product”

(first_column…last_column)

VALUES(‘’, ‘USB Stick’);

INSERT INTO Product VALUES (”,’Apple iphone 4S’);

Solution

INSERT INTO “Product”

(first_column…last_column)

VALUES(‘’, ‘Apple iphone 4S’);

INSERT INTO Product VALUES (”,’Alienware Laptop’);

Solution

INSERT INTO”Product”

(first_column…last_column)

VALUES(‘’, ‘Alienware Laptop’);

INSERT INTO Product VALUES (”,’Computer Mouse’);

Solution

INSERT INTO”Product”

(first_column…last_column)

VALUES(‘’, ‘Computer Mouse’);

INSERT INTO Product VALUES (”,’The Thesaurus’);

Solution

INSERT INTO”Product”

(first_column…last_column)

VALUES(‘’, ‘The Thesaurus’);

INSERT INTO Product VALUES (”,’Websters Dictionary’);

Solution

INSERT INTO”Product”

(first_column…last_column)

VALUES(‘’, ‘Websters Dictionary’);

Conclusion

In conclusion, databases are very important to organizations that have an ability of storing information that are not displayed or accessed by the public. Securities to some files in the organization should be considered. Authentications and authorization of users should be allowed, in that only the authorized and authenticated members should be allowed the access of the files in the organization. SQL injection attacks alternatively should be highly avoided.

List of References

Afyouni, H. A. (2006), Database security and auditing: protecting data integrity and accessibility, London: Thomson/Course Technology.

Bai, K., & Liu, P. (2010), Damage management in database management systems, London: Pennsylvania State University.

Basta, A., & Zgola, M. (2012), Database security. London: Course Technology/Cengage Learning.

Cherry, D. (2011), Securing SQL server protecting your database from attackers. London: Syngress.

Ferraggine, V. E., Doorn, J. H., & Rivero, L. C. (2009), Handbook of research on innovations in database technologies and applications current and future trends, London: IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA).

Herrero, L., & Corchado, E. (2010). Computational Intelligence in Security for Information Systems 2010, London: Springer.

MacWhinney, B. (2000). The database (3. ed.). London: Lawrence Erlbaum.

Ramakrishnan, R., & Gehrke, J. (2003), Database management systems (3rd ed.). New York: McGraw-Hill.

Shahriar, H. (2009). Mutation-based testing of buffer overflows, SQL injections, and format string bugs,New York: Library and Archives Canada = Bibliothèque et Archives Canada.

Conflict A topic goal signifies different ideas that emerge about what to do,

Student’s Name

Instructor’s Name

Course Tittle

Date

A topic goal signifies different ideas that emerge about what to do, what decisions to make, how to locate resources, where to go, and many more. Topic goals can be listed since they are tangible. They also have pros and cons, can be supported or be urged. The major struggles of topic goals are that either individual desire different things or they want similar things. Examples of topics goals in a family setting include reading a book for one month, no television for 30 days, make the bed every morning, and start a capsule wardrobe and only wear those items. Topic goals are the easiest goals to identify in a conflict and the easiest to communicate with others.

Relational goals entail how we want others to treat us and how we see our relationships with others. It denotes how each party desires to be treated by the other and the amount of interdependence they need. Parts of it comprise the extent of impact each will have over the other, and these goals will arise in any conflict that is going on. Such a type of goal is difficult to pinpoint since they are not always obvious. Examples of relational goals in the workplace setting include creating a new stream of income in a way that honors the desired relationship with money, buying for an individual a small item just because he will enjoy and appreciate it, and performing an act of kindness for someone else.

An identity goal signifies one that deals with who a person is deep down. It might look like this, “I’m the type of a person who never misses a chance to talk about my birthday and invite friends to join me.” An identity goal is a goal-based upon which a person believes about himself or herself. It is all about how you want people to see you. It includes particular desires to maintain one’s self-identity. When in a conflict, a person desires to be seen in a certain way. Most of the time, the identity goals can take center stage since we continuously wonder how someone else perceives us compared to how we view ourselves. An example in the workplace setting includes a combination of occupational and organizational identities that shape the role an individual adopts and the corresponding ways they behave when performing work.

A process goal signifies what a person will actually have to do in order to attain a larger goal. For instance, rather than setting a goal to achieve a boxing title, one might set a goal to keep the hands up during an entire boxing match. Process goals entail deciding what process of communication will work best during the conflict. In this type of goal, there is the decision between quick, well-defined processes versus lengthier ones. Examples of process goals in the family setting are when an individual decides to eat or drink no more than 1300 calories in a day with the goal to lose 12 pounds before winter.