System Analysis and Design

1 Executive Summary of Database Management System Security Issues

HOTEL MANAGEMENT Framework has been developed adopting systems integration measures for smooth operation and management. The national evaluation committee provided the researcher with a seven-month timeframe to locate and describe the issue in the current hotel manual system. After a process of information gathering from many hotels operating on manual and computerized processes, the analyst found that the hotel needs a computerized management system. This report discusses the case of Hill Top Hotel, further analyses the shortcomings in the system design and intends to address the issues using advancements in the system.

This report concluded that all hardware and software specifications for implementation and system maintenance were readily and easily available on the market and affordable by the hotel after a detailed review of samples collected during the problem classification process. The system has been specifically developed to ensure that the system in the hotel is maximally functional. The system was coded to seal any potential gaps in the system with expertise and care. Application visual base (Microsoft access) language was used to build the framework. In addition to its expertise in the hotel business sector, this device can help the hotel management and the valued staff handle and control the operation and the transactions of a hotel.


1 Executive Summary.

2 Introduction.

3 Data Gathering and Results:

4 System Description..

5 Diagram of The System...

6 Problems in The Manual System...

7 the Proposed System.

7.1 Scope of The System...

7.2 the System Design.

7.3 Data Security Measures.

7.4 System Construction..

8 Macro.

9 Conclusion:

10 Sources:

2 Introduction to Database Management System Security Issues

System analysis is the process by which data are collected and interpreted, problems are identified and system components are decomposed. A system and its components are examined or evaluated to identify the objects. The evaluation of a particular system to identify the areas for improvement and improvements if required is another definition of system analysis.

Analyzing and designing systems, as conducted by system analysts, seeks to understand what people need to systematically analyze input and data flow, process or transform data, store data, and produce information in connexion with a given business. By thoroughly analyzing the problems, analysts are trying to identify and resolve them. To analyze, design, and implement improvements in support of users and the functioning of companies that can be carried out through the use of computerized information systems, system analysis will also be used (Van et al., 2017, May).

If a system is installed without correct planning, the user is unhappy and often the system is not in use. System analysis and the development of information systems give the structure to the analysis and the design, a costly undertaking that could otherwise have been carried out destructively. It can be seen as several systematic processes to improve an enterprise by using computerized information systems. Analyzing and design systems involves working with current and future IT users to support them in working with organizational technology (Lu et al., 2019).

For the successful development of computerized information systems, user participation throughout the project is crucial. The other crucial component in developing useful information systems is system analysts whose function in the organization is discussed below. Users become more international in their composition as software development teams move to the frontline. This means that more emphasis is placed on working with software users, on the analysis of their businesses, issues, and goals, and communication with everyone involved with the analysis and design of the planned system (Warman & Ramdaniansyah, 2018).

3 Data Gathering and Results:

The management system is a set of policies, processes, and procedures that an organization uses to ensure that it can meet its goals. These goals cover many aspects of operations of the organization (including financial success, reliable management, product quality, customer relations, compliance with legislation and regulations, and managing the workforce).

The methodology used in the project is Fact-Finding. The fact-based inference is the data and information collection process based on technologies that include the sampling of current documents, research, observation, questionnaires, interviews, prototyping, and planning of joint requirements. System Analyst uses appropriate fact-finding methods to develop and implement the current system. It is of great importance to collect required facts to use tools for the System Development Life Cycle because tools can not be used effectively and efficiently without proper factual extraction. Early-stage fact-finding techniques are employed including system analysis, design, and post-implementation review in the system development life cycle. This technique involves system analysts in the organization, examines document flows, uses the existing system, and interacts with users. Observations may be helpful when a user's point of view is provided by the system analyst. For observation, the sampling technique called sampling is useful. With this technique, the system analyst can understand how staff spends their days (Lu et al., 2019).

The hotel provides lodging, meals, other amenities, and facilities.

The following are offered accommodation services:

Offered includes Breakfast; Lunch, dinner, tea, Laundry, Ironing, transport, and room service. Although the hotel has an international class and standard, the new redundant manual system does not realize its potential because of the delay in activities. The hotel management has opted for an information system because of the tremendous losses incurred by hotels as a result of the numerous failures in the existing system.

To administer a database, database management systems have been created with specific data management concepts. Only individual pieces of specially formatted data were processed in the first databases. More developed systems today are capable of handling and linking various types of data less formatted in more detail.

4 System Description

The new manual utilizes notes that offer direct communication by mouth with human language. The administration of the hotel. The transition of data to the hotel is also deferred. Bookings are done either by phone or via the hotel booking office. The guests receive personal information such as name, age, nationality, and length of stay during the reservation period. Orders from the booking office to schedule space for the guest before the check-in date. The papers are delivered by hand to the filling department for the processing of the tourist.

At the reporting date, the file is moved to the reception. The visitor will review his assigned space, he also decides if room service is required. At the next table, the receptionist hands the guest's file over to the accountant, here the guest pays the room and meal costs. The guest file will be updated with his costs daily. The accounting department produces the bills daily and the service attendants deliver them to guests in their rooms at noon. The client pays for the receipts on the account desk. The bill is generated immediately upon order for one food customer and he pays at the accountable office before departure. Their expenses are generated one day before the checkout date while checking out the guests. At the accounts desk, guests receive their contours when they check out and pay the bills if they do (Lu et al., 2019).

6 Problems in The Manual System

In a significant number of hospitality contexts around the world, manual administration and coordination approaches such as the popular pen and paper technique are still used. The reason is quite simple – little investment is required. The costly trade-offs associated with such methods seem to be so little in the short term. So little in fact. But people make mistakes, and that is not possible unless these systems minimize human participation anywhere we can. Human and technological errors: many errors are made possible by the device due to boring errors. The cost of the calculations needed during data processing is very high for hotel management. Poorly generated records promote the omission of any of them Significant data from workers. Such data as the luggage of the guests are excluded. This is leading to Security issues at the hotel, such as armed robbery (Van et al., 2017, May).

Computer systems store data in ways many users do not usually understand. The validity of your current data can be ruined by opening the wrong file with old data or meeting a digital error data file. It is impossible to confuse other versions with similar data.

Manual System Advantages.

Regarding advantages that users encounter using manual systems specifically in booking or management systems, users do not require advanced programming expertise to operate a manual system No dependency on electronic devices that may malfunction because they are of a machine type. Relatively low operating costs due to the lack of energy needed by the system, internet services as well as The computerized system must have been.

7 The Proposed System

Objectives of The Proposed System are given as follows:- 

  • To make an online booking on the Internet.
  • To allow automated data input methods.
  • Ensure effective and secure communications inside the hotel.
  • By using input masks, prevent data entry errors.
  • Enable easy-to-use data modification.
  • Enforce security measures to prevent unauthorized access to guest information.
  • Enable quick and simple retrieval of guest records and data for quick reference activities.

7.1 Scope of The System

To help the system carry out its intended function to meet the needs of hotel management smoothly.

7.3 Data Security Measures

The data must be encrypted and decrypted in the backup center during data transmission. The rights of access to important data and information are enacted to regulate users' access. Preserve the protection of data. In data storage and backup spaces, Burglar Proof windows should be installed. Guards should be hired with the software and hardware resources of the hotel. To detect and warn of unauthorized entry into the device, alarm systems should be constructed. Please have data storage spaces.

7.4 System Construction

The system analyst used the following database components to construct the system:

  • Tables
  • Queries
  • Forms
  • Reports
  • Macros

9 Conclusion on Database Management System Security Issues

This report gathers and analyses the Hill Top Hotel's existing system through the fact-finding observational method and derives the results ultimately highlighting the shortcomings and problems in the existing system. This report proposes a new system for the hotel needs and requirements based on the fact-finding meeting the needs of the hotel.

10 Recommendations on Database Management System Security Issues

Next-generation accommodation is a top-of-the-art technology for almost every hotelier who in recent years did not improve its platform capabilities. Yet it is not usually an easy task to select a solution that best fits its needs, which makes it most useful for the hotel or resort (Van et al., 2017, May).

Most property management systems, like most enterprise technology solutions, move to the cloud. Even larger brands benefit from the worldwide dimension, distributed information and interface access, easy deployment, and costs. Additional benefits include reduced stress on hotel technology infrastructure and improved security and seamless integration with applications and modules of third parties in some cases (Yunus et al., 2017).

The hotel or resort can maintain complete profiles and histories, including financial data, handicaps, and purchasing records, using an integrated PMS solution. All this will help to establish a guest profile record in the PMS. Also, the spa management module monitors the history of guests, medical conditions, transaction records, and preferences. These modules are an important component of the puzzle for the creation and maintenance of a centralized Guest database.

11 Sources for Database Management System Security Issues

Van Aken, D., Pavlo, A., Gordon, G. J., & Zhang, B. (2017, May). Automatic database management system tuning through large-scale machine learning. In Proceedings of the 2017 ACM International Conference on Management of Data (pp. 1009-1024).

Warman, I., & Ramdaniansyah, R. (2018). Analisis Perbandingan Kinerja Query Database Management System (Dbms) Antara Mysql 5.7. 16 Dan Mariadb 10.1. Jurnal Teknoif6(1).

Yunus, M. A. M., Krishnan, S. K. G., Nawi, N. M., & Surin, E. S. M. (2017). Study on Database Management System Security Issues. JOIV: International Journal on Informatics Visualization1(4-2), 192-194.

Lu, W., Zhao, Z., Wang, X., Li, H., Zhang, Z., Shui, Z., ... & Du, X. (2019). A lightweight and efficient temporal database management system in TDSQL. Proceedings of the VLDB Endowment12(12), 2035-2046.

Remember, at the center of any academic work, lies clarity and evidence. Should you need further assistance, do look up to our Computer Science Assignment Help

Get It Done! Today

Applicable Time Zone is AEST [Sydney, NSW] (GMT+11)
Upload your assignment
  • 1,212,718Orders

  • 4.9/5Rating

  • 5,063Experts


  • 21 Step Quality Check
  • 2000+ Ph.D Experts
  • Live Expert Sessions
  • Dedicated App
  • Earn while you Learn with us
  • Confidentiality Agreement
  • Money Back Guarantee
  • Customer Feedback

Just Pay for your Assignment

  • Turnitin Report

  • Proofreading and Editing

    $9.00Per Page
  • Consultation with Expert

    $35.00Per Hour
  • Live Session 1-on-1

    $40.00Per 30 min.
  • Quality Check

  • Total

  • Let's Start

Browse across 1 Million Assignment Samples for Free

Explore MASS
Order Now

My Assignment Services- Whatsapp Tap to ChatGet instant assignment help