Essay on "Database and Data Mining Security Strategy"

Essay 4 pages (1199 words) Sources: 2

[EXCERPT] . . . .

Database and Data Mining Security Strategy

Providing analysis and recommendations for securing the network connections, databases, and data mining applications of the Making Money Corporation (MMC) is the goal of this paper. The characteristics of the company's environment that impact the creation of a data mining and security strategy, the identification of roles involved in selecting a database and data mining security strategy are included in the analysis. Recommendations are also provided for products that are most appropriate for the organization to use as part of their database and data mining security strategy. The analysis concludes with a recommendation of an enterprise-wide security strategy for the databases and data mining applications.

Assessing the Characteristics of Making Money Corporation (MMC)

MMC has a highly distributed organizational structure that has over time led to 30 branch locations being in operation. These branch locations require real-time access to databases and data mining applications to serve existing customers and prospect for new ones in their regional areas. Connected to the corporate center via T1 line, each of these thirty regional offices has a domain controller, which through interdomain trust integration to the Microsoft Active Directory Domain, is capable of accessing corporate databases, financial systems and data mining applications. Each office also has an application controller to support the systems each branch office relies on operate daily.

The configuration of MMC's corporate center and regional offices is dependent on the development of interdomain trust relationships throughout
Continue scrolling to

download full paper
Microsoft Active Directory. The validation of each branch's identity needs to occur with each login. Distributed database security concepts of interdomain trust relationships and the use of security audits to ensure that role-based access are being monitored are best practices in managing distributed database security (Harris, Sidwell, 1994). Characteristics of the MMC environment that will affect the creation of a database and data mining security strategy are related to how well the company can change its existing processes and routines to complete random audits, and ensure that interdomain trust relationships are active on each of the domain controllers. The resistance to change that many branch managers and support personnel may have will be significant. Overcoming this resistance to change by concentrating on the adoption of best practices in database and data mining security in remote locations is critical (Harris, Sidwell, 1994). Additional characteristics of the environment that need to be taken into account are the T1 connections and their relative levels of security at the physical level, the security of the TCP/IP connections over the network, and the configuration of the VPN options for the network. If VPN tunneling is being used for connecting the remote offices to the central office, an analysis of IPSec vs. Secured Sockets Layer (SSL) also needs to be completed. All of these factors need to be taken into account in creating an enterprise-wide security strategy. By definition an enterprise-wide security strategy concentrates on the how the systems, processes, and procedures of a company are protected and hardened from external threats so that a company's strategic objectives and plans can be attained (Yang, Li, Deng, Bao, 2010). An enterprise-wide security strategy then focuses on how to best coordinate it resources to the strategic needs of the company so they are highly secure and reliable (Yang, Li, Deng, Bao, 2010).

Organizational Roles Involved in the Selection and Maintenance of a Database and Data Mining Security Strategy

The C-level executives of any organization including the Chief Information officer (CIO) are the primarily responsible for the definition, selection, execution and maintenance of the company's database and data mining security strategy (Yang, Li, Deng, Bao, 2010). Additional… READ MORE

Quoted Instructions for "Database and Data Mining Security Strategy" Assignment:

Create a strategy for incorporating database and data mining security into the security plan for the Making Money Corporation (MMC). This strategy should include the following components:

-Characteristics of the particular environment that may influence the strategy.

-Roles involved in the selection and maintenance of the strategy.

-Selection of a particular set of procedures and products.

-Support for why these procedures and products are the optimal approach for this organization.

-High level architectural and design details for how and where these procedures and products will be implemented within the organization.

Here is the info on the company the paper should be written about.

The organizations name is the Making Money Corporation (MMC). MMC has one corporate center and 30 branch locations scattered across three states. The corporation has a fairly well rounded IT staff which consists of system engineers, network engineers, a Database Administrator, helpdesk personnel, who all report to a CIO.

The network is comprised of a single Microsoft Active Directory domain with domain controllers at each physical location. The branches connect back to the corporate office via a T1 MPLS WAN connection. The corporation’s sole Internet connection is at the corporate center. The computers and VoIP phones connect via CAT6 cable runs to 3Com and Cisco network equipment.

The corporation has a core business application which has business operation platforms plug-ins. The core business application houses the customer information and all associated accounts in a relational database. The platforms used are a lending platform and a collections platform. The corporation has just recently implemented a document scanning solution that will digitally capture all paper documents used for customer interaction. An accounting application is used to keep track of the institutions general ledger, assets, and other accounting functions. MMC’s HR department utilizes a payroll and benefits system that is a software as a services type of architecture.

Few key personnel are issued laptop computers which is less than 15 employees. The rest of the employees use workstations. There are around 50 server class computers. Each branch has exactly one server which is a domain controller and core application server.

The corporation uses a backup to disk solution for its critical servers. The corporation is interested in implementing a robust Disaster Recovery (DR) solution for its critical computer infrastructure.

How to Reference "Database and Data Mining Security Strategy" Essay in a Bibliography

Database and Data Mining Security Strategy.” A1-TermPaper.com, 2010, https://www.a1-termpaper.com/topics/essay/database-data-mining-security/4359. Accessed 4 Oct 2024.

Database and Data Mining Security Strategy (2010). Retrieved from https://www.a1-termpaper.com/topics/essay/database-data-mining-security/4359
A1-TermPaper.com. (2010). Database and Data Mining Security Strategy. [online] Available at: https://www.a1-termpaper.com/topics/essay/database-data-mining-security/4359 [Accessed 4 Oct, 2024].
”Database and Data Mining Security Strategy” 2010. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/database-data-mining-security/4359.
”Database and Data Mining Security Strategy” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/database-data-mining-security/4359.
[1] ”Database and Data Mining Security Strategy”, A1-TermPaper.com, 2010. [Online]. Available: https://www.a1-termpaper.com/topics/essay/database-data-mining-security/4359. [Accessed: 4-Oct-2024].
1. Database and Data Mining Security Strategy [Internet]. A1-TermPaper.com. 2010 [cited 4 October 2024]. Available from: https://www.a1-termpaper.com/topics/essay/database-data-mining-security/4359
1. Database and Data Mining Security Strategy. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/database-data-mining-security/4359. Published 2010. Accessed October 4, 2024.

Related Essays:

Data Mining in Business Research Executive Summary Term Paper

Paper Icon

Data Mining in Business Research
Executive Summary
The perfect storm is brewing over analytics and their use to define the
future of data mining and its associated techniques and technologies,… read more

Term Paper 4 pages (1160 words) Sources: 3 Style: MLA Topic: Computers / IT / Internet


Impact of Big Data on Business Strategy Term Paper

Paper Icon

Big Data on Business Strategy

Business Strategies

The competitive nature of today's business environment is driving companies to use technology driven business strategies (Berman & Hagan, 2006, p.28). Big Data… read more

Term Paper 20 pages (5673 words) Sources: 18 Topic: Business / Corporations / E-commerce


Databases Fundamentals of Databases Database Software Research Paper

Paper Icon

Databases

Fundamentals of Databases

Database software is designed to support rapid access to large amounts of files, records, fields and data through the use of a variety of different indexing… read more

Research Paper 3 pages (807 words) Sources: 2 Topic: Computers / IT / Internet


Databases Benefits and Limitations of Database Capabilities Term Paper

Paper Icon

Databases

Benefits and Limitations of Database Capabilities of Desktop vs. Enterprise DBMS Systems

The use of databases has become pervasive in personal productivity applications including Microsoft Excel and Access, in… read more

Term Paper 1 pages (355 words) Sources: 2 Topic: Computers / IT / Internet


Consumer Piracy Research Paper

Paper Icon

Consumer Privacy: Regulations and Ethics: Judging Privacy Concerns and Protections

Consumer Privacy and Data Mining:

Ethical Implications for Marketers in the 21st Century

The ethical implications of using customer data… read more

Research Paper 6 pages (2099 words) Sources: 4 Topic: Advertising / Marketing / Sales


Fri, Oct 4, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!