Essay on "Database and Data Mining Security Strategy"
Essay 4 pages (1199 words) Sources: 2
[EXCERPT] . . . .
Database and Data Mining Security StrategyProviding analysis and recommendations for securing the network connections, databases, and data mining applications of the Making Money Corporation (MMC) is the goal of this paper. The characteristics of the company's environment that impact the creation of a data mining and security strategy, the identification of roles involved in selecting a database and data mining security strategy are included in the analysis. Recommendations are also provided for products that are most appropriate for the organization to use as part of their database and data mining security strategy. The analysis concludes with a recommendation of an enterprise-wide security strategy for the databases and data mining applications.
Assessing the Characteristics of Making Money Corporation (MMC)
MMC has a highly distributed organizational structure that has over time led to 30 branch locations being in operation. These branch locations require real-time access to databases and data mining applications to serve existing customers and prospect for new ones in their regional areas. Connected to the corporate center via T1 line, each of these thirty regional offices has a domain controller, which through interdomain trust integration to the Microsoft Active Directory Domain, is capable of accessing corporate databases, financial systems and data mining applications. Each office also has an application controller to support the systems each branch office relies on operate daily.
The configuration of MMC's corporate center and regional offices is dependent on the development of interdomain trust relationships throughout
download full paper ⤓
Organizational Roles Involved in the Selection and Maintenance of a Database and Data Mining Security Strategy
The C-level executives of any organization including the Chief Information officer (CIO) are the primarily responsible for the definition, selection, execution and maintenance of the company's database and data mining security strategy (Yang, Li, Deng, Bao, 2010). Additional… READ MORE
Quoted Instructions for "Database and Data Mining Security Strategy" Assignment:
Create a strategy for incorporating database and data mining security into the security plan for the Making Money Corporation (MMC). This strategy should include the following components:
-Characteristics of the particular environment that may influence the strategy.
-Roles involved in the selection and maintenance of the strategy.
-Selection of a particular set of procedures and products.
-Support for why these procedures and products are the optimal approach for this organization.
-High level architectural and design details for how and where these procedures and products will be implemented within the organization.
Here is the info on the company the paper should be written about.
The organizations name is the Making Money Corporation (MMC). MMC has one corporate center and 30 branch locations scattered across three states. The corporation has a fairly well rounded IT staff which consists of system engineers, network engineers, a Database Administrator, helpdesk personnel, who all report to a CIO.
The network is comprised of a single Microsoft Active Directory domain with domain controllers at each physical location. The branches connect back to the corporate office via a T1 MPLS WAN connection. The corporation’s sole Internet connection is at the corporate center. The computers and VoIP phones connect via CAT6 cable runs to 3Com and Cisco network equipment.
The corporation has a core business application which has business operation platforms plug-ins. The core business application houses the customer information and all associated accounts in a relational database. The platforms used are a lending platform and a collections platform. The corporation has just recently implemented a document scanning solution that will digitally capture all paper documents used for customer interaction. An accounting application is used to keep track of the institutions general ledger, assets, and other accounting functions. MMC’s HR department utilizes a payroll and benefits system that is a software as a services type of architecture.
Few key personnel are issued laptop computers which is less than 15 employees. The rest of the employees use workstations. There are around 50 server class computers. Each branch has exactly one server which is a domain controller and core application server.
The corporation uses a backup to disk solution for its critical servers. The corporation is interested in implementing a robust Disaster Recovery (DR) solution for its critical computer infrastructure.
How to Reference "Database and Data Mining Security Strategy" Essay in a Bibliography
“Database and Data Mining Security Strategy.” A1-TermPaper.com, 2010, https://www.a1-termpaper.com/topics/essay/database-data-mining-security/4359. Accessed 4 Oct 2024.
Related Essays:
Data Mining in Business Research Executive Summary Term Paper
Data Mining in Business Research
Executive Summary
The perfect storm is brewing over analytics and their use to define the
future of data mining and its associated techniques and technologies,… read more
Term Paper 4 pages (1160 words) Sources: 3 Style: MLA Topic: Computers / IT / Internet
Impact of Big Data on Business Strategy Term Paper
Big Data on Business Strategy
Business Strategies
The competitive nature of today's business environment is driving companies to use technology driven business strategies (Berman & Hagan, 2006, p.28). Big Data… read more
Term Paper 20 pages (5673 words) Sources: 18 Topic: Business / Corporations / E-commerce
Databases Fundamentals of Databases Database Software Research Paper
Databases
Fundamentals of Databases
Database software is designed to support rapid access to large amounts of files, records, fields and data through the use of a variety of different indexing… read more
Research Paper 3 pages (807 words) Sources: 2 Topic: Computers / IT / Internet
Databases Benefits and Limitations of Database Capabilities Term Paper
Databases
Benefits and Limitations of Database Capabilities of Desktop vs. Enterprise DBMS Systems
The use of databases has become pervasive in personal productivity applications including Microsoft Excel and Access, in… read more
Term Paper 1 pages (355 words) Sources: 2 Topic: Computers / IT / Internet
Consumer Piracy Research Paper
Consumer Privacy: Regulations and Ethics: Judging Privacy Concerns and Protections
Consumer Privacy and Data Mining:
Ethical Implications for Marketers in the 21st Century
The ethical implications of using customer data… read more
Research Paper 6 pages (2099 words) Sources: 4 Topic: Advertising / Marketing / Sales
Fri, Oct 4, 2024
If you don't see the paper you need, we will write it for you!
We can write a new, 100% unique paper!