Question

Discuss the security concerns involved in building a data warehouse. (Subject: Business information System) (The question...

Discuss the security concerns involved in building a data warehouse.

(Subject: Business information System)

(The question should be well answered)

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Some of the security concerns while building a Data Warehouse are:

  • There can be biometric measures or other physical Access control mechanism to avoid unauthorized access.
  • An employee could be used by intruders to gain access, but if the employee in question is ardently following the specified guidelines it makes a world of difference.
  • There should be encryption mechanism for all Data, e.g. AES.
  • Securing data in a single place and transit are two different ball games. Here data in transit means the one which is being relayed from transactional databases in real-time to the data warehouse. These transactional databases can be anywhere geographically, therefore using protective protocols, such as SSL or TSL is highly recommended.
  • Implementing a trusted witness server is akin to hiring a watchdog that avidly and quite tenaciously keeps vigil on your data access points. It can detect an unwarranted and suspicious attempt at accessing data and generate an alert immediately. This allows the people responsible for the data warehouse security to stop the intruders dead in their tracks.
Add a comment
Know the answer?
Add Answer to:
Discuss the security concerns involved in building a data warehouse. (Subject: Business information System) (The question...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Subject: Introduction to Security Topic: INTERNAL AND EXTERNAL SECURITY CONCERNS Question: When the building forms part...

    Subject: Introduction to Security Topic: INTERNAL AND EXTERNAL SECURITY CONCERNS Question: When the building forms part of the perimeter barrier it must be evaluated in terms of its strength. What would you look for in determining how to secure the perimeter?.

  • IT Subject - System Security. Question 3 Most of the current organizations are relying on IT...

    IT Subject - System Security. Question 3 Most of the current organizations are relying on IT services to process their daily operational and business processes. However, on the other hand, some of these organizations do not fully enjoy the benefit of these IT services as intended. To a great extent, this is dependent on the availability of the services uninterrupted. The degree of availability defers from company to company. The degree of availability is normally higher and commonly found among...

  • i have three question for MIS subject which is enterprise system configuration for business. i will...

    i have three question for MIS subject which is enterprise system configuration for business. i will post the question in picture. thankyou Q1. What is the purpose of using Organization and Staffing Plan tool in SAP ERP system? Explain in detail with an example. (25 Points) Q2. Discuss how SAP ERP system organizes HR related information? Explain the relationships between persons, positions, jobs & tasks in SAP with examples. (25 Points) Q3. Read "Another Look: What's New in Human Capital...

  • Management Information System

    through studying the IT infrastructure of a relevant information system (IS)/ information technology (IT) used by selecting any organization of your choice locally or internationally The idea is to investigate the selected organization using the main components of IT (Hardware, software, services, data management and networking). Infrastructure Investigation, which is in a selected industry, should be carried out by using articles, websites, books and journal papers and /or interviews. In the report, you are expected to discuss:Executive Summary .     ...

  • Management Information System

    1- What are the technology Involved in apple company "How it set up in terms of its IT infrastructure, the hardware, software, telecommunication, information security, networks, and other elements. 2- Analysis the existing System of apple Analyze the key problems of the existing system used by the company including:• Transaction processing systems (TPS)• Enterprise Resource Planning (ERP) Systems• Functional Area Information Systems• Business intelligence• DSS 3- discuss the Possible Solutions and Suggestions to help the organization in solving the key problems? 

  • Management Information System

    1- What are the technology Involved in Amazon.com"How it set up in terms of its IT infrastructure, the hardware, software, telecommunication, information security, networks, and other elements. 2- Analysis the existing System of AmazonAnalyze the key problems of the existing system used by the company including:• Transaction processing systems (TPS)• Enterprise Resource Planning (ERP) Systems• Functional Area Information Systems• Business intelligence• DSS 3- discuss the Possible Solutions and Suggestions to help the organization in solving the key problems? 

  • System Patching and Data Backups Network administrators are typically more aware of and apt to engage...

    System Patching and Data Backups Network administrators are typically more aware of and apt to engage in timely application of system patches. In the past, however, the rationale that was given as to why these activities were not happening related to concerns that the patches would break a functioning network and that internal networks were well fortified by firewalls and other border security devices, reducing the risk to internal hosts and servers. System backup tools were crude and time consuming...

  • Data Warehouse 1.3 Why would you drop indexes during the Load Operation of the ETL Phase...

    Data Warehouse 1.3 Why would you drop indexes during the Load Operation of the ETL Phase of a Data Warehouse Project? Why would you disable foreign key constraint (referential integrity) before loading data during the Load Operation of an ETL Project Phase? What is the Staging Area that is used during the ETL phases of Data Warehouse Project? Name one type of Source Data System that is used to extract data during the ETL phases of a Data Warehouse Project....

  • Discuss the following 1. Technical data and information system factors 2. Information required for system operation...

    Discuss the following 1. Technical data and information system factors 2. Information required for system operation requirements 3. Material reuse, recycling or disposal process Discuss technical data and information system

  • Question 1 A data warehouse differs from an operational database in that most data warehouses have...

    Question 1 A data warehouse differs from an operational database in that most data warehouses have a product orientation and are designed to handle transactions that update the database. Select one: True False Question 2 An operational data store (ODS) provides a fairly recent form of a customer information file (CIF), which is often used as an interim staging area for a data warehouse. Select one: True False Question 3 An advantage of the hub-and-spoke data warehouse architecture is that...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT